Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Please support EdDSA certificates #3649

Closed
Darkspirit opened this issue Apr 16, 2018 · 13 comments
Closed

Please support EdDSA certificates #3649

Darkspirit opened this issue Apr 16, 2018 · 13 comments

Comments

@Darkspirit
Copy link

Darkspirit commented Apr 16, 2018

https://datatracker.ietf.org/doc/draft-ietf-curdle-pkix/?include_text=1

And thank you for Let's Encrypt in general!

@jsha
Copy link
Contributor

jsha commented Apr 16, 2018

Sorry, the doc you linked is still a draft. We won't be issuing EdDSA certificates until they're fully standardized and we do a review of dependencies and the relevant documents that govern issuance.

@jsha jsha closed this as completed Apr 16, 2018
@Darkspirit
Copy link
Author

https://tools.ietf.org/html/rfc8410 🎉
Please reopen ;)

@tdelmas
Copy link

tdelmas commented Oct 11, 2018

@jsha ping?

@jrchamp
Copy link

jrchamp commented Oct 15, 2018

I asked the same question somewhere else and the answer I received back was "CA/B Forum does not allow EdDSA as part of the Baseline Requirements yet". Unfortunately, I don't know where to find updated information on when EdDSA will be in the BR.

@tdelmas
Copy link

tdelmas commented Oct 15, 2018

@James-E-A
Copy link

James-E-A commented Oct 30, 2018

I found https://community.letsencrypt.org/t/support-ed25519-and-ed448/69868

From that post at the bottom of the thread (authoritative necro by moderator just last Tuesday), we're allegedly just waiting on

for LE to be able to sign certs based on the new curve, right?

@tdelmas
Copy link

tdelmas commented Oct 30, 2018

@JamesTheAwesomeDude the last part of the message is a blocking point too:

Note that we won’t be able to generate Ed25519 intermediate certificates until / unless our HSM vendor releases firmware supporting them.

@lilyanatia
Copy link

lack of an intermediate doesn't block supporting end entity certificates, as the current status of ECDSA shows.

@jsha
Copy link
Contributor

jsha commented Oct 30, 2018

Please consolidate the conversation over on the forum. Thanks!

@jrchamp
Copy link

jrchamp commented Jan 11, 2023

The forum thread has been locked for over two years and the discussion has been silent for over four. I'm starting to worry that there's a conspiracy to prevent EdDSA from being allowed for public certificates. Instead of "here's what Let's Encrypt is doing to make this happen", it's been "here's why we can't make it happen, so it's time to close or lock the thread". I don't want to believe that the EFF is being silenced by the federal government, but the completely stalled progress and silence on the matter is suspicious.

@Darkspirit
Copy link
Author

I wouldn't file this feature request again today, it's okay that it has been closed. Personally I try to avoid Ed25519, P-256, RSA below 4096 bits and think we should focus on using P-384 certificates for S/MIME and TLS (and maybe Ed448 if browser engine and mail app developers have found reasons to think that the effort could be worth it, so no need to hurry).

@lilyanatia
Copy link

Personally I try to avoid Ed25519, P-256, RSA below 4096 bits and think we should focus on using P-384 certificates for S/MIME and TLS (and maybe Ed448 if browser engine and mail app developers have found reasons to think that the effort could be worth it, so no need to hurry).

why? the only reason to avoid Ed25519 or P-256 is if you're worried about quantum computers, and that affects ECDSA, EdDSA, and RSA at any key size. there's just enough suspicion around the NIST curves to prefer Ed25519 and Ed448 over P-256 and P-384 whenever possible. RSA at any acceptable key size is just way too slow to be practical.

also, P-384 is abysmally slow in OpenSSL, even slower than 2048-bit RSA:

sign/s
P-256 16159.3
Ed25519 10395.9
Ed448 1687.4
RSA 2048 613.0
P-384 508.2
RSA 3072 202.9
RSA 4096 104.3

@lmamane
Copy link

lmamane commented Jan 12, 2023

there's just enough suspicion around the NIST curves to prefer Ed25519 and Ed448 over P-256 and P-384 whenever possible.

Exactly. That.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants