diff options
author | Martin Schanzenbach <schanzen@gnunet.org> | 2022-01-29 16:42:11 +0100 |
---|---|---|
committer | Martin Schanzenbach <schanzen@gnunet.org> | 2022-01-29 16:42:11 +0100 |
commit | b5db613f563c38d3861be6bebd49f134d324228b (patch) | |
tree | 5a840573034c21dfcf7ff0c5d9d751d647338fe1 | |
parent | 0cd18093affb44f01f4cf7e99322091055af390e (diff) | |
download | lsd0001-b5db613f563c38d3861be6bebd49f134d324228b.tar.gz lsd0001-b5db613f563c38d3861be6bebd49f134d324228b.zip |
change sha reference
-rw-r--r-- | draft-schanzen-gns.xml | 61 |
1 files changed, 40 insertions, 21 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index eec9239..b323607 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml | |||
@@ -12,6 +12,7 @@ | |||
12 | <!ENTITY RFC5869 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5869.xml"> | 12 | <!ENTITY RFC5869 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5869.xml"> |
13 | <!ENTITY RFC5890 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml"> | 13 | <!ENTITY RFC5890 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5890.xml"> |
14 | <!ENTITY RFC5891 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5891.xml"> | 14 | <!ENTITY RFC5891 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5891.xml"> |
15 | <!ENTITY RFC6234 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6234.xml"> | ||
15 | <!ENTITY RFC6781 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6781.xml"> | 16 | <!ENTITY RFC6781 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6781.xml"> |
16 | <!ENTITY RFC6895 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6895.xml"> | 17 | <!ENTITY RFC6895 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6895.xml"> |
17 | <!ENTITY RFC6979 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6979.xml"> | 18 | <!ENTITY RFC6979 PUBLIC '' "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6979.xml"> |
@@ -82,7 +83,8 @@ | |||
82 | <abstract> | 83 | <abstract> |
83 | <t> | 84 | <t> |
84 | This document contains the GNU Name System (GNS) technical | 85 | This document contains the GNU Name System (GNS) technical |
85 | specification. GNS is a decentralized and censorship-resistant name | 86 | specification. |
87 | GNS is a decentralized and censorship-resistant name | ||
86 | system that provides a privacy-enhancing alternative to the Domain | 88 | system that provides a privacy-enhancing alternative to the Domain |
87 | Name System (DNS). | 89 | Name System (DNS). |
88 | </t> | 90 | </t> |
@@ -115,6 +117,11 @@ | |||
115 | DNS was not designed with security as a goal. This makes it very | 117 | DNS was not designed with security as a goal. This makes it very |
116 | vulnerable, especially to attackers that have the technical capabilities | 118 | vulnerable, especially to attackers that have the technical capabilities |
117 | of an entire nation state at their disposal. | 119 | of an entire nation state at their disposal. |
120 | While a wider discussion of this issue is out of scope for this document, | ||
121 | analyses and investigations can be found in recent academic research | ||
122 | works including <xref target="SecureNS"/>. | ||
123 | </t> | ||
124 | <t> | ||
118 | This specification describes a censorship-resistant, privacy-preserving | 125 | This specification describes a censorship-resistant, privacy-preserving |
119 | and decentralized name system: The GNU Name System (GNS) <xref target="GNS" />. | 126 | and decentralized name system: The GNU Name System (GNS) <xref target="GNS" />. |
120 | It is designed to provide a secure, privacy-enhancing alternative to | 127 | It is designed to provide a secure, privacy-enhancing alternative to |
@@ -946,8 +953,8 @@ zk' := (h mod L) * zk | |||
946 | ]]></artwork> | 953 | ]]></artwork> |
947 | <t> | 954 | <t> |
948 | The PKEY cryptosystem uses a hash-based key derivation function (HKDF) as defined in | 955 | The PKEY cryptosystem uses a hash-based key derivation function (HKDF) as defined in |
949 | <xref target="RFC5869" />, using SHA-512 <xref target="SHS"/> for the extraction | 956 | <xref target="RFC5869" />, using SHA-512 <xref target="RFC6234"/> for the extraction |
950 | phase and SHA-256 <xref target="SHS"/> for the expansion phase. | 957 | phase and SHA-256 <xref target="RFC6234"/> for the expansion phase. |
951 | PRK_h is key material retrieved using an HKDF using the string | 958 | PRK_h is key material retrieved using an HKDF using the string |
952 | "key-derivation" as salt and the zone key as initial | 959 | "key-derivation" as salt and the zone key as initial |
953 | keying material. | 960 | keying material. |
@@ -984,8 +991,8 @@ NONCE := HKDF-Expand (PRK_n, label, 32 / 8) | |||
984 | ]]></artwork> | 991 | ]]></artwork> |
985 | <t> | 992 | <t> |
986 | HKDF is a hash-based key derivation function as defined in | 993 | HKDF is a hash-based key derivation function as defined in |
987 | <xref target="RFC5869" />. Specifically, SHA-512 <xref target="SHS"/> is used for the | 994 | <xref target="RFC5869" />. Specifically, SHA-512 <xref target="RFC6234"/> is used for the |
988 | extraction phase and SHA-256 <xref target="SHS"/> for the expansion phase. | 995 | extraction phase and SHA-256 <xref target="RFC6234"/> for the expansion phase. |
989 | The output keying material is 32 bytes (256 bits) for the symmetric | 996 | The output keying material is 32 bytes (256 bits) for the symmetric |
990 | key and 4 bytes (32 bits) for the nonce. | 997 | key and 4 bytes (32 bits) for the nonce. |
991 | The symmetric key K is a 256-bit AES <xref target="RFC3826" /> key. | 998 | The symmetric key K is a 256-bit AES <xref target="RFC3826" /> key. |
@@ -1129,8 +1136,8 @@ zk' := h * zk | |||
1129 | <t> | 1136 | <t> |
1130 | The EDKEY cryptosystem uses a | 1137 | The EDKEY cryptosystem uses a |
1131 | hash-based key derivation function (HKDF) as defined in | 1138 | hash-based key derivation function (HKDF) as defined in |
1132 | <xref target="RFC5869" />, using SHA-512 <xref target="SHS"/> for the extraction | 1139 | <xref target="RFC5869" />, using SHA-512 <xref target="RFC6234"/> for the extraction |
1133 | phase and HMAC-SHA256 <xref target="SHS"/> for the expansion phase. | 1140 | phase and HMAC-SHA256 <xref target="RFC6234"/> for the expansion phase. |
1134 | PRK_h is key material retrieved using an HKDF using the string | 1141 | PRK_h is key material retrieved using an HKDF using the string |
1135 | "key-derivation" as salt and the zone key as initial | 1142 | "key-derivation" as salt and the zone key as initial |
1136 | keying material. | 1143 | keying material. |
@@ -1203,8 +1210,8 @@ NONCE := HKDF-Expand (PRK_n, label, 32 / 8) | |||
1203 | ]]></artwork> | 1210 | ]]></artwork> |
1204 | <t> | 1211 | <t> |
1205 | HKDF is a hash-based key derivation function as defined in | 1212 | HKDF is a hash-based key derivation function as defined in |
1206 | <xref target="RFC5869" />. Specifically, SHA-512 <xref target="SHS"/> is used for the | 1213 | <xref target="RFC5869" />. Specifically, SHA-512 <xref target="RFC6234"/> is used for the |
1207 | extraction phase and SHA-256 <xref target="SHS"/> for the expansion phase. | 1214 | extraction phase and SHA-256 <xref target="RFC6234"/> for the expansion phase. |
1208 | The output keying material is 32 bytes (256 bits) for the symmetric | 1215 | The output keying material is 32 bytes (256 bits) for the symmetric |
1209 | key and 16 bytes (128 bits) for the NONCE. | 1216 | key and 16 bytes (128 bits) for the NONCE. |
1210 | The symmetric key K is a 256-bit XSalsa20 | 1217 | The symmetric key K is a 256-bit XSalsa20 |
@@ -1526,7 +1533,7 @@ q := SHA-512 (HDKD-Public(zk, label)) | |||
1526 | <dd> | 1533 | <dd> |
1527 | Is the 512-bit storage key under which the resource records block is | 1534 | Is the 512-bit storage key under which the resource records block is |
1528 | published. | 1535 | published. |
1529 | It is the SHA-512 hash <xref target="SHS"/> over the derived zone key. | 1536 | It is the SHA-512 hash <xref target="RFC6234"/> over the derived zone key. |
1530 | </dd> | 1537 | </dd> |
1531 | </dl> | 1538 | </dl> |
1532 | </section> | 1539 | </section> |
@@ -2718,6 +2725,7 @@ cae1789d | |||
2718 | &RFC5869; | 2725 | &RFC5869; |
2719 | &RFC5890; | 2726 | &RFC5890; |
2720 | &RFC5891; | 2727 | &RFC5891; |
2728 | &RFC6234; | ||
2721 | &RFC6895; | 2729 | &RFC6895; |
2722 | &RFC6979; | 2730 | &RFC6979; |
2723 | &RFC7748; | 2731 | &RFC7748; |
@@ -2736,17 +2744,6 @@ cae1789d | |||
2736 | </front> | 2744 | </front> |
2737 | </reference> | 2745 | </reference> |
2738 | 2746 | ||
2739 | <reference anchor="SHS" target="https://doi.org/10.6028/NIST.FIPS.180-4"> | ||
2740 | <front> | ||
2741 | <title>Secure Hash Standard (SHS)</title> | ||
2742 | <author initials="Q. H." surname="Dang" fullname="Quynh H. Dang"> | ||
2743 | <organization>NIST</organization> | ||
2744 | </author> | ||
2745 | |||
2746 | <date year="2012" month="March"/> | ||
2747 | </front> | ||
2748 | </reference> | ||
2749 | |||
2750 | <reference anchor="MODES" target="https://doi.org/10.6028/NIST.SP.800-38A"> | 2747 | <reference anchor="MODES" target="https://doi.org/10.6028/NIST.SP.800-38A"> |
2751 | <front> | 2748 | <front> |
2752 | <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title> | 2749 | <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title> |
@@ -2934,6 +2931,28 @@ cae1789d | |||
2934 | <date year="2011"/> | 2931 | <date year="2011"/> |
2935 | </front> | 2932 | </front> |
2936 | </reference> | 2933 | </reference> |
2934 | <reference anchor="SecureNS" target="https://sci-hub.st/https://doi.org/10.1016/j.cose.2018.01.018"> | ||
2935 | <front> | ||
2936 | <title>Towards secure name resolution on the Internet</title> | ||
2937 | <author initials="C." surname="Grothoff" | ||
2938 | fullname="Christian Grothoff"> | ||
2939 | <organization>Bern University of Applied Sciences</organization> | ||
2940 | </author> | ||
2941 | <author initials="M." surname="Wachs" | ||
2942 | fullname="Matthias Wachs"> | ||
2943 | <organization>Technische Universität München</organization> | ||
2944 | </author> | ||
2945 | <author initials="M." surname="Ermert" | ||
2946 | fullname="Monika Ermert"> | ||
2947 | </author> | ||
2948 | |||
2949 | <author initials="J." surname="Appelbaum" | ||
2950 | fullname="Jacob Appelbaum"> | ||
2951 | <organization>TU Eindhoven</organization> | ||
2952 | </author> | ||
2953 | <date year="2018"/> | ||
2954 | </front> | ||
2955 | </reference> | ||
2937 | 2956 | ||
2938 | <reference anchor="GNUnetGNS" target="https://git.gnunet.org/gnunet.git/tree/src/gns"> | 2957 | <reference anchor="GNUnetGNS" target="https://git.gnunet.org/gnunet.git/tree/src/gns"> |
2939 | <front> | 2958 | <front> |