[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Crypto-based host identifiers
> > If i understnd correctly, you need the new registry, because in order
> > to avoid collisions, right? But a collision means that someone else
> > has the private key that matches the hash of someone else's public
> > key. This situation by itself it is a vulnerability to the solution
> > isn't it?, since if it has such a private key it can impersonate the
> > original holder, right?
>
> Yes. Fortunately it isn't as bad as it sounds. Suppose you're making a
> 44 bit has and there are already 2^24 hashes in use. You then have a 1
> in 2^20 chance of colliding with an existing hash. However, the chance
> that you're going to collide with Google, Microsoft or the White House
> is significantly smaller than the chance you're going to collide with a
> grocery store in Milan, a home office in New Jersy or a cell phone in
> Osaka, which aren't nearly as much fun to impersonate. Also, as soon as
> you use your fake hash and someone detects it, you're found out and the
> holder of the original hash is going to abandon it. So you have to make
> the first time that you're going to abuse the colliding hash count real
> good because it's likely it's your only chance.
Another mechanism to limit the exposure by short hashes is
that the first time a host performs the PK challenge with the peer
it records the actual public key.
Later if somebody tries to redirect the traffic it can verify not
only that the ID=hash matches, but also that it is the identical
public key.
This doesn't provide for strong "ownership" of the actual ID, but it
does prevent redirection attacks.
Erik