On Dec 20, 2021, at 8:12 PM, Donald Eastlake <d3e...@gmail.com> wrote:
> 
> On Mon, Dec 20, 2021 at 10:42 PM Paul Hoffman <paul.hoff...@icann.org> wrote:
>> On Dec 20, 2021, at 6:57 PM, Mark Andrews <ma...@isc.org> wrote:
>>> Isn’t it about time we updated DH support in DNS to not use MD5?  Currently 
>>> there is
>>> no FIPS compatible DH key exchange in DNS.  I suspect it would be 
>>> relatively straight
>>> forward by defining a new TKEY mode which does DH w/o using MD5.
>> 
>> If I read RFC 2930 correctly, there is no way to create new modes for TKEY. 
>> MD5 is baked into the TKEY RRtype, it seems. You would have to create a new 
>> RRtype which is similar to TKEY but has a different key exchange mechanism.
> 
> I don't know why you think this. Maybe I should write a draft adding a
> new TKEY mode using DH and some less primitive crypto than MD5.
> Presumably that exercise would provide some information about which of
> us is correct :-)

Gaaah, you are correct. I missed the "mode field" earlier in the draft. Yes, it 
would indeed be easy to make a nearly-identical mode with different hashes.

--Paul Hoffman

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to