On May 24, 2011, at 1:38 AM, Daniel Pittman wrote: > On Fri, May 20, 2011 at 08:23, Nigel Kersten <ni...@puppetlabs.com> wrote: >> On Fri, May 20, 2011 at 5:39 AM, Mark Stanislav <mark.stanis...@gmail.com> >> wrote: >>> >>> In short, I'm in agreement with you. With the CA which is defaulted to 5 >>> years (not at all surprising) there's no doubt that soon (maybe 2.7 is a >>> good time?) that 2048 key size should be used for at least the CA key, if >>> not default for client key generation as well. Secondly, yes, I don't know >>> why MD5 would be the hashing algorithm of choice in this case either. >>> >>> As I recall last year, most major root CAs went to 2048 last year to not >>> anger the NIST recommendation. >> >> We will do this for 2.7.x unless we get major pushback from the community. > > To replicate what I said in RedMine:
For those playing along at home ;) http://projects.puppetlabs.com/issues/6663 > I am strongly of the view that we should follow the most restrictive > of the current sets of government advice (eg: BSI, NSA/NIST, etc) and > advice from the experts in the field. If this requires addressing the > question of how to achieve compatibility then we had better solve > this, before someone genuinely breaks MD5, or RSA, or whatever in a > way that matters to us, and we end up in more serious trouble: having > to solve this in zero time, rather than with the relatively luxury of > time. There will of course be a trade-off for security versus performance, which is why being reasonable about strength used should be also considered. 2048 bit RSA keys are 'good' until ~2030 at this time (according to NIST). Considering a default CA cert is five years for Puppet, this is a very reasonable way to go. There shouldn't be a compatibility issue to solve unless there's some interesting crypto voodoo occurring in Puppet ;) > > Larger keys, better hashing (probably by adding them as well as md5, > rather than just replacing it, etc.) I really don't know of any reason to implement MD5 at all. It *is* broken and we do have better algorithms to implement. Even if SHA-1 is on its last leg, it's still a step-up. SHA-256 is preferred, though. Again, a great discussion to be having and very forward thinking. -Mark > > (Oh, and we absolutely have the capabilities to inspect the client > version and make intelligent decisions about what we ship in terms of > checksums, etc, as part of our compatibility story. As long as the > master leads the agent in version we should be fine.) > > Daniel > -- > ⎋ Puppet Labs Developer – http://puppetlabs.com > ✉ Daniel Pittman <dan...@puppetlabs.com> > ✆ Contact me via gtalk, email, or phone: +1 (877) 575-9775 > ♲ Made with 100 percent post-consumer electrons > > -- > You received this message because you are subscribed to the Google Groups > "Puppet Users" group. > To post to this group, send email to puppet-users@googlegroups.com. > To unsubscribe from this group, send email to > puppet-users+unsubscr...@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/puppet-users?hl=en. > -- You received this message because you are subscribed to the Google Groups "Puppet Users" group. To post to this group, send email to puppet-users@googlegroups.com. To unsubscribe from this group, send email to puppet-users+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.