[net-dns-users] DNSSEC algorithms 15 & 16?
Willem Toorop
willem at nlnetlabs.nl
Thu Dec 7 11:04:21 UTC 2017
Oh... sorry. Algorithm 15 might very well be possible with the
Crypt::Ed25519 module I suppose. I'll have to check. Ed448 is not yet
available to the perl world, or at least I could not find it.
Contributions providing these algorithms to Net::DNS::SEC are of course
welcomed ;) I do maintain a few domains signed with algorithm 15 and 16
for testing purposes:
d2a15n3.rootcanary.net. and d2a16n3.rootcanary.net.
Besides a secure A rrset on
secure.d2a15n3.rootcanary.net.
and secure.d2a16n3.rootcanary.net.
Both also contain an A rrset with mismatching signatures on:
bogus.d2a15n3.rootcanary.net.
and bogus.d2a16n3.rootcanary.net.
Cheers,
-- Willem
Op 07-12-17 om 10:35 schreef Marco Davids (SIDN):
> Let me ask again:
>
> On 24/10/2017 18:49, Wessels, Duane wrote:
>
>> Any plans for adding algorithms 15 & 16 to Net::DNS::SEC yet?
>>
>> The users of DNSSEC Debugger are starting to ask for it :-)
>>
>> DW
>
> ;-)
>
> --
> Marco
>
>
>
>
> _______________________________________________
> net-dns-users mailing list
> net-dns-users at nlnetlabs.nl
> https://www.nlnetlabs.nl/mailman/listinfo/net-dns-users
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.nlnetlabs.nl/pipermail/net-dns-users/attachments/20171207/888df520/attachment.bin>
More information about the net-dns-users
mailing list