On Dec 20, 2021, at 8:12 PM, Donald Eastlake <d3e...@gmail.com> wrote: > > On Mon, Dec 20, 2021 at 10:42 PM Paul Hoffman <paul.hoff...@icann.org> wrote: >> On Dec 20, 2021, at 6:57 PM, Mark Andrews <ma...@isc.org> wrote: >>> Isn’t it about time we updated DH support in DNS to not use MD5? Currently >>> there is >>> no FIPS compatible DH key exchange in DNS. I suspect it would be >>> relatively straight >>> forward by defining a new TKEY mode which does DH w/o using MD5. >> >> If I read RFC 2930 correctly, there is no way to create new modes for TKEY. >> MD5 is baked into the TKEY RRtype, it seems. You would have to create a new >> RRtype which is similar to TKEY but has a different key exchange mechanism. > > I don't know why you think this. Maybe I should write a draft adding a > new TKEY mode using DH and some less primitive crypto than MD5. > Presumably that exercise would provide some information about which of > us is correct :-)
Gaaah, you are correct. I missed the "mode field" earlier in the draft. Yes, it would indeed be easy to make a nearly-identical mode with different hashes. --Paul Hoffman
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop