Thank you for those references, they are very useful. I need to discuss our stance internally first. I think we should have a better response prepared.
It may take a few days to formulate and explain our direction. Thanks, Petr On 4/25/22 12:02, Bjørn Mork wrote: > Petr Menšík <pemen...@redhat.com> writes: > >> Our crypto team is >> responsible for preparing RHEL 9 for FIPS 140-3 certification. They said >> there is legal obligation to stop using all RSA signatures with keys >> shorter than 2048 bits. > Either they're wrong or you're misquoting them by merging "signing" and > "verifying" into the confusing and misleading term "using". FIPS 140-3 > is a bit more specific than that, fortunately. > > See table 2 in > https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf > which shows the status of RSA keys with 1024 ≤ len(n) < 2048 for Digital > Signature Verification as "Legacy use". > > The text following that table provides more detail: > > Key lengths providing less than 112 bits of security that were > previously specified in FIPS 186 are allowed for legacy use when > verifying digital signatures. > > and > > RSA: See FIPS 186-239 and FIPS 186-4,40 which include modulus lengths > of 1024, 1280, 1536 and 1792 bits, may continue to be used for > signature verification but not signature generation > > > Bjørn > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop -- Petr Menšík Software Engineer Red Hat, http://www.redhat.com/ email: pemen...@redhat.com PGP: DFCF908DB7C87E8E529925BC4931CA5B6C9FC5CB _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop