Well, I think it is quite a simple trade-off. Increasing Sec increases 
computational effort on both sides by equal amount. Increasing the length of 
the hash increases computational effort only on the attacker side. As a result, 
the hash bits are relatively valuable.

The trade-off that we have in front of us is to choose between:

1) Status quo: RFC 4982 eats three bits for Sec, leaving 59 bits of hash length 
after accommodating for u and g bits as well. The good with this is that it 
leaves maximum size for hash. The bad is that it is less flexible for adding 
many new hash algorithms.

2) The proposed new approach: Eat a total of six bits, for Sec and the hash 
algorithm identifier. 56 bits remain. The good is that this gives more 
flexibility to allocate hash algorithms, including the ability to independently 
choose Sec and the algorithm. The bad is that the hash size is decreased.

FWIW, I'm personally in the camp that #1 is still the right approach. We've 
have 5 entries left:

http://www.iana.org/assignments/cga-message-types/cga-message-types.xml#cga-message-types-3

and even if we some day would run out, there would always be an opportunity to 
use the last bit combination (111) to denote that the algorithm value would be 
elsewhere in the address. I admit that my preferences are affected by my view 
that 59 bits is only borderline secure. So I wouldn't want to reduce it, if it 
can be avoided.

Jari

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to