ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] New Issue: Base: Upgrade indication and protection against downgrade attacks

2006-02-15 11:37:17
Arvel Hathcock wrote:
 > I guess the main argument for the MUST on sha-256 would be to
 > encourage moving away from sha-1 before there's much wider DKIM
 > deployment.

A MUST would more than encourage, it would require :)

Isn't SHA-1 sufficient since it (a) isn't broken (b) is the least computationally taxing (I assume) and (c) provides sufficient protection for our use (we aren't protecting files full of credit card numbers with DKIM).

Just a few data points:

1) sha-256 is about 55% the speed of sha-1  [*]
2) for smallish pieces of email, it's almost certainly the RSA overhead
   that dominates.
3) I've heard tell that it's often the case the MTA's are IO bound. I
   don't know how much this holds true these days on inbound MTA's
   doing scanning/filtering.

Overall, my suspicion is that Moore's law will make this inconsequental
before there's even an RFC number for DKIM.

                Mike

[*] http://www.eskimo.com/~weidai/benchmarks.html
_______________________________________________
NOTE WELL: This list operates according to http://dkim.org/ietf-list-rules.html

<Prev in Thread] Current Thread [Next in Thread>