[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20070329091801.GA17268@2ka.mipt.ru>
Date: Thu, 29 Mar 2007 13:18:01 +0400
From: Evgeniy Polyakov <johnpol@....mipt.ru>
To: Andi Kleen <andi@...stfloor.org>
Cc: Eric Dumazet <dada1@...mosbay.com>, nikb@...master.com,
netdev@...r.kernel.org
Subject: Re: RFC: Established connections hash function
On Wed, Mar 28, 2007 at 04:52:55PM +0200, Andi Kleen (andi@...stfloor.org) wrote:
> > 3) We dont want to be 'totally secure'. We only want to raise the level, and eventually see if we have to spend more time on this next year(s). AFAIK we had two different reports from people being hit by the flaw of previous hash. Not really a critical issue.
>
> Yes, but you probably want a complexity of at least 10^5-10^6 to be any
> useful. I don't think you will get that early in boot from random
> unless you use hardware support.
What we have (had) right now is broken situation, and it must be fixed
no matter what solution is used. Using more secure hash (and breaking
Jenkins hash is a bit harder than XOR one, I say it not only from
theoretical point of view looking into its operations) is a fix.
It is possible that there is even better fix - there is always something
better than one has right now, but right now problem must be fixed.
And David (and Eric, and Nikolaos) fixed that problem in place.
It can be solved (this time it will be called 'improved') further.
> >
> > 4) We could add a hard limit on the length of one chain. Even if the bad guys discover a flaw, it wont hurt too much.
Hard limit should not be used, since it is exactly what attacker wants -
attacker can get all slots in th hash table and server will not respond
to other clients at all, although it could, but much slower.
> Or just use the trie? It has other advantages too :)
As an interested party I should not comment, but I can not resist -
yes, it is cool and can be done better :)
> -Andi
--
Evgeniy Polyakov
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists