On Wed, 9 Sep 2015, Viktor Dukhovni wrote:

I'd like to propose that with the introduction of the CFRG algorithms,
we should deprecate:

    3    DSA/SHA1              DSA                Y    Y   RFC3755
    6    DSA-NSEC3-SHA1        DSA-NSEC3-SHA1     Y    Y   RFC5155
    12   GOST R 34.10-2001     ECC-GOST           Y    *   RFC5933

and as ideally also announce a sunset date for:

    5    RSA/SHA-1             RSASHA1            Y    Y   RFC3110RFC4034
    7    RSASHA1-NSEC3-SHA1    RSASHA1-NSEC3-SHA1 Y    Y   RFC5155

though of course these are rather widely used at present, it is
time to start encouraging folks to move on.

Most people on 5 or 7 are only on it because their software does not
support an algorithm roll (like current opendnssec). I'm not sure if
declaring sunset will help them get un-stuck.

Once the CFRG algorithms are done, I would also publish an updated
list of MTI algorithms for DNSSEC that would consist of:

    8, 12 and both of the CFRG algorithms.

You listed 12 as both deprecate and MTI ?

The more secure of the two CFRG algorithms should be supported by
clients, but should not yet be used by servers, concerns about
post-QC crypto don't really apply to short-term signatures

I thought the whole point of QC was that it makes key discovery
a trivial short brute force. It would be especially useful for
short term signatures that otherwise couldn't have been broken in
time (although I guess if you have QC, you do the root key first.

Paul

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to