>> On Apr 25, 2022, at 11:20 AM, Petr Menšík <pemen...@redhat.com> wrote:
>> I think the only good way would be starting considering shorter keys as
>> insecure in FIPS mode.
>
> Agreed.  We've been using 2408-bit ZSKs for more than ten years
> now.  It's definitely time to sunset acceptance of shorter keys
> at this point.

Well, as Bjørn Mork said, it's one thing to insist on generating
own RSA keypairs with >= 2048 bits or convert to using ECDSA,
it's quite another to insist that all the rest of the world do
this conversion RIGHT NOW.  (And Bjørn mentioned that this may be
a mis-interpretation of the FIPS mandate.)

My take is that "Some level of security is better than none", and
"Who are you to insist on the level of security I want to provide
for my zone data?"

There's going to be quite a bit of "action" to fix this.

.in-addr.arpa zsk = 1024 bit RSA
.com zsk = 1280 bit RSA
.org zsk = 1024 bit RSA
.mil zsk = 1024 bit RSA

and I'm guessing that changing at least some of these will take a
while, not perhaps first and foremost for technical reasons.  I'm
also guessing this is going to be a recurring theme throughout the
trees fanned out below all of these.

Regards,

- Håvard

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to