database logo graphic

RFC 6273

"The Secure Neighbor Discovery (SEND) Hash Threat Analysis", June 2011

Canonical URL:
http://www.rfc-editor.org/rfc/rfc6273.txt
This document is also available in this non-normative format: PDF.
Status:
INFORMATIONAL
Authors:
A. Kukec
S. Krishnan
S. Jiang
Stream:
IETF
Source:
csi (int)

Cite this RFC: TXT  |  XML

Other actions: Find Errata (if any)  |  Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

This document analyzes the use of hashes in Secure Neighbor Discovery (SEND), the possible threats to these hashes and the impact of recent attacks on hash functions used by SEND. The SEND specification currently uses the SHA-1 hash algorithm and PKIX certificates and does not provide support for hash algorithm agility. This document provides an analysis of possible threats to the hash algorithms used in SEND. This document is not an Internet Standards Track specification; it is published for informational purposes.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Go to the RFC Editor Homepage.