Hi,

During the presentation of the draft in the Int area meeting there was quite a lot of feedback. First of all i would like to thank for so many constructive comments (this was an unusual experience for me at ietf :-) As i understood most folks thought that it was a good idea to enable multiple hash support in the CGAs and that the proposed approach for supporting it was acceptable.

As i recall there was only one comment left for further discussion (please if there was another issue for discussion let me know and i will address it in the ml). The open issue was Gabriel question about supporting multiple public key algorithms and in case that we want to do this, whether this needs to be done in this draft/registry.

As you know, draft-bagnulo-multiple-hash-cga-00 is proposing the creation of a registry for the Sec values, so that the hash function can be encoded in the address itself, in order to prevent the so-called downgrading attacks. The registry will also contain the associated Sec parameter value for the assigned value.

The question raised by Gab is, in case we want to support multiple public key algorithms, do we need to encode them in the address itself?

After discussing this with Gab, my understanding is that the public key algorithm does not need to be encoded in the address itself, since this is not required to prevent downgrading attacks that may sprig from using weaker public key algorithms (please Gab correct me if my understanding is inaccurate).

In order to support multiple public Key algorithms, it is enough to define a CGA extension that contains the public key algorithm used (and maybe the correspondent key) and to use it as an input to the hash, rather than encode in address bits. This is so, because a downgrading attack using an alternative (weaker) public key function is no different than an attack based on finding an alternative public key (using the same algorithm). In order to attack a CGA using an alternative (weaker) public key algorithm, the attacker needs to find a CGA parameter data structure which hash output collides with the target CGA. In order to do that the attacks will probably try with alternative modifiers rather than try with alternative pubic keys (since it is cheaper as the modifier can be any value and its generation is simply adding 1 to the previous value).

So, from this, it results that in order to prevent downgrading attacks only the hash function needs to be included in the address itself, and other information (including alternative public key algorithms) can be included as CGA extensions. So no modifications to the draft will be made in order to support alternative public key functions.

I hope this addresses the point raised in the meeting

Comments?

Regards, marcelo



_______________________________________________
Int-area mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/int-area

Reply via email to