On Sat, Mar 19, 2016 at 4:04 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:

> [[ Dropping CURDLE because these discussions should only be in one WG ]]
>
>    ECDSAP256SHA256 and ECDSAP384SHA384 provide more strength for
>    signature size than RSASHA256 and RSASHA512 variants.  It is expected
>    to be raised to MUST once they have been deployed more widely for
>    DNSSEC Signing.  ECDSAP256SHA256 has seen raise in the deployment, so
>    it's set to MUST level for DNSSEC Validation.
>
> Even though I was a strong proponent of ECDSA, I think this is the wrong
> move. ECDSA has had many years to garner interest, and it hasn't. Within a
> year, we will have EDDSA in DNSSEC, and the operational crypto properties
> of EDDSA are noticeably better than those of ECDSA. It would be much better
> if the community just standardized on EDDSA instead of a mixture of the two
> algorithms. Proposal: drop them from this document. They will remain in the
> IANA registry, of course.
>
> --Paul Hoffman
>
> Paul for the record
There are tens of thousands of domains signed with ECDSAP256SHA256 world
wide.
ECDSA is currently the only viable algorithm for anyone that wants to do
OnLine signing in low latency environments.

There are significant issues related to deploying a new DNSSEC algorithm
world wide, most related to stuff actual operating environments. My current
best guess is that it takes about 5-10years after IETF standardizes new
algorithm, before the algorithm is globally "useful". We are still inside
the 5 year window, working out the issues in deploying new algorithms with
ECDSA can only help the algorithms that will follow.
I see no evidence of use of ECDSAP384SHA384 except in test setups, so I
have no problem not mentioning that  algorithm in the document.

Olafur
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to