Plesk for Linux
kb: how-to
ABT: Group A
Applicable to:
- Plesk for Linux
Question
What are the recommended settings for ECDSA keys in Plesk DNSSEC extension?
Answer
It is recommended to use ECDSA with 256-bit key (curve P-256) for both KSK (Key Signing Key) and ZSK (Zone Signing Key):
For more information, check NIST SP 800-57.
Comments
3 comments
Don't these key lengths refer to the more traditional algorithms such as RSASHA256? Wasn't it the case that the benefit of ECDSA is that you can use shorter keys and signatures (see e.g., http://dx.doi.org/10.5121/ijesa.2015.5202)?
Another interesting hint: https://labs.apnic.net/?p=544
Thank you for the feedback. We will discuss your points with our developers and will update the article if necessary.
Hello,
Here is the detailed answer:
The following ECDSA algorithms can be used with DNSSEC:
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml
Definitions of this algorithms and considerations about key sizes are described in the RFC mentioned above:
https://tools.ietf.org/html/rfc6605 - Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
So, possible key sizes are:
Also it is said that ECDSA with 256-bit keys has an approximate equivalent strength to RSA with 3072-bit keys.
Let's look on RSA algorithms which can be used with DNSSEC:
https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml
https://tools.ietf.org/html/rfc5702 - Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC
According to NIST SP 800-57:
Conclusion
It is impossible to use ECDSA with 1024-bit or 2048-bit keys for DNSSEC.
We recommend to use ECDSA with 256-bit key (curve P-256) for both KSK (Key Signing Key) and ZSK (Zone Signing Key).
Please leave a comment if you have additional questions.
Please sign in to leave a comment.