<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, 10 Jan 2020 at 08:08, Matthew Pounsett <<a href="mailto:matt@conundrum.com">matt@conundrum.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, 9 Jan 2020 at 20:47, Tony Finch <<a href="mailto:dot@dotat.at" target="_blank">dot@dotat.at</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I saw the Eurocrypt SHA-1 chosen-prefix attack last year but I didn't<br>
think about the consequences. As soon as I saw the SHAmbles announcement I<br>
realised what it actually meant and that DNSSEC was in serious trouble.<br>
<br></blockquote><div><br></div><div>What are the implications for NSEC3, given that both (current) algorithm numbers rely on SHA-1?</div></div></div></blockquote><div><br></div><div>Nevermind.. a split thread meant the answer to my question was further down in my inbox.</div><div><br></div><div>So an attack against a TLD using NSEC3 is logistically difficult, but it's not impossible.. so I guess we'd better get on with standardizing <span style="color:rgb(0,0,0);font-family:"Open Sans","Helvetica Neue",Helvetica,sans-serif;font-size:13.3333px">RSASHA256-NSEC3-SHA256. There are a LOT of TLDs—particularly CC's—using algo 7. </span></div></div></div>