* Paul Hoffman [2015-03-24 13:57]: > On Mar 23, 2015, at 6:23 PM, Jan Včelák <jan.vce...@nic.cz> wrote: >>> - The statement about NSEC3 "offline dictionary attacks are still possible >>> and have been demonstrated" doesn't take into account trivial changes that >>> an operator can choose to take if they are really concerned about offline >>> dictionary enumeration (with the trade-off being zone size). >> >> Please, can you clarify which trivial solution in particular do you mean? > > Sure. When signing the zone, instead of creating one NSEC3 record for a gap, > you create 10 or 100 with random intervals between the two hashes. That way > an attacker is more likely to get results that will not match dictionary > entries.
This slows down the online hash collection but not the offline dictionary enumeration. The attacker will have to send 10 or 100 times as many queries (which of course the server administrator pays by having to send 10 or 100 times as many negative responses). In the offline attack, the performance is dominated by the effort for hashing the input dictionary. Whether you're matching the output against 1000 or 100000 hash values has little influence on the total performance. Regards, Matt
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop