On Jul 27, 2008, at 3:48 AM, Martin Schütte wrote:

[EMAIL PROTECTED] schrieb:
The specification supports only DSA, which means it can't be used with
certificates most folks already have (or can most easily obtain from
any CA). Was this an intentional design decision? If so, I'd like to
hear some background for it...

The DSS (FIPS 186-2, 
http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf)
consists of three signature algorithms and covers DSA, RSA and ECDSA.

I would suggest to use these three for syslog-sign.

Well, the reason it's DSA is that the size of a DSA signature is proportional to the size of the hash function rather than the key. At the time John Kelsey did the first protocol, we were talking about DSA with SHA-1. Now, of course, there are more options.

Nonetheless, if you're going to do syslog-sign over udp, there's a real need to keep the signatures small.

That is why it is DSA. It's also why the encoding is the OpenPGP encoding, and not DER. It's all to keep things as tight as possible.

Obviously, if you're going to do it over TCP, or even TLS, the tightness is not needed as much. However, it's still nice to have a protocol that is parsimonious on data. I think ECDSA makes much more sense than RSA for it.

        Jon


_______________________________________________
Syslog mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/syslog

Reply via email to