On 5.5.2017 14:30, Olafur Gudmundsson wrote: > >> On Apr 10, 2017, at 11:09 AM, Mukund Sivaraman <m...@isc.org >> <mailto:m...@isc.org>> wrote: >>> >> >> We kind of restarted the draft adopting RSASSA-PSS, so please can you >> review it this time from scratch without looking at the diff? >> >> Many of the examples will need updating once algorithm numbers are >> assigned for them (as for some calculations, the algorithm number is an >> input), so we didn't spend time on wrapping the long lines in this >> revision. >> > > Ok I will bite and be the grumpy old man. > > I strongly advocate against the adoption of this document in current from. > It violates basic interoperability guidelines by defining way to many > algorithms with no justification why any of them are better or worse > than others. > There is no useful guidance on why these new algorithms are better even > among themselves. > > One of the biggest hurdles to deployment is not in the 5-20 DNS software > packages in wide use; but in all the 1000’s of Provision systems around > the world, > and the crypto libraries found on various Enterprise systems that have > life time of 4-8 years with security-only updates. > Lets learn the lessons documented > in > https://tools.ietf.org/html/draft-york-dnsop-deploying-dnssec-crypto-algs-04 > > I’m not convinced that SHA3 vs SHA2 matter at all given the constraint > small data with strict constraints on order and contents is being signed. > > Thus why define > - 5 new RSA algorithms proposed, why why ? ? > - 2 new ECDSA algorithms proposed why why ? ? > In another document there 2 other algorithms being proposed at the same > time, that I support as they represent new and > faster technology. > All this will do is to cause confusion! > > The RSA KEY size allowed for these new supposed stronger Digest > algorithms is still left at 1024 or 1280 bytes, even though number of > other parts of the the Internet community will not consider signatures > by keys with less than 2048 bits. > > If there is any reason to go down the path of this document it should > pick ONE RSA and ONE ECDSA algorithm. > RSA should be defined sensible guidelines on key sizes; i.e. no keys > below some stronger value in the 1536-2048 byte range. > > The document is proposing two new DS algorithms WHY? > The basic reason for new a DIS digest algorithm is “much better” so > pick one and live with it. > > There was an interesting discussion on a resolver software mailing list > few weeks back about what the RFC’s mean when there are DS records with > different digest > algorithm numbers: A domain had 2 DS records one with digest 1 one with > digest 2; > They both referred to the same key, but there was a typo/error in the > digest with algorithm 2; > Question what should the validator do ? > a) only trust the highest digest number? > b) trust any DS record ? > I.e. a higher number was interpreted by the implementor to mean better > thus only the highest supported number was the only one tried. > > Additionally this document in its current form contains proposed > algorithm values which IMHO is a NoNo and I hope is removed from future > versions. > If there are interoperability tests you can define the numbers you want > to use on web page; not in an internet draft that someone may go ahead and > implement not realizing that the final RFC will have a different number(s). > > Olafur
Very well said, Olafur. I'm also against adoption of this document in its current form. -- Petr Špaček @ CZ.NIC _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop