[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10324 [Tor]: Sign status documents with RSA2048



#10324: Sign status documents with RSA2048
-----------------------------+----------------------------
     Reporter:  ln5          |      Owner:
         Type:  enhancement  |     Status:  needs_revision
     Priority:  normal       |  Milestone:
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+----------------------------

Comment (by ioerror):

 What other modulus makes sense? What are the performance tradeoffs? That
 is 3072-bit RSA is current largest key in all of Tor - do we see
 considerable performance degradation if we use keys that are only that
 small? I'd be curious to see the OpenSSL bench for various authorities for
 1024, 2048, 3072 and 4096 bit keys.

 Might it also make sense to consider key size changes when rotating the
 long term identity keys? I'd like to rotate mine at some point, for
 example.

 Linus - if you'd like me to change keys size before mid-Feb, I should do
 it in the next ten days before CCC Congress.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10324#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs