when selecting DNSSEC signing algorithms for eventual use with DANE setup, 
checking first @

        
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1

both algos 8 & 13 are listed as options:

 Number  Description                      Mnemonic         Zone Signing  
Trans.Sec.  Reference
 8       RSA/SHA-256                      RSASHA256        Y              *     
      [RFC5702][proposed standard]
 13      ECDSA Curve P-256 with SHA-256  ECDSAP256SHA256  Y              *      
     [RFC6605][proposed standard]

checking for signing algos @ root zone for my most-common in-use domains,

        _r="http://www.internic.net/domain/root.zone";
        curl -s $_r | egrep "^com\.|^net\.|^org\.|^io\." | awk '$4 == "DS" { printf 
"%-10s %s\n", $1, $6 }'

                com.       8
                io.        8
                net.       8
                org.       8

none are currently signing with ECDSA algo 13.

and for root signing algo usage across all TLDs

        curl -s $_r | awk '$4 == "DS" { print $6}' | sort -n | uniq -c
             68 5
             59 7
           1368 8
             33 10
             75 13
              1 14

the overall usage of 13 is still low, though incrementally better than a couple 
of years ago.

I'm interested in real-world production use -- specifically, NOT breaking 
postfix/DANE.

Given, e.g., Viktor's comment

        https://blog.apnic.net/2021/11/10/rsa-vs-ecdsa-for-dnssec/#comment-65911

                "Perhaps if we can coax more TLDs into moving to ECDSA P256, 
the ISPs will be more strongly incentivised to support the algorithm.

I'm unclear on what 'support' here means.

what's currently recommended/required?
*must* I sign my DNSSEC keys for my domains with the same algo in-use by the 
respective TLDs' roots in order to not fubar DANE usage specifically, or can I 
(arbitrarily) use any algo listed @ the iana.org link above, regardless of the 
root signing algo?

Reply via email to