Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.

Evan Hunt <each@isc.org> Mon, 22 February 2010 20:01 UTC

Return-Path: <each@isc.org>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B481E28C154 for <dnsop@core3.amsl.com>; Mon, 22 Feb 2010 12:01:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.933
X-Spam-Level:
X-Spam-Status: No, score=-5.933 tagged_above=-999 required=5 tests=[AWL=0.667, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M87A3KbxS779 for <dnsop@core3.amsl.com>; Mon, 22 Feb 2010 12:01:29 -0800 (PST)
Received: from farside.isc.org (farside.isc.org [204.152.187.5]) by core3.amsl.com (Postfix) with ESMTP id 56FB528C395 for <dnsop@ietf.org>; Mon, 22 Feb 2010 12:01:21 -0800 (PST)
Received: by farside.isc.org (Postfix, from userid 10292) id A4B84E60B4; Mon, 22 Feb 2010 19:59:38 +0000 (UTC)
Date: Mon, 22 Feb 2010 19:59:38 +0000
From: Evan Hunt <each@isc.org>
To: Roy Arends <roy@dnss.ec>
Message-ID: <20100222195938.GA13437@isc.org>
References: <201002220022.o1M0M3qR048760@drugs.dv.isc.org> <A8EB3AAE-0DA6-4C4E-B2D1-E548884F63D5@dnss.ec> <4B8251E9.70904@nlnetlabs.nl> <699B9362-B927-4148-B79E-2AEB6D713BE8@dnss.ec> <4B82897F.7080000@nlnetlabs.nl> <9C97F5BFBD540A6242622CC7@Ximines.local> <20100222161251.GA99592@isc.org> <FD83B7A9-583C-4E6C-9301-414D043DBB08@dnss.ec> <20100222172325.GC99592@isc.org> <EC6B9B3F-4849-403D-B533-8CE6114575EA@dnss.ec>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <EC6B9B3F-4849-403D-B533-8CE6114575EA@dnss.ec>
User-Agent: Mutt/1.4.2.3i
Cc: dnsop@ietf.org, Alex Bligh <alex@alex.org.uk>, "W.C.A. Wijngaards" <wouter@NLnetLabs.nl>
Subject: Re: [DNSOP] rfc4641bis: NSEC vs NSEC3.
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Feb 2010 20:01:30 -0000

> I have not seen anyone make a statement "NSEC3 is exactly as good as NSEC".
> 
> I've seen the opposite by Mark Andrews:
> 
>   "Actually NSEC is technically better at proving non-existance."

Mark was responding to an assertion to the contrary ("one is NOT better
than the other") by making a boundary-condition quibble.  I'm not sure
whether he was arguing that the quibble should be noted in the draft
or merely being pedantic, so I won't speak for him, but I personally
think precision is a worthwhile goal here.

Note that RFC 5155 takes the time to put the issue to rest not once but
twice:

    Note that with the hash algorithm specified in this document,
    SHA-1, such collisions are highly unlikely.

    Hash collisions between QNAME and the owner name of an NSEC3 RR
    may occur.  When they do, it will be impossible to prove the
    non- existence of the colliding QNAME.  However, with SHA-1,
    this is highly unlikely (on the order of 1 in 2^160).  Note that
    DNSSEC already relies on the presumption that a cryptographic
    hash function is second pre-image resistant, since these hash
    functions are used for generating and validating signatures and
    DS RRs.

... so I don't understand why 4641bis should not do so even once.  (But
this conversation has already taken more time than the probability of a
random collision really merits, so whatever.)

-- 
Evan Hunt -- each@isc.org
Internet Systems Consortium, Inc.