Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

Roy Arends <roy@dnss.ec> Mon, 22 February 2010 13:12 UTC

Return-Path: <roy@dnss.ec>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8D6C228C2DE for <dnsop@core3.amsl.com>; Mon, 22 Feb 2010 05:12:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.416
X-Spam-Level:
X-Spam-Status: No, score=-1.416 tagged_above=-999 required=5 tests=[AWL=-0.833, BAYES_00=-2.599, HELO_EQ_SE=0.35, SARE_HTML_URI_LHOST31=1.666]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HqLi8zcCbFwz for <dnsop@core3.amsl.com>; Mon, 22 Feb 2010 05:12:39 -0800 (PST)
Received: from mail.schlyter.se (trinitario.schlyter.se [195.47.254.10]) by core3.amsl.com (Postfix) with ESMTP id 7B79D28C2DD for <dnsop@ietf.org>; Mon, 22 Feb 2010 05:12:38 -0800 (PST)
Received: from [192.168.1.2] (unknown [201.238.167.195]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: roy) by mail.schlyter.se (Postfix) with ESMTPSA id 5E5822D4AD; Mon, 22 Feb 2010 14:14:33 +0100 (MET)
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset="us-ascii"
From: Roy Arends <roy@dnss.ec>
In-Reply-To: <4B8251E9.70904@nlnetlabs.nl>
Date: Mon, 22 Feb 2010 08:14:25 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <699B9362-B927-4148-B79E-2AEB6D713BE8@dnss.ec>
References: <200904282021.n3SKL3sg051528@givry.fdupont.fr> <59A58419-FDBD-4810-B2FA-0D293FFA00A5@NLnetLabs.nl> <alpine.LFD.1.10.1001211245180.12114@newtla.xelerance.com> <1AEAE091-2EB3-41DC-A51B-8DD49C10FAD5@NLnetLabs.nl> <24C8A8E2A81760E31D4CDE4A@Ximines.local> <8E6C64ED-A336-4E8B-996F-9FB471EB07C6@NLnetLabs.nl> <4B7FE58C.5030605@ogud.com> <20100220202751.GB54720@shinkuro.com> <20100220213133.GE2477@isc.org> <4B807DC0.9050807@ogud.com> <315AD36E-879A-4512-A6A8-B64372E3D3CF@sinodun.com> <201002220022.o1M0M3qR048760@drugs.dv.isc.org> <A8EB3AAE-0DA6-4C4E-B2D1-E548884F63D5@dnss.ec> <4B8251E9.70904@nlnetlabs.nl>
To: "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
X-Mailer: Apple Mail (2.1077)
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2010 13:12:43 -0000

On Feb 22, 2010, at 4:44 AM, W.C.A. Wijngaards wrote:

> On 02/22/2010 04:53 AM, Roy Arends wrote:
>> On Feb 21, 2010, at 7:22 PM, Mark Andrews wrote:
>> 
>>> NSEC3
>>> has a non zero false positive rate due to the fact that the names
>>> are hashed.
>> 
>> Are you going on again about the possibility of hash collisions is SHA-1? 
> 
> Yes.  +1 for Marks point.
> 
> The deployment of NSEC3-signed toplevel domains is a giant hash
> collision test of typo dictionaries.

Not really, most (will) use Opt-Out.

> What does the registry do when
> someone registers a new domain name that has a hash-collision

We'll claim that sha-1 is broken, write a paper on it and have our 15 minutes of fame. Meanwhile... 

In the real world, if someone registers the name 759345ihkjgrj345837458fjfgiusifghgvtsrhf8hfvihi.co.uk and its hash collides with example.co.uk (lets skip the probability factor), than its just gotten a bit more efficient. One hash matching 2 names, i.e. we can now deny two names for the price of one. 

The real problem is that a SHA1 hash collision would render all signatures with RSASHA1 vulnerable. Haven't heard you about that. 

I suggest that if you and Andrews want to have this claim rfc4641bis, you should not discriminate on NSEC3, but on everything that uses SHA1.

> (resign
> with a new salt, and also keep that 2-second update guarantee? - I would
> suggest some weasel words in agreements).

Nah, we love collisions, it makes it all so more efficient. Besides, I think the probability of finding a bug in authoritative server software is way higher than a hash-collision.

> But I agree more pertinent to choice is the increased CPU demand and
> larger packets when using NSEC3.  And opt-out, obfuscation desiderata.

All FUD.

Roy