Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Bill Woodcock
On Mar 27, 2014, at 10:14 AM, Matthäus Wander wrote: > Here's a small statistic about RSA key lengths of 741,552 signed > second-level domains (collected on 2014-01-27, counting KSK and ZSKs): > > 1024 bit: 1298238 > 2048 bit: 698232 > 1280 bit: 28441 > 4096 bit: 25326 > 512 bit: 8893 > 1536

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Joe Abley
On 27 Mar 2014, at 17:47, Joe Abley wrote: > There was a plan underway to roll the KSK. I was at ICANN briefly when that > started (I spoke publicly, albeit briefly about it in the dnsop meeting in > Berlin). I'm no longer at ICANN and hence no longer have anything > authoritative to say, but

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Joe Abley
On 27 Mar 2014, at 10:05, Nicholas Weaver wrote: > On Mar 27, 2014, at 7:22 AM, Joe Abley wrote: > >> On 27 Mar 2014, at 22:56, Nicholas Weaver wrote: >> >>> Bits are not precious: Until a DNS reply hits the fragmentation limit of >>> ~1500B, size-matters-not (tm, Yoda Inc). >>> >>> So

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Phillip Hallam-Baker
Nope. ALL 1024 bit certs of every description are covered including end-entity. On Thu, Mar 27, 2014 at 3:35 PM, Paul Wouters wrote: > On Thu, 27 Mar 2014, Nicholas Weaver wrote: > > Because the browsers have already decided killing of 1024b CAs is a good >> idea, and they could revoke just t

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Paul Wouters
On Thu, 27 Mar 2014, Nicholas Weaver wrote: 1 month validity. I said "don't give me that key roll crap" for a reason. A bad reason. For an attacker, the root ZSK is not 1 month validity, since an attacker who's in a position to take advantage of such a ZSK compromise is going to be faking

[DNSOP] One more bit of Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Nicholas Weaver
The overall problem of using old root keys will persist (and eventually I think DNSSEC resolvers need to refuse ZSKs for . and tlds that are less than 2048b in length, or barring that, need to add a clock ratchet to keep old keys from being reused). But fixing this going forward requires a 1-l

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Paul Wouters
On Thu, 27 Mar 2014, Nicholas Weaver wrote: Because the browsers have already decided killing of 1024b CAs is a good idea, and they could revoke just those CAs once someone breaks a 1024b example, since the browser vendors have good experience in revoking bad CAs already (queue DigiNotar...)

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Christopher Morrow
On Thu, Mar 27, 2014 at 2:39 PM, Nicholas Weaver wrote: > > On Mar 27, 2014, at 11:18 AM, Christopher Morrow > wrote: > >> On Thu, Mar 27, 2014 at 10:52 AM, Paul Hoffman wrote: >>> Yes. If doing it for the DNS root key is too politically challenging, maybe >>> do it for one of the 1024-bit tru

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Nicholas Weaver
On Mar 27, 2014, at 11:18 AM, Christopher Morrow wrote: > On Thu, Mar 27, 2014 at 10:52 AM, Paul Hoffman wrote: >> Yes. If doing it for the DNS root key is too politically challenging, maybe >> do it for one of the 1024-bit trust anchors in the browser root pile. > > why would this be politi

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Christopher Morrow
On Thu, Mar 27, 2014 at 10:52 AM, Paul Hoffman wrote: > Yes. If doing it for the DNS root key is too politically challenging, maybe > do it for one of the 1024-bit trust anchors in the browser root pile. why would this be politically sensitive? ___ DN

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Matthäus Wander
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 * Nicholas Weaver [2014-03-27 14:56]: > So why are both root and com and org and, well, just about > everyone else using 1024b keys for the actual signing? Here's a small statistic about RSA key lengths of 741,552 signed second-level domains (collecte

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Stephane Bortzmeyer
On Thu, Mar 27, 2014 at 03:17:04PM +, Rose, Scott wrote a message of 45 lines which said: > It is likely safe enough now to increase to 2048 for both KSK and > ZSK. Zones are doing this now and haven't seen any horror stories. If you want to test, rd.nic.fr has large KSK and ZSK (not bec

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Rose, Scott
On Mar 27, 2014, at 10:22 AM, Joe Abley wrote: > > On 27 Mar 2014, at 22:56, Nicholas Weaver wrote: > >> Bits are not precious: Until a DNS reply hits the fragmentation limit of >> ~1500B, size-matters-not (tm, Yoda Inc). >> >> So why are both root and com and org and, well, just about ev

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Nicholas Weaver
On Mar 27, 2014, at 7:22 AM, Joe Abley wrote: > > On 27 Mar 2014, at 22:56, Nicholas Weaver wrote: > >> Bits are not precious: Until a DNS reply hits the fragmentation limit of >> ~1500B, size-matters-not (tm, Yoda Inc). >> >> So why are both root and com and org and, well, just about ev

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Phillip Hallam-Baker
On Thu, Mar 27, 2014 at 11:05 AM, Nicholas Weaver wrote: > > Frankly speaking, since the root uses NSEC rather than NSEC3, IMO it > should be 4096b for both the KSK and ZSK. But I'd be happy with 2048b. > Using 1024b is a recipe to ensure that DNSSEC is not taken seriously. > > I think I know h

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Phillip Hallam-Baker
On Thu, Mar 27, 2014 at 10:52 AM, Paul Hoffman wrote: > On Mar 27, 2014, at 6:56 AM, Nicholas Weaver > wrote: > > > and 1024B is estimated at only "a thousand times harder". > > Does that estimate include a prediction that the method to factor RSA will > improve significantly as it has in the pas

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Phillip Hallam-Baker
The NIST Guidance is from 2009. It is long since obsolete. This is one of the reasons why we need to take advice on crypto algorithms in house and make them IETF wide. Which is why I was asked to write this: https://datatracker.ietf.org/doc/draft-hallambaker-consensuscrypto/ Having DNSSEC use 1

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Paul Hoffman
On Mar 27, 2014, at 6:56 AM, Nicholas Weaver wrote: > and 1024B is estimated at only "a thousand times harder". Does that estimate include a prediction that the method to factor RSA will improve significantly as it has in the past? The authors were unclear on that in their estimate. > Do you

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Joe Abley
On 27 Mar 2014, at 22:56, Nicholas Weaver wrote: > Bits are not precious: Until a DNS reply hits the fragmentation limit of > ~1500B, size-matters-not (tm, Yoda Inc). > > So why are both root and com and org and, well, just about everyone else > using 1024b keys for the actual signing? Th

Re: [DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Nicholas Weaver
On Mar 27, 2014, at 6:56 AM, Nicholas Weaver wrote: > And, frankly speaking, a 3500 node cluster for a day is $75K thanks to EC2. > > Do you really want someone like me to try to get an EC2 academic grant for > the cluster and a big slashdot/boingboing crowd for the sieving to factor the > roo

[DNSOP] Whiskey Tango Foxtrot on key lengths...

2014-03-27 Thread Nicholas Weaver
Bits are not precious: Until a DNS reply hits the fragmentation limit of ~1500B, size-matters-not (tm, Yoda Inc). So why are both root and com and org and, well, just about everyone else using 1024b keys for the actual signing? The biggest blobs of typical DNSSEC data are NSEC3 responses, an

[DNSOP] IETF89 Minutes

2014-03-27 Thread Tim Wicinski
All, I've gone through a large portion of the minutes of both sessions from London, and have cleaned up a few things. I have put a first iteration in the meeting tracker: http://www.ietf.org/proceedings/89/minutes/minutes-89-dnsop If people themselves being misqouted please let me know. I g