It isn't the count of algorithms, it's the size of the algorithm field that is the issue (8 bits) though we could hack in a extension. We can invent lots of algorithms but we really need to have a good justifation to add it to the table. Why is this algorithm *significantly* better than all of the existing algorithms.
Mark In message <20150909192945.gl21...@mournblade.imrryr.org>, Viktor Dukhovni writ es: > On Wed, Sep 09, 2015 at 08:12:41PM +0200, Ondej Sur wrote: > > > Yes, we are waiting exactly for the cfrg to finish the signature > schemas. > > But the rest can get a review early. f.e. it's evident now, we have to > > add more material about motivation to add new curves into the draft(s). > > Great. My other concern is that at this point, perhaps every time > we consider adding more algorithm ids to DNSSEC we should consider > retiring some old ones, we are starting to have too many: > > Id Description Mnemonic ZSIG TSIG Reference > > ------------------------------------------------------------------------- > 1 RSA/MD5 (deprecated) RSAMD5 N Y RFC3110RFC4034 > 2 Diffie-Hellman DH N Y RFC2539 > 4 Reserved RFC6725 > 9 Reserved RFC6725 > 11 Reserved RFC6725 > -- > 3 DSA/SHA1 DSA Y Y RFC3755 > 5 RSA/SHA-1 RSASHA1 Y Y RFC3110RFC4034 > 6 DSA-NSEC3-SHA1 DSA-NSEC3-SHA1 Y Y RFC5155 > 7 RSASHA1-NSEC3-SHA1 RSASHA1-NSEC3-SHA1 Y Y RFC5155 > 8 RSA/SHA-256 RSASHA256 Y * RFC5702 > 10 RSA/SHA-512 RSASHA512 Y * RFC5702 > 12 GOST R 34.10-2001 ECC-GOST Y * RFC5933 > 13 P-256 with SHA-256 ECDSAP256SHA256 Y * RFC6605 > 14 P-384 with SHA-384 ECDSAP384SHA384 Y * RFC6605 > > I'd like to propose that with the introduction of the CFRG algorithms, > we should deprecate: > > 3 DSA/SHA1 DSA Y Y RFC3755 > 6 DSA-NSEC3-SHA1 DSA-NSEC3-SHA1 Y Y RFC5155 > 12 GOST R 34.10-2001 ECC-GOST Y * RFC5933 > > and as ideally also announce a sunset date for: > > 5 RSA/SHA-1 RSASHA1 Y Y RFC3110RFC4034 > 7 RSASHA1-NSEC3-SHA1 RSASHA1-NSEC3-SHA1 Y Y RFC5155 > > though of course these are rather widely used at present, it is > time to start encouraging folks to move on. > > Once the CFRG algorithms are done, I would also publish an updated > list of MTI algorithms for DNSSEC that would consist of: > > 8, 12 and both of the CFRG algorithms. > > The more secure of the two CFRG algorithms should be supported by > clients, but should not yet be used by servers, concerns about > post-QC crypto don't really apply to short-term signatures, we can > switch to the Goldilocks curve if/when necessary, provided the > client support is there all along. > > -- > Viktor. > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Mark Andrews, ISC 1 Seymour St., Dundas Valley, NSW 2117, Australia PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop