Re: [DNSOP] New Version of draft-ietf-dnsop-algorithm-update-00: Algorithm Implementation Requirements and Usage Guidance for DNSSEC
Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 23 March 2018 15:58 UTC
Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D23312D87C for <dnsop@ietfa.amsl.com>; Fri, 23 Mar 2018 08:58:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2aEgyJmDrgrw for <dnsop@ietfa.amsl.com>; Fri, 23 Mar 2018 08:58:03 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [108.5.242.66]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5439E1271FD for <dnsop@ietf.org>; Fri, 23 Mar 2018 08:58:03 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 277A87A330E; Fri, 23 Mar 2018 15:58:02 +0000 (UTC)
Date: Fri, 23 Mar 2018 15:58:02 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: dnsop@ietf.org
Message-ID: <20180323155802.GI3322@mournblade.imrryr.org>
Reply-To: dnsop@ietf.org
References: <EBE54422-0A97-4B33-BD55-01CACF1F272A@isc.org> <alpine.LRH.2.21.1803221314140.11686@bofh.nohats.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.LRH.2.21.1803221314140.11686@bofh.nohats.ca>
User-Agent: Mutt/1.7.2 (2016-11-26)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/UOq4ayPaAyJbrq_gOcrBwiQ8u0c>
Subject: Re: [DNSOP] New Version of draft-ietf-dnsop-algorithm-update-00: Algorithm Implementation Requirements and Usage Guidance for DNSSEC
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Mar 2018 15:58:05 -0000
On Thu, Mar 22, 2018 at 01:27:38PM -0400, Paul Wouters wrote: > I think this text also needs an update: > > RSASHA1 and RSASHA1-NSEC3-SHA1 are widely deployed, although zones > deploying it are recommended to switch to ECDSAP256SHA256 as there is > an industry-wide trend to move to elliptic curve cryptography. > > They should switch away from SHA1 as SHA1 is being deprecated industry > wide. Even if we recommend to move away from RSA (which I'm not sure if there > is consensus on) to ECC, I would like to move them to ED25519/ED448 over > the ECDSA* variants. I think it is, unfortunately, much too early for such a move. For example, on Unix systems the requisite OpenSSL 1.1.x libraries that provide the Edwards EC algorithms, are not yet out of beta! It will be some years before Ed25519 and Ed448 can be expected to be widely supported by resolvers. Therefore, I would still strongly recommend ECDSA, which is widely supported. We should certainly encourage the implementation of Ed25519/Ed448 in resolver and nameserver implementations, but it is much too early for adoption, beyond dual DS/KSKs one ECDSA and another Ed25519, with the client choosing whichever it prefers. ZSKs should IMHO migrate to ECDSA for now to alleviate packet size issues. > If it is too soon for that now, I would simply not recommend moving away > from RSA. And maybe make ECDSAP256SHA256 a MAY instead of a MUST. I disagree. ECDSA is widely adopted, and more adoption will help to reduce packet sizes and improved performance of online signing where desired (load-balaced responses with DNSSEC, ...). -- Viktor.
- [DNSOP] New Version of draft-ietf-dnsop-algorithm… Ondřej Surý
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Paul Wouters
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Ondřej Surý
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Frederico A C Neves
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Viktor Dukhovni
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Ondřej Surý
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Frederico A C Neves
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Paul Wouters
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Michael Sinatra
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Ondřej Surý
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Paul Hoffman
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Michael Sinatra
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Paul Hoffman
- Re: [DNSOP] New Version of draft-ietf-dnsop-algor… Michael Sinatra