I am sorry it took so long.

Our intention is to get rid of RSA < 2048b, because they are considered too weak, 829 bits key was factorized in 2020 [1]. However the FIPS team is aware it is technically permissible to do just verification with smaller key size and is evaluating the impact. The FIPS team also thinks adoption of strong enough algorithms in DNSSEC is very slow. Web PKI has moved to 2048b keys in 2013 [2].


The legacy use in FIPS mode is not very well defined. The FIPS team thinks legacy use should cover only signatures made when those keys were considered secure, which would be application-specific and which might not solve the DNSSEC problem as it is using smaller keys deliberately because of technical limitations with larger keys. Not fresh signatures with a short expiration period and refreshed periodically.


Also, NIST SP 800-131Ar2 document [3] mentions legacy use of any key equal or above 1024 bits. But FIPS 140-3 Implementation Guidelines [4] mention explicitly only keys exactly 1024 bits, otherwise only allowed keys are those permitted to be generated. That would be >=2048 bits, that is clear enough.

Fortunately NIST labs gave as a green flag and agreed legacy use is okay also for higher sizes. It seems it would break on few shorter keys, but most of domains still can be validated. I would try modification of shipped validators to pass on shorter key.

Overall there is no sensation or critical breakage which I expected for some time. I am sorry for a disturbance caused. Only minor issues will arise. Thank you for your attention and I hope I haven't caused any harm.

Best Regards, Petr Menšík



1.

   https://en.wikipedia.org/wiki/RSA_numbers#RSA-250

2.

   
https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf
   
<https://csrc.nist.gov/CSRC/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf>

3.

   https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.5.3.pdf
   <https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.5.3.pdf>

4.

   https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf
   
<https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf>


On 27. 04. 22 14:16, Petr Menšík wrote:
Thank you for those references, they are very useful.

I need to discuss our stance internally first. I think we should have a
better response prepared.

It may take a few days to formulate and explain our direction.

Thanks,
Petr

On 4/25/22 12:02, Bjørn Mork wrote:
Petr Menšík<pemen...@redhat.com>  writes:

Our crypto team is
responsible for preparing RHEL 9 for FIPS 140-3 certification. They said
there is legal obligation to stop using all RSA signatures with keys
shorter than 2048 bits.
Either they're wrong or you're misquoting them by merging "signing" and
"verifying" into the confusing and misleading term "using".  FIPS 140-3
is a bit more specific than that, fortunately.

See table 2 in
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf
which shows the status of RSA keys with 1024 ≤ len(n) < 2048 for Digital
Signature Verification as "Legacy use".

The text following that table provides more detail:

   Key lengths providing less than 112 bits of security that were
   previously specified in FIPS 186 are allowed for legacy use when
   verifying digital signatures.

and

   RSA: See FIPS 186-239 and FIPS 186-4,40 which include modulus lengths
   of 1024, 1280, 1536 and 1792 bits, may continue to be used for
   signature verification but not signature generation


Bjørn

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to