[dns-operations] .NL and 1024-bit RSA ZSKs.
Viktor Dukhovni
ietf-dane at dukhovni.org
Fri Oct 8 17:51:34 UTC 2021
> On 8 Oct 2021, at 1:12 pm, Puneet Sood via dns-operations <dns-operations at dns-oarc.net> wrote:
>
> This is another case where NSEC3 opt-out interferes with effective
> NSEC{3} response caching which would reduce queries to the TLD.
Speaking of the .NL zone DNSSEC parameters, the ZSK is 1024-bit RSA,
and .NL is the largest zone (by signed delegation count) with RSA
keys less than 1280 bits.
The .COM TLD uses 1280-bit RSA ZSKs, while .BR, .CZ, .CH, .FR and .DK
all use ECDSA P256.
The next batch of TLDs with 1024-bit RSA ZSKs are .EU, .NO, .BE and .ORG.
While we don't have compelling evidence that 1024-bit RSA DNSKEYs,
rotated sufficiently often are at a realistic risk of brute-force
cryptanalytic attacks, the broader cryptographic community has
left 1024-bit RSA behind, and we now have better options:
* 1280-bit RSA is practical and improves the safety margin
* P256 has been successfully adopted by 45 TLDs and has
near universal resolver support, on par with RSA.
So I'd like to suggest that .NL consider either a stronger ZSK,
or an algorithm rollover.
Not all is stuck in the past, over the last ~1 year, the use of
algorithm 7 has dropped from a peak of ~2.2 million zones to
just ~350k zones and lately continuing to fall ~10k/day.
So progress is possible, it just does not happen on all fronts
at the same time.
For those not yet caught up on last-night's OARC "Town Square"
Mattermost channel, it would be good to have auth operators
look more closely at their use of RSA and as needed move to a
set of best-practice key algorithms/sizes.
RSA: 2048-bit KSK, 1280 or 1536-bit ZSK
P256: Fortunately no further tunables
The only potential tweak in ECDSA is whether signatures use
a random nonce, or a deterministic variant that derives the
nonce from the message:
https://datatracker.ietf.org/doc/html/rfc6979
Deterministic ECDSA signing should be well suited for
zone signing when the software stack supports it, and
can be more performant if the RNG is a bottleneck.
[ I don't know which HSMs, if any, support deterministic
ECDSA signing. ]
--
Viktor.
More information about the dns-operations
mailing list