aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMartin Schanzenbach <schanzen@gnunet.org>2022-01-29 16:42:11 +0100
committerMartin Schanzenbach <schanzen@gnunet.org>2022-01-29 16:42:11 +0100
commitb5db613f563c38d3861be6bebd49f134d324228b (patch)
tree5a840573034c21dfcf7ff0c5d9d751d647338fe1
parent0cd18093affb44f01f4cf7e99322091055af390e (diff)
downloadlsd0001-b5db613f563c38d3861be6bebd49f134d324228b.tar.gz
lsd0001-b5db613f563c38d3861be6bebd49f134d324228b.zip
change sha reference
-rw-r--r--draft-schanzen-gns.xml61
1 files changed, 40 insertions, 21 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml
index eec9239..b323607 100644
--- a/draft-schanzen-gns.xml
+++ b/draft-schanzen-gns.xml
@@ -12,6 +12,7 @@
12<!ENTITY RFC5869 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5869.xml"> 12<!ENTITY RFC5869 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5869.xml">
13<!ENTITY RFC5890 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml"> 13<!ENTITY RFC5890 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml">
14<!ENTITY RFC5891 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5891.xml"> 14<!ENTITY RFC5891 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5891.xml">
15<!ENTITY RFC6234 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6234.xml">
15<!ENTITY RFC6781 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6781.xml"> 16<!ENTITY RFC6781 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6781.xml">
16<!ENTITY RFC6895 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6895.xml"> 17<!ENTITY RFC6895 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6895.xml">
17<!ENTITY RFC6979 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6979.xml"> 18<!ENTITY RFC6979 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6979.xml">
@@ -82,7 +83,8 @@
82 <abstract> 83 <abstract>
83 <t> 84 <t>
84 This document contains the GNU Name System (GNS) technical 85 This document contains the GNU Name System (GNS) technical
85 specification. GNS is a decentralized and censorship-resistant name 86 specification.
87 GNS is a decentralized and censorship-resistant name
86 system that provides a privacy-enhancing alternative to the Domain 88 system that provides a privacy-enhancing alternative to the Domain
87 Name System (DNS). 89 Name System (DNS).
88 </t> 90 </t>
@@ -115,6 +117,11 @@
115 DNS was not designed with security as a goal. This makes it very 117 DNS was not designed with security as a goal. This makes it very
116 vulnerable, especially to attackers that have the technical capabilities 118 vulnerable, especially to attackers that have the technical capabilities
117 of an entire nation state at their disposal. 119 of an entire nation state at their disposal.
120 While a wider discussion of this issue is out of scope for this document,
121 analyses and investigations can be found in recent academic research
122 works including <xref target="SecureNS"/>.
123 </t>
124 <t>
118 This specification describes a censorship-resistant, privacy-preserving 125 This specification describes a censorship-resistant, privacy-preserving
119 and decentralized name system: The GNU Name System (GNS) <xref target="GNS" />. 126 and decentralized name system: The GNU Name System (GNS) <xref target="GNS" />.
120 It is designed to provide a secure, privacy-enhancing alternative to 127 It is designed to provide a secure, privacy-enhancing alternative to
@@ -946,8 +953,8 @@ zk' := (h mod L) * zk
946 ]]></artwork> 953 ]]></artwork>
947 <t> 954 <t>
948 The PKEY cryptosystem uses a hash-based key derivation function (HKDF) as defined in 955 The PKEY cryptosystem uses a hash-based key derivation function (HKDF) as defined in
949 <xref target="RFC5869" />, using SHA-512 <xref target="SHS"/> for the extraction 956 <xref target="RFC5869" />, using SHA-512 <xref target="RFC6234"/> for the extraction
950 phase and SHA-256 <xref target="SHS"/> for the expansion phase. 957 phase and SHA-256 <xref target="RFC6234"/> for the expansion phase.
951 PRK_h is key material retrieved using an HKDF using the string 958 PRK_h is key material retrieved using an HKDF using the string
952 "key-derivation" as salt and the zone key as initial 959 "key-derivation" as salt and the zone key as initial
953 keying material. 960 keying material.
@@ -984,8 +991,8 @@ NONCE := HKDF-Expand (PRK_n, label, 32 / 8)
984]]></artwork> 991]]></artwork>
985 <t> 992 <t>
986 HKDF is a hash-based key derivation function as defined in 993 HKDF is a hash-based key derivation function as defined in
987 <xref target="RFC5869" />. Specifically, SHA-512 <xref target="SHS"/> is used for the 994 <xref target="RFC5869" />. Specifically, SHA-512 <xref target="RFC6234"/> is used for the
988 extraction phase and SHA-256 <xref target="SHS"/> for the expansion phase. 995 extraction phase and SHA-256 <xref target="RFC6234"/> for the expansion phase.
989 The output keying material is 32 bytes (256 bits) for the symmetric 996 The output keying material is 32 bytes (256 bits) for the symmetric
990 key and 4 bytes (32 bits) for the nonce. 997 key and 4 bytes (32 bits) for the nonce.
991 The symmetric key K is a 256-bit AES <xref target="RFC3826" /> key. 998 The symmetric key K is a 256-bit AES <xref target="RFC3826" /> key.
@@ -1129,8 +1136,8 @@ zk' := h * zk
1129 <t> 1136 <t>
1130 The EDKEY cryptosystem uses a 1137 The EDKEY cryptosystem uses a
1131 hash-based key derivation function (HKDF) as defined in 1138 hash-based key derivation function (HKDF) as defined in
1132 <xref target="RFC5869" />, using SHA-512 <xref target="SHS"/> for the extraction 1139 <xref target="RFC5869" />, using SHA-512 <xref target="RFC6234"/> for the extraction
1133 phase and HMAC-SHA256 <xref target="SHS"/> for the expansion phase. 1140 phase and HMAC-SHA256 <xref target="RFC6234"/> for the expansion phase.
1134 PRK_h is key material retrieved using an HKDF using the string 1141 PRK_h is key material retrieved using an HKDF using the string
1135 "key-derivation" as salt and the zone key as initial 1142 "key-derivation" as salt and the zone key as initial
1136 keying material. 1143 keying material.
@@ -1203,8 +1210,8 @@ NONCE := HKDF-Expand (PRK_n, label, 32 / 8)
1203]]></artwork> 1210]]></artwork>
1204 <t> 1211 <t>
1205 HKDF is a hash-based key derivation function as defined in 1212 HKDF is a hash-based key derivation function as defined in
1206 <xref target="RFC5869" />. Specifically, SHA-512 <xref target="SHS"/> is used for the 1213 <xref target="RFC5869" />. Specifically, SHA-512 <xref target="RFC6234"/> is used for the
1207 extraction phase and SHA-256 <xref target="SHS"/> for the expansion phase. 1214 extraction phase and SHA-256 <xref target="RFC6234"/> for the expansion phase.
1208 The output keying material is 32 bytes (256 bits) for the symmetric 1215 The output keying material is 32 bytes (256 bits) for the symmetric
1209 key and 16 bytes (128 bits) for the NONCE. 1216 key and 16 bytes (128 bits) for the NONCE.
1210 The symmetric key K is a 256-bit XSalsa20 1217 The symmetric key K is a 256-bit XSalsa20
@@ -1526,7 +1533,7 @@ q := SHA-512 (HDKD-Public(zk, label))
1526 <dd> 1533 <dd>
1527 Is the 512-bit storage key under which the resource records block is 1534 Is the 512-bit storage key under which the resource records block is
1528 published. 1535 published.
1529 It is the SHA-512 hash <xref target="SHS"/> over the derived zone key. 1536 It is the SHA-512 hash <xref target="RFC6234"/> over the derived zone key.
1530 </dd> 1537 </dd>
1531 </dl> 1538 </dl>
1532 </section> 1539 </section>
@@ -2718,6 +2725,7 @@ cae1789d
2718 &RFC5869; 2725 &RFC5869;
2719 &RFC5890; 2726 &RFC5890;
2720 &RFC5891; 2727 &RFC5891;
2728 &RFC6234;
2721 &RFC6895; 2729 &RFC6895;
2722 &RFC6979; 2730 &RFC6979;
2723 &RFC7748; 2731 &RFC7748;
@@ -2736,17 +2744,6 @@ cae1789d
2736 </front> 2744 </front>
2737 </reference> 2745 </reference>
2738 2746
2739 <reference anchor="SHS" target="https://doi.org/10.6028/NIST.FIPS.180-4">
2740 <front>
2741 <title>Secure Hash Standard (SHS)</title>
2742 <author initials="Q. H." surname="Dang" fullname="Quynh H. Dang">
2743 <organization>NIST</organization>
2744 </author>
2745
2746 <date year="2012" month="March"/>
2747 </front>
2748 </reference>
2749
2750 <reference anchor="MODES" target="https://doi.org/10.6028/NIST.SP.800-38A"> 2747 <reference anchor="MODES" target="https://doi.org/10.6028/NIST.SP.800-38A">
2751 <front> 2748 <front>
2752 <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title> 2749 <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title>
@@ -2934,6 +2931,28 @@ cae1789d
2934 <date year="2011"/> 2931 <date year="2011"/>
2935 </front> 2932 </front>
2936 </reference> 2933 </reference>
2934 <reference anchor="SecureNS" target="https://sci-hub.st/https://doi.org/10.1016/j.cose.2018.01.018">
2935 <front>
2936 <title>Towards secure name resolution on the Internet</title>
2937 <author initials="C." surname="Grothoff"
2938 fullname="Christian Grothoff">
2939 <organization>Bern University of Applied Sciences</organization>
2940 </author>
2941 <author initials="M." surname="Wachs"
2942 fullname="Matthias Wachs">
2943 <organization>Technische Universität München</organization>
2944 </author>
2945 <author initials="M." surname="Ermert"
2946 fullname="Monika Ermert">
2947 </author>
2948
2949 <author initials="J." surname="Appelbaum"
2950 fullname="Jacob Appelbaum">
2951 <organization>TU Eindhoven</organization>
2952 </author>
2953 <date year="2018"/>
2954 </front>
2955 </reference>
2937 2956
2938 <reference anchor="GNUnetGNS" target="https://git.gnunet.org/gnunet.git/tree/src/gns"> 2957 <reference anchor="GNUnetGNS" target="https://git.gnunet.org/gnunet.git/tree/src/gns">
2939 <front> 2958 <front>