Re: [DNSOP] New Version of draft-ietf-dnsop-algorithm-update-00: Algorithm Implementation Requirements and Usage Guidance for DNSSEC

Viktor Dukhovni <ietf-dane@dukhovni.org> Fri, 23 March 2018 15:58 UTC

Return-Path: <ietf-dane@dukhovni.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D23312D87C for <dnsop@ietfa.amsl.com>; Fri, 23 Mar 2018 08:58:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2aEgyJmDrgrw for <dnsop@ietfa.amsl.com>; Fri, 23 Mar 2018 08:58:03 -0700 (PDT)
Received: from mournblade.imrryr.org (mournblade.imrryr.org [108.5.242.66]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5439E1271FD for <dnsop@ietf.org>; Fri, 23 Mar 2018 08:58:03 -0700 (PDT)
Received: by mournblade.imrryr.org (Postfix, from userid 1034) id 277A87A330E; Fri, 23 Mar 2018 15:58:02 +0000 (UTC)
Date: Fri, 23 Mar 2018 15:58:02 +0000
From: Viktor Dukhovni <ietf-dane@dukhovni.org>
To: dnsop@ietf.org
Message-ID: <20180323155802.GI3322@mournblade.imrryr.org>
Reply-To: dnsop@ietf.org
References: <EBE54422-0A97-4B33-BD55-01CACF1F272A@isc.org> <alpine.LRH.2.21.1803221314140.11686@bofh.nohats.ca>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <alpine.LRH.2.21.1803221314140.11686@bofh.nohats.ca>
User-Agent: Mutt/1.7.2 (2016-11-26)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/UOq4ayPaAyJbrq_gOcrBwiQ8u0c>
Subject: Re: [DNSOP] New Version of draft-ietf-dnsop-algorithm-update-00: Algorithm Implementation Requirements and Usage Guidance for DNSSEC
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Mar 2018 15:58:05 -0000

On Thu, Mar 22, 2018 at 01:27:38PM -0400, Paul Wouters wrote:

> I think this text also needs an update:
> 
> 	RSASHA1 and RSASHA1-NSEC3-SHA1 are widely deployed, although zones
> 	deploying it are recommended to switch to ECDSAP256SHA256 as there is
> 	an industry-wide trend to move to elliptic curve cryptography.
> 
> They should switch away from SHA1 as SHA1 is being deprecated industry
> wide. Even if we recommend to move away from RSA (which I'm not sure if there
> is consensus on) to ECC, I would like to move them to ED25519/ED448 over
> the ECDSA* variants.

I think it is, unfortunately, much too early for such a move.  For
example, on Unix systems the requisite OpenSSL 1.1.x libraries that
provide the Edwards EC algorithms, are not yet out of beta!  It
will be some years before Ed25519 and Ed448 can be expected to be
widely supported by resolvers.  Therefore, I would still strongly
recommend ECDSA, which is widely supported.

We should certainly encourage the implementation of Ed25519/Ed448
in resolver and nameserver implementations, but it is much too
early for adoption, beyond dual DS/KSKs one ECDSA and another
Ed25519, with the client choosing whichever it prefers.  ZSKs should
IMHO migrate to ECDSA for now to alleviate packet size issues.

> If it is too soon for that now, I would simply not recommend moving away
> from RSA. And maybe make ECDSAP256SHA256 a MAY instead of a MUST.

I disagree.  ECDSA is widely adopted, and more adoption will help
to reduce packet sizes and improved performance of online signing
where desired (load-balaced responses with DNSSEC, ...).

-- 
	Viktor.