(Thanks very much to everyone who gave an answer today! I just picked Brian's to reply to - but I really appreciate the helpful replies and thoughts.)
On Nov 29, 2011, at 10:12 AM, Brian Smith wrote:
> Paul Tiemann wrote:
>> "All CAs should stop issuing intermediate and end-entity certificates
>> with RSA key size smaller than 2048 bits."
>>
>>
https://wiki.mozilla.org/CA:MD5and1024
>>
>> I've heard that 2047 bits is equivalent to 2048 bits. Some platforms
>> (Cisco VPNs, IIS) sometimes generate 2047 bit RSA keys. If the
>> security is equivalent, can we accept these CSRs without forcing the
>> customer to go back and generate their keys again and hope for a 2048
>> bit output?
>
Yeah, I think it's that same issue.
> If so, then my understanding is that insisting on a 2048 bit key (vs 2047) is basically insisting that the 2048th bit to be one (1). I don't see how that is helpful.
+1
>> Should we modify the language to make allowance for those cases?
>
> Sure. Presumably, when we have an n-bit minimum limit for an RSA private key, we should allow keys of n-7 bits or more, up to the maximum limit we set, assuming n is a multiple of 8. This might not be appropriate for all algorithms though. It should be decided on an algorithm-by-algorithm basis.
>
> - Brian
I'd love it if the document said something like "RSA 2048 is required (understanding that 2047 bits is 2048 bit equivalent)" to allow for 2047, because I'd actually prefer to face unenlightened critics than to force customers to do meaningless supplicatory dances. The 2047 bit police (if any) deserve a little enlightenment, but the customers don't deserve the runaround.
Paul