lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 23 Dec 2016 11:23:43 +0100
From:   Daniel Borkmann <>
To:     Andy Lutomirski <>,
        Hannes Frederic Sowa <>
CC:     Alexei Starovoitov <>,
        "Jason A. Donenfeld" <>,
        Theodore Ts'o <>, Netdev <>,
        LKML <>,
        Linux Crypto Mailing List <>,
        David Laight <>,
        Eric Dumazet <>,
        Linus Torvalds <>,
        Eric Biggers <>,
        Tom Herbert <>,
        Andi Kleen <>,
        "David S. Miller" <>,
        Jean-Philippe Aumasson <>
Subject: Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random:
 use SipHash in place of MD5)

On 12/22/2016 06:25 PM, Andy Lutomirski wrote:
> On Thu, Dec 22, 2016 at 8:59 AM, Hannes Frederic Sowa
>> I wondered if bpf program loading should have used the module loading
>> infrastructure from the beginning...
> That would be way too complicated and would be nasty for the unprivileged cases.

Also, there are users be it privileged or not that don't require to have a full
obj loader from user space, but are fine with just hard-coding parts or all of
the insns in their application. Back then we settled with using fds based on
Andy's suggestion, it has both ups and downs as we saw along the way but worked
okay thus far.

Powered by blists - more mailing lists