On Tue, Jun 05, 2018 at 09:02:07PM +0200, Ondřej Surý wrote:
> Could I ask for more reviews, so we can progress this document forward?
>
A couple of quick comments:
1. Perhaps it might not be clear to all readers whether the
table in Section 3.1 is *software* implementation advice or
operational deployment advice?
Seeing that Ed25519 is RECOMMENDED for signing makes me think that
this software implementation advice, since signing zones with
Ed25519 seems presently premature.
2. I see that RSA-SHA512 (algorithm 10) is not recommended for
signing, and indeed it is not very widely deployed. Out of
~7.6 million signed domains I see ~72k with algorithm 10 ZSKs
and KSKs, while algorithm 8 is used by ~3.6 million domains in
KSKs and ZSKs (a ratio of 50:1 for alg 8 : alg 10).
And yet, while it is not popular I don't see that any validators
supporting RSA and SHA256 are at all likely not to support RSA
and SHA512. And furthermore, on 64-bit systems SHA512 tends
to be somewhat faster (more with larger input sizes), because
it processes input in 64-bit blocks. On my x86_64 laptop,
running OpenSSL 1.1.1 beta 'speed -evp', gives:
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384
bytes
sha256 39497.53k 114122.11k 266197.16k 395693.40k 461698.39k
469658.28k
sha512 30863.64k 122424.60k 278926.37k 495961.09k 643754.67k
654338.73k
So I am not sure that algorithm 10 warrants discouragement so
long as 8 is required. Everyone is going to have both, and
they're basically the same... While the case *for* 10 is not
strong, the case against 10 looks somewhat weak (does supporting
10 for signing carry a real cost?)
--
Viktor.
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop