Hi Joe On Wed, Sep 30, 2015 at 08:28:21AM -0400, Joe Abley wrote: > Surely the threat models here depend on the algorithm. I am no > cryptographer, but it seems reasonable to mention the characteristics > of the hash function that are important to minimise the risk of this > kind of attack, especially when there are other motivations in > choosing an algorithm (such as the speed at which it can be > calculated) that might weaken the mechanism.
In the git repository, Appendix A now mentions the characteristics of the hash function that are important to minimise the risk of this kind of attack. A text version of the current copy can be viewed here: http://users.isc.org/~muks/draft-muks-dnsop-dns-message-checksums.txt Mukund
pgpcdgxfo9ScO.pgp
Description: PGP signature
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop