From df683bc14448c51796d2bd4c657ad5fab38b01c0 Mon Sep 17 00:00:00 2001 From: Peter Saint-Andre Date: Tue, 15 Jan 2008 19:06:05 +0000 Subject: [PATCH] security text tweaks git-svn-id: file:///home/ksmith/gitmigration/svn/xmpp/trunk@1581 4b5297f7-1745-476d-ba37-a9c6900126ab --- xep-0115.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xep-0115.xml b/xep-0115.xml index 9f304977..55963dea 100644 --- a/xep-0115.xml +++ b/xep-0115.xml @@ -446,7 +446,7 @@

In the future, the &COUNCIL; may, at its discretion, modify the mandatory-to-implement hashing algorithm if it determines that SHA-1 has become practically vulnerable to Preimage Attacks.

-

Although the entity capabilities protocol is not vulnerable to collision attacks, it may become possible to launch a preimage attack against the hashes used as the values of the 'ver' attribute in the entity capabilities protocol (on the difference between collision attacks and preimage attacks, see &rfc4270;).

+

As described in &rfc4270;, protocols that use the output of hash functions such as MD5 or SHA-1 can be vulnerable to collision attacks or preimage attacks or both. Because of how the hash output is used in entity capabilities, the protocol will not be subject to collision attacks even if the hash function used is found to be vulnerable to collision attacks. However, it is possible that the protocol might become subject to preimage attacks if the hash function used is found to be vulnerable to preimage attacks.

In theory, such a preimage attack would take one of the following forms: