Hi Stephen,

Thanks for the clues.

On 9-Oct-2006, at 09:29, Stephen Kent wrote:

As Robert noted, in the long run we can transition to EC DSA when we feel to need for bigger (equivalent) key sizes. That's what folks are doing in general, as an alternative to very big RSA keys.

Re-reading the document, I think I might have mis-read the text in the first place. Section 3.8 says:

   This field specifies the subject's public key and the algorithm with
   which the key is used.  The public key algorithm MUST be RSA, and,
   accordingly, the OID for the algorithm is 1.2.840.113549.1.1.1.  A
   minimum key size of 1024 bits is mandated in this profile.  In the
   context of certifying resources it is recommended that certificates
   that are intended to be used as root certificates, and their
   immediate subordinates SHOULD use a key size of 2048 bits.
   Subordinates of these subordinate certificates, in the context of
   continued level of high trust, SHOULD use a key size of 2048 bits.

   In the application of this profile to certification of public number
   resources, it would be consistent with this recommendation that the
   Regional Internet Registries used a key size of 2048 bits, and that
   their immediate subordinate certificate authorities also use a key
   size of 2048 bits.  All other subordinate certificates MAY use a key
   size of 1024 bits.

So, in fact, for general use it is a minimum that is recommended (1024 bits), not an absolute, and where an absolute number is quoted it's for RIRs and LIRs, and even then a SHOULD rather than a MUST.

Your comments above though (and Rob's comments earlier) make me wonder about the hard requirement that the algorithm MUST be RSA, though. Seems to me that a future transition to a different algorithm would require a new document to be issued which updates this one. Perhaps that's a feature.


Joe

_______________________________________________
Sidr mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/sidr

Reply via email to