[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070328145255.GA7466@one.firstfloor.org>
Date: Wed, 28 Mar 2007 16:52:55 +0200
From: Andi Kleen <andi@...stfloor.org>
To: Eric Dumazet <dada1@...mosbay.com>
Cc: Andi Kleen <andi@...stfloor.org>,
Evgeniy Polyakov <johnpol@....mipt.ru>, nikb@...master.com,
netdev@...r.kernel.org
Subject: Re: RFC: Established connections hash function
On Wed, Mar 28, 2007 at 03:50:47PM +0200, Eric Dumazet wrote:
> 1) We can now use "struct timespec" to get more bits in init_std_data()
That would be a good change, but i don't think it would help that much.
If you know the hardware (e.g. webhost farms tend to have quite
predictive kit) and the kernel binary and the boot offset from
the timestamp you can probably guess the range of ns pretty closely
(let's say down to a few ms). With that it's a small range to search.
> 2) tcp ehash salt is initialized at first socket creation, not boot time. Maybe we have more available entropy at this point.
Sockets are created early too. It would be a little better, but probably
not much.
The only true random seed is disk, keyboard/mouse and previous state. previous
state is typically a relatively late init script, probably after the first
socket. Servers tend to have no disk/mouse activity.
Disk may work if you manage to put it after the root mount, but you
lose on diskless systems. e.g. if the nfsd is built in that wouldn't
work though because it would create sockets before that.
Getting entropy from network interrupts would avoid the the diskless
issue, but people are paranoid about that.
> 3) We dont want to be 'totally secure'. We only want to raise the level, and eventually see if we have to spend more time on this next year(s). AFAIK we had two different reports from people being hit by the flaw of previous hash. Not really a critical issue.
Yes, but you probably want a complexity of at least 10^5-10^6 to be any
useful. I don't think you will get that early in boot from random
unless you use hardware support.
>
> 4) We could add a hard limit on the length of one chain. Even if the bad guys discover a flaw, it wont hurt too much.
Or just use the trie? It has other advantages too :)
-Andi
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists