[145357] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Root Zone DNSSEC Deployment Technical Status Update

daemon@ATHENA.MIT.EDU (Steven Bellovin)
Sun Jul 18 10:21:41 2010

From: Steven Bellovin <smb@cs.columbia.edu>
In-Reply-To: <AANLkTinPUgBf41nZacjdhPf5CmsqxFPUx1x7xMj5At79@mail.gmail.com>
Date: Sun, 18 Jul 2010 07:19:18 -0400
Cc: Paul Wouters <paul@xelerance.com>, "Perry E. Metzger" <perry@piermont.com>,
        cryptography@metzdowd.com
To: Taral <taralx@gmail.com>


On Jul 17, 2010, at 3:30 05PM, Taral wrote:

> On Sat, Jul 17, 2010 at 7:41 AM, Paul Wouters <paul@xelerance.com> =
wrote:
>>> Several are using old SHA-1 hashes...
>>=20
>> "old" ?
>=20
> "old" in that they are explicitly not recommended by the latest specs
> I was looking at.

DNSSEC signatures do not need to have a long lifetime; no one cares if, =
in 10 years, someone can find a preimage attack against today's signed =
zones.  This is unlike many other uses of digital signatures, where you =
may have to present evidence in court about what some did or did not =
sign.

It's also unclear to me what the actual deployment is of stronger =
algorithms, or of code that will do the right thing if multiple =
signatures are present.

		--Steve Bellovin, http://www.cs.columbia.edu/~smb





---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post