In message <222b7737-d294-4ef1-9f14-de4ca4c70...@dnss.ec>, Roy Arends writes:
> On Feb 22, 2010, at 6:41 PM, Mark Andrews wrote:
> 
> >=20
> >> The real problem is that a SHA1 hash collision would render all =
> signatures wi
> >> th RSASHA1 vulnerable. Haven't heard you about that.=20
> >=20
> > Hogwash.  A collision is nothing more than a collision.  See above.
> 
> So, a collision (that is nothing more than a collision) is a problem for =
> NSEC3, but not for RSASHA1?

What matters is how the collision came about not that there is a
collision.  Just because something is extremely unlikely doesn't
mean that it won't happen or that the process is broken.

SHA1 being broken implies that collisions will happen more often.
Seeing a collision doesn't imply that SHA1 is broken.

> > For a zone with 30 million names the false positive rate is roughly
> > 1 in 32^32/(3*10^7) (1/48716721244363430606789494423876100655197)
> > queries.  Around 40 9's.
> 
> I agree, approximately, a probability of 1 in 2^135.
> 
> >> I suggest that if you and Andrews want to have this claim rfc4641bis, =
> you sho
> >> uld not discriminate on NSEC3, but on everything that uses SHA1.
> >>=20
> >>> (resign
> >>> with a new salt, and also keep that 2-second update guarantee? - I =
> would
> >>> suggest some weasel words in agreements).
> >>=20
> >> Nah, we love collisions, it makes it all so more efficient.
> >>=20
> >> Besides, I think=20
> >> the probability of finding a bug in authoritative server software is =
> way high
> >> er than a hash-collision.
> >=20
> > Indeed.  But you would expect us to fix the bug once it was found. :-)
> 
> I used to. Not anymore.
> 
> See =
> https://www.isc.org/community/blog/201002/surprise-bugs-and-release-schedu=
> les
> 
> Roy=
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: ma...@isc.org
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to