On Wed, Jul 5, 2017 at 1:12 PM, Viktor Dukhovni <ietf-d...@dukhovni.org>
wrote:

> On Wed, Jul 05, 2017 at 05:30:49PM +0100, Jim Reid wrote:
>
> > 3) Something should be said about algorithm agility. We can be reasonably
> > sure web browsers, DNS servers, smart phones and so on will generally
> have
> > up-to-date DNSSEC validators and/or TLS code. Some TLS clients -- fire
> > and forget embedded systems, IoT devices, etc -- might never get updated
> > once they're deployed. If these clients use their own DNSSEC validators,
> > they will be screwed when/if DNSSEC drops SHA1 signatures (say) or adds
> > a new flavour of ECC or even an all-new signing protocol.
>
> SHA2 is already defined and widely used for DS records.  The X25519
> and X448 EC algorithms are already defined (or will be by the time
> this draft becomes an RFC).


RFC 8080, defining Ed25519 and Ed448 for DNSSEC, is already published.
There are already some early implementations (PowerDNS and NLnet Labs'
Unbound; maybe others).


> So there's not much churn on the
> immediate horizon.  Devices doing all the validation locally will
> need software updates roughly once a decade (DNS parameters change
> slowly).  A secure channel to a *trusted* resolver would avoid the
> problem, but trustworthy off-device resolvers are very unlikely to
> be ubiquitous.
>

Regarding churn, I expect we'll have several post quantum signature
algorithms for DNSSEC in the 5 to 10 year horizon.

-- 
Shumon Huque
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to