Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

Roy Arends <roy@dnss.ec> Mon, 22 February 2010 17:57 UTC

Return-Path: <roy@dnss.ec>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 51A5128C0EA for <dnsop@core3.amsl.com>; Mon, 22 Feb 2010 09:57:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.041
X-Spam-Level:
X-Spam-Status: No, score=-2.041 tagged_above=-999 required=5 tests=[AWL=0.208, BAYES_00=-2.599, HELO_EQ_SE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RZjAurcOEuRv for <dnsop@core3.amsl.com>; Mon, 22 Feb 2010 09:57:54 -0800 (PST)
Received: from mail.schlyter.se (trinitario.schlyter.se [195.47.254.10]) by core3.amsl.com (Postfix) with ESMTP id 72BAE28C18F for <dnsop@ietf.org>; Mon, 22 Feb 2010 09:57:54 -0800 (PST)
Received: from [192.168.1.2] (unknown [201.238.167.194]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: roy) by mail.schlyter.se (Postfix) with ESMTPSA id 490C92D4AD; Mon, 22 Feb 2010 18:59:49 +0100 (MET)
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset="us-ascii"
From: Roy Arends <roy@dnss.ec>
In-Reply-To: <20100222172325.GC99592@isc.org>
Date: Mon, 22 Feb 2010 12:59:45 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <EC6B9B3F-4849-403D-B533-8CE6114575EA@dnss.ec>
References: <4B807DC0.9050807@ogud.com> <315AD36E-879A-4512-A6A8-B64372E3D3CF@sinodun.com> <201002220022.o1M0M3qR048760@drugs.dv.isc.org> <A8EB3AAE-0DA6-4C4E-B2D1-E548884F63D5@dnss.ec> <4B8251E9.70904@nlnetlabs.nl> <699B9362-B927-4148-B79E-2AEB6D713BE8@dnss.ec> <4B82897F.7080000@nlnetlabs.nl> <9C97F5BFBD540A6242622CC7@Ximines.local> <20100222161251.GA99592@isc.org> <FD83B7A9-583C-4E6C-9301-414D043DBB08@dnss.ec> <20100222172325.GC99592@isc.org>
To: Evan Hunt <each@isc.org>
X-Mailer: Apple Mail (2.1077)
Cc: dnsop@ietf.org, Alex Bligh <alex@alex.org.uk>, "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
Subject: Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2010 17:57:55 -0000

On Feb 22, 2010, at 12:23 PM, Evan Hunt wrote:

>> This is absurd. If we're going to do this, I'd like the security
>> considerations to reflect all of the non-zero probabilities of errors
>> occuring (those that have a higher probability).
> 
> My point is not to say that hash collisions are a problem or that NSEC3 is
> a poor choice.  My point is that it's bad form to make mathematically false
> statements--even if they're *almost completely* true--and especially so
> when you get anywhere near cryptographers.
> 
> "NSEC3 is exactly as good as NSEC" is a mathematical statement.  It's very,
> very close to true, but in math that still makes it false.  "NSEC3 is as
> good as NSEC except under conditions so fantastically improbable that it's
> safe to ignore them" is a few more words, but has the benefit of actually
> being *true*, and I think that's what the draft should say.

I have not seen anyone make a statement "NSEC3 is exactly as good as NSEC".

I've seen the opposite by Mark Andrews:

  "Actually NSEC is technically better at proving non-existance."

Which he bases on the possibility of hash-collisions without noting the 'fantastical improbability' of hash-collisions. If one considers hash-collisions probable enough to add it to a security section, it needs a discussion of the _impact_ of a hash-collision on proving (non-)existence (which I've demonstrated is negligible), but also discuss it in the presence of RSASHA1 signature algorithms. And I wasn't kidding in my last mail: If we are going to write that up in a security section, I think we need to consider more probable attack scenarios as well, don't you think? Otherwise, you'd have a section that is "very, very close to true, but in math that still makes it false.", especially so when you get anywhere near security-folk.

Roy