On 29 Sep 2015, at 22:32, Mukund Sivaraman wrote:
>> The Security Considerations section should say more about the >> limitations of this approach, e.g. the ability of an off-path attacker >> to correct for changes that would change a checksum with other changes >> that will restore it, which is my lazy précis of the no-doubt more >> succinct observation that Vixie made somewhere in this thread (or >> another thread near it). > > I didn't understand this part. Candidate checksum algorithms will have > to be one-way cryptographic hash functions, and they will automatically > take care of this. Any hash function is susceptible to collisions; this is surely a simple truism based on the mapping of an M-bit message to an N-bit digest where usually M >> N. If I can alter a message in such a way that the digest remains the same, I can defeat the checksum. Surely the threat models here depend on the algorithm. I am no cryptographer, but it seems reasonable to mention the characteristics of the hash function that are important to minimise the risk of this kind of attack, especially when there are other motivations in choosing an algorithm (such as the speed at which it can be calculated) that might weaken the mechanism. To choose an extreme example, it seems likely that choosing to calculate a parity bit would be much computationally cheaper than calculating a SHA-256 digest. However, a parity bit would not offer much protection against off-path attacks. Joe
signature.asc
Description: OpenPGP digital signature
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop