commit 22804bb256e55b25a0828e41a60947949d713ef9
parent fe9adeeb7546449c385f86282aaa25f031a205c5
Author: Christian Grothoff <christian@grothoff.org>
Date: Sat, 1 Jul 2023 01:01:56 +0200
improve English/structure in Zone Privacy section
Diffstat:
1 file changed, 15 insertions(+), 15 deletions(-)
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
@@ -2746,26 +2746,26 @@ NICK: john (supplemental)
<t>
GNS does not support authenticated denial of existence of names
within a zone.
- Record blocks are published in encrypted form using keys derived from the
+ Record data is published in encrypted form using keys derived from the
zone key and record label. Zone administrators should
- carefully consider if the label and zone key is public or if
- those should be used and considered as a shared secret.
- Unlike zone keys, labels can also be guessed by
- an attacker in the network observing queries and responses. Given
- a known and targeted zone key, the use of well known or easily guessable
- labels effectively results in general disclosure of the records to
- the public.
- If the labels and hence the records should be kept secret except to
- those knowing a secret label and the zone in which to look, the
- label must be chosen accordingly. It is recommended to then use a
- label with sufficient entropy as to prevent guessing attacks.
+ carefully consider if a label and zone key are public, or if
+ one or both of these should be used as a shared secret to restrict access
+ to the corresponding record data.
+ Unlike public zone keys, low-entropy labels can be guessed by an attacker. If an attacker
+ knowns the public zone key, the use of well known or guessable
+ labels effectively threatens the disclosure of the corresponding records.
</t>
<t>
- It should be noted that this attack on labels only applies if the
+ It should be noted that the guessing attack on labels only applies if the
zone key is somehow disclosed to the adversary. GNS itself
does not disclose it during a lookup or when resource records are
- published as the zone keys are blinded beforehand. However,
- zone keys do become public during revocation.
+ published (as only the blinded zone keys are used on the network).
+ However, zone keys do become public during revocation.
+ </t>
+ <t>
+ It is thus <bcp14>RECOMMENDED</bcp14> to use a
+ label with sufficient entropy to prevent guessing attacks
+ if any data in a resource record set is sensitive.
</t>
</section>
<section anchor="sec_governance">