[144951] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Possibly questionable security decisions in DNS root management

daemon@ATHENA.MIT.EDU (bmanning@vacation.karoshi.com)
Wed Oct 14 19:25:39 2009

Date: Wed, 14 Oct 2009 23:14:40 +0000
From: bmanning@vacation.karoshi.com
To: "Perry E. Metzger" <perry@piermont.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <87fx9l3989.fsf@snark.cb.piermont.com>

On Wed, Oct 14, 2009 at 06:24:06PM -0400, Perry E. Metzger wrote:
> 
> Ekr has a very good blog posting on what seems like a bad security
> decision being made by Verisign on management of the DNS root key.
> 
> http://www.educatedguesswork.org/2009/10/on_the_security_of_zsk_rollove.html
> 
> In summary, a decision is being made to use a "short lived" 1024 bit key
> for the signature because longer keys would result in excessively large
> DNS packets. However, such short keys are very likely crackable in short
> periods of time if the stakes are high enough -- and few keys in
> existence are this valuable.


	however - the VSGN proposal meets current NIST guidelines.

--bill


> 
> Perry
> -- 
> Perry E. Metzger		perry@piermont.com
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post