On 24 Apr 2009, at 16:03, Paul Wouters wrote:

I don't see a cryptographic reason for Paul Hoffman's "I'd like the keys to be of equal size". Unless you'd argue that the KSK could easilly also be
1024bit, and that the additional 11 months of validity of the KSK is
negligable compared to the time now upto 3 years from now, to break a 1024
bit RSA key.

What benefit is there of keeping the KSK small (e.g. 1024 bits) instead of just choosing the maximum that your signing software permits (e.g. 4096 bits, I think, with dnssec-signzone)?

EDNS0 is a prerequisite for DNSSEC, if memory serves, so it's presumably not TCP fallback we're worried about with larger DNSKEY RDATA. A 4096 bit key only represents 384 more bytes of RDATA in a DNSKEY resource record on the wire than a 1024 bit key, and 384 bytes doesn't sound (naively, no science) like it's going to break the bank.

Is the root concern the computational expense of dealing with larger keys in a validator? Or something else? Whatever the root concern is, what are the boundaries?

It seems fruitless to debate whether 1024 bits is sufficient if there's no real cost to just choosing (say) 4096 bits and avoiding the discussion.


Joe
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to