On 10/01/2010 11:58 AM, Stefan Fritsch wrote: > 1024 bits are more than enough to satisfy the security expectations of > an auto-generated "snake-oil" key for the life time of squeeze.
The key is not snake-oil. The X.509 *certificate* is snake-oil, what with being self-signed and all. A perfectly reasonable use case is to use the system's pre-generated key to create a certreq to send to an external (or internal) certificate authority. > 512 > bits were factored in 1999, 768 bits were factored in 2009. So, expect > another 5-10 years for 1024. I certainly hope your prediction turns out to be correct. Nonetheless, all of the RSA-relevant publications referenced on http://keylength.com/ recommend a keylength longer than 1024 if you want the key to be sufficient protection through 2012 (when squeeze systems will almost certainly still be in use). > If an ssl-cert upload is necessary for squeeze for other reasons, I > will change it. Otherwise it will have to wait for wheezy. Thanks for taking it under consideration. i'm not trying to cause pointless churn, i just think our defaults should be to create keys that will be considered secure at least for the expected lifetime of the release. Regards, --dkg
signature.asc
Description: OpenPGP digital signature