Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/22/2010 04:53 AM, Roy Arends wrote: On Feb 21, 2010, at 7:22 PM, Mark Andrews wrote: NSEC3 has a non zero false positive rate due to the fact that the names are hashed. Are you going on again about the possibility of hash collisions is

[DNSOP] I-D Action:draft-ietf-dnsop-dnssec-trust-history-01.txt

2010-02-22 Thread Internet-Drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Domain Name System Operations Working Group of the IETF. Title : DNSSEC Trust Anchor History Service Author(s) : W. Wijngaards, O. Kolkman

[DNSOP] I-D Action:draft-ietf-dnsop-dnssec-trust-history-00.txt

2010-02-22 Thread Internet-Drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Domain Name System Operations Working Group of the IETF. Title : DNSSEC Trust Anchor History Service Author(s) : W. Wijngaards, O. Kolkman

Re: [DNSOP] I-D Action:draft-ietf-dnsop-dnssec-trust-history-01.txt

2010-02-22 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, The dnsop wg adopted this draft at the IETF meeting and with discussion on the mailing list afterwards. The draft-ietf-dnsop-dnssec-trust-history-00 is a copy of draft-wijngaards-dnsop-trust-history-02. draft-ietf-dnsop-dnssec-trust-history-01

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Roy Arends
On Feb 22, 2010, at 4:44 AM, W.C.A. Wijngaards wrote: On 02/22/2010 04:53 AM, Roy Arends wrote: On Feb 21, 2010, at 7:22 PM, Mark Andrews wrote: NSEC3 has a non zero false positive rate due to the fact that the names are hashed. Are you going on again about the possibility of hash

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread W.C.A. Wijngaards
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Roy, On 02/22/2010 02:14 PM, Roy Arends wrote: Nah, we love collisions, it makes it all so more efficient. Besides, I think the probability of finding a bug in authoritative server software is way higher than a hash-collision. Yes, I agree

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Alex Bligh
--On 22 February 2010 14:41:19 +0100 W.C.A. Wijngaards wou...@nlnetlabs.nl wrote: I am not saying this makes NSEC3 a unchoosable option; but it is a tradeoff, and if you can use NSEC because you do not need the benefits of NSEC3, you should, because it'll drive down bandwidth and cpu usage

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Evan Hunt
Using NSEC instead of NSEC3 because you fear SHA1 collisions does not seem sensible, as if you fear SHA1 collisions, you have other more significant problems with DNSSEC to worry about, and thus this is not, in my opinion, reasonable. And it isn't sensible to suggest users worry about it. If

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Edward Lewis
At 11:17 -0500 2/22/10, Matt Larson wrote: +1, total and complete agreement. I am adamantly opposed to including any text about SHA1 hash collisions in an NSEC3 context. I'll agree. We are using NSEC in dotUS and not NSEC3. It wasn't because of the risk of hash collisions in SHA1. We

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Roy Arends
On Feb 22, 2010, at 11:12 AM, Evan Hunt wrote: Using NSEC instead of NSEC3 because you fear SHA1 collisions does not seem sensible, as if you fear SHA1 collisions, you have other more significant problems with DNSSEC to worry about, and thus this is not, in my opinion, reasonable. And it

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Eric Rescorla
On Mon, Feb 22, 2010 at 8:52 AM, Roy Arends r...@dnss.ec wrote: On Feb 22, 2010, at 11:12 AM, Evan Hunt wrote: Using NSEC instead of NSEC3 because you fear SHA1 collisions does not seem sensible, as if you fear SHA1 collisions, you have other more significant problems with DNSSEC to worry

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Evan Hunt
This is absurd. If we're going to do this, I'd like the security considerations to reflect all of the non-zero probabilities of errors occuring (those that have a higher probability). I just answered this point in private mail to someone else, failing to realize until after I'd sent it that it

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Todd Glassey
--- SNIP --- Precisely. I realize it's hard to grasp precisely how small the statistical chances of a collision are, but they are just unbelievably small. Acting as if it is something that might actually happen just makes you look silly. Actually Erik ... the problem isn't the

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Eric Rescorla
On Mon, Feb 22, 2010 at 9:23 AM, Evan Hunt e...@isc.org wrote: This is absurd. If we're going to do this, I'd like the security considerations to reflect all of the non-zero probabilities of errors occuring (those that have a higher probability). I just answered this point in private mail to

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Roy Arends
On Feb 22, 2010, at 12:23 PM, Evan Hunt wrote: This is absurd. If we're going to do this, I'd like the security considerations to reflect all of the non-zero probabilities of errors occuring (those that have a higher probability). My point is not to say that hash collisions are a problem or

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Alex Bligh
--On 22 February 2010 09:05:47 -0800 Eric Rescorla e...@rtfm.com wrote: On Mon, Feb 22, 2010 at 8:52 AM, Roy Arends r...@dnss.ec wrote: On Feb 22, 2010, at 11:12 AM, Evan Hunt wrote: Alex Bligh wrote: Using NSEC instead of NSEC3 because you fear SHA1 collisions does not seem sensible ...

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Mark Andrews
In message 699b9362-b927-4148-b79e-2aeb6d713...@dnss.ec, Roy Arends writes: On Feb 22, 2010, at 4:44 AM, W.C.A. Wijngaards wrote: On 02/22/2010 04:53 AM, Roy Arends wrote: On Feb 21, 2010, at 7:22 PM, Mark Andrews wrote: NSEC3 has a non zero false positive rate due to the fact that

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Mark Andrews
In message fd83b7a9-583c-4e6c-9301-414d043db...@dnss.ec, Roy Arends writes: On Feb 22, 2010, at 11:12 AM, Evan Hunt wrote: Using NSEC instead of NSEC3 because you fear SHA1 collisions does not seem sensible, as if you fear SHA1 collisions, you have other more significant problems with

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Andrew Sullivan
On 2010-02-22, at 19:13, Mark Andrews ma...@isc.org wrote: The problem is that one is using a hash, not the strength of the hash. Precisely. See another remark in this thread about excluded middle and so on. -- Andrew Sullivan a...@shinkuro.com

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Mark Andrews
In message 222b7737-d294-4ef1-9f14-de4ca4c70...@dnss.ec, Roy Arends writes: On Feb 22, 2010, at 6:41 PM, Mark Andrews wrote: =20 The real problem is that a SHA1 hash collision would render all = signatures wi th RSASHA1 vulnerable. Haven't heard you about that.=20 =20 Hogwash. A

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Alex Bligh
--On 23 February 2010 11:06:50 +1100 Mark Andrews ma...@isc.org wrote: Drunk Sysadmins, Rouge Registrar, etc, etc. I'm sure that it will be a very large section. Apart from the slightly higher risk of software bugs because NSEC3 is more complicated. The other items have no impact of the

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Doug Barton
On 02/22/10 11:59, Evan Hunt wrote: Note that RFC 5155 takes the time to put the issue to rest not once but twice: I am on the fence regarding the necessity of mentioning the hash collision issue in 4641bis. While other potential security concerns are not directly relevant to the topic, this

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Florian Weimer
* Olaf Kolkman: 5.3.3. NSEC3 Salt The salt with NSEC3 is not used to increase the work required by an attacker attacking multiple domains, but as a method to enable creating a new set of hash values if at some point that might be required. The salt is used as a roll over. The

Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

2010-02-22 Thread Florian Weimer
* Roy Arends: So, a collision (that is nothing more than a collision) is a problem for NSEC3, but not for RSASHA1? You still need a collision over somewhat structured data. Chosen-prefix collisions (with different prefixes) are likely not *that* far away after that, and those break RSASHA1