[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10324 [Tor]: Sign status documents with RSA2048
#10324: Sign status documents with RSA2048
-----------------------------+----------------------------
Reporter: ln5 | Owner:
Type: enhancement | Status: needs_revision
Priority: normal | Milestone:
Component: Tor | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
-----------------------------+----------------------------
Comment (by ioerror):
What other modulus makes sense? What are the performance tradeoffs? That
is 3072-bit RSA is current largest key in all of Tor - do we see
considerable performance degradation if we use keys that are only that
small? I'd be curious to see the OpenSSL bench for various authorities for
1024, 2048, 3072 and 4096 bit keys.
Might it also make sense to consider key size changes when rotating the
long term identity keys? I'd like to rotate mine at some point, for
example.
Linus - if you'd like me to change keys size before mid-Feb, I should do
it in the next ten days before CCC Congress.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10324#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs