[net-dns-users] DNSSEC algorithms 15 & 16?

Willem Toorop willem at nlnetlabs.nl
Thu Dec 7 11:04:21 UTC 2017


Oh... sorry.  Algorithm 15 might very well be possible with the
Crypt::Ed25519 module I suppose.  I'll have to check.  Ed448 is not yet
available to the perl world, or at least I could not find it.

Contributions providing these algorithms to Net::DNS::SEC are of course
welcomed ;)  I do maintain a few domains signed with algorithm 15 and 16
for testing purposes:

d2a15n3.rootcanary.net. and d2a16n3.rootcanary.net.

Besides a secure A rrset on
    secure.d2a15n3.rootcanary.net.
and secure.d2a16n3.rootcanary.net.

Both also contain an A rrset with mismatching signatures on:
    bogus.d2a15n3.rootcanary.net.
and bogus.d2a16n3.rootcanary.net.

Cheers,
-- Willem

Op 07-12-17 om 10:35 schreef Marco Davids (SIDN):
> Let me ask again:
> 
> On 24/10/2017 18:49, Wessels, Duane wrote:
> 
>> Any plans for adding algorithms 15 & 16 to Net::DNS::SEC yet?  
>>
>> The users of DNSSEC Debugger are starting to ask for it :-)
>>
>> DW
> 
> ;-)
> 
> --
> Marco
> 
> 
> 
> 
> _______________________________________________
> net-dns-users mailing list
> net-dns-users at nlnetlabs.nl
> https://www.nlnetlabs.nl/mailman/listinfo/net-dns-users
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.nlnetlabs.nl/pipermail/net-dns-users/attachments/20171207/888df520/attachment.bin>


More information about the net-dns-users mailing list