On Fri, Dec 4, 2020 at 12:39 PM Benjamin Kaduk <[email protected]> wrote:

> Hi Ondřej,
>
> In a similar vein, you said something about the 32-bit timestamp being wide
> enough to prevent brute-force attacks.  Could you say a bit more about what
> attacks those are that are being prevented?  I'm not really seeing how the
> width of the timestamp comes into play for that concern, just from a quick
> skim of the document.  (Timestamps tend to not provide much protection
> against brute force by themselves, since time is relatively guessable,
> especially to seconds precision.)
>

I think the timestamp being used as input to the hash provides a particular
protection to brute forcing.
Since the output (hash) is a function of the input, this means that any
attempt to brute force some other element which is an input to the hash,
will be constrained by an element over which the attacker has no control.

The timestamp is a monotonically increasing (modulo 32) value, which
changes every second.
This places a time window for a brute force attack, to be of a 1 second
duration.
Alternatively, it can be considered as increasing the entropy, meaning the
brute force attempt would need to include all potential values of the
timestamp over the cookie lifetime.
I believe the 30 minutes or 1 hour lifetime adds enough entropy to
significantly increase the work required for a brute force attack.

I don't think the absolute size of the timestamp value (in bits) plays any
part here.

Brian Dickson
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to