On 24 Apr 2009, at 22:18, Paul Hoffman wrote:

If there is a practical limit to key size due to concerns about peoples' validators running out of steam, then I think it needs to be stated clearly. Otherwise as a zone administrator my instinct will be to use keys that are as large as possible, since the costs incurred by doing so are going to be borne by other people and all I see is benefit (in the form of increased comfort level and a better story for upper management, even if there is no practical improvement in security).

That's certainly your option. Another option is to listen to cryptographers about what is possible with a reasonable amount of money and time, and stop there.

My point is that given the choice between "doing what is currently considered safe" and "exceeding what is currently considered safe by a factor of four with no additional cost to you" I think many otherwise uninformed zone administrators are conditioned to choose the latter.

On the flip side, how can the "real cost" for validator-operators that you assert be quantified?

Exactly.

So your point is that you don't know how to quantify it?

I have a hand in running a couple of non-validating resolvers for a local ISP. 35,000 customers are served by two machines running BIND 9.5.x on FreeBSD 7.1, and the CPUs are 96% idle at peak load. That's a fair amount of headroom, even ignoring the fact that the ISP in question is in the process of replacing each machine with an ECMP/OSPF cluster of two machines in order to simplify ad-hoc maintenance.

I'm not arguing about the assertion that there is a limit to what validators can tolerate. However, it seems reasonable to ask if it's the kind of limit that we need to worry about, and not, the kind of limit that is always going to fit in that headroom as validator hardware gets upgraded on a typical cycle and DNSSEC deployment proceeds over time.

How will you know? Why not stop when enough is enough?

Because there's no incentive for a zone administrator to choose anything other than the largest key her tools let her create. So what is "enough"?


Joe
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to