[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20120627.152353.771450388391058676.davem@davemloft.net>
Date: Wed, 27 Jun 2012 15:23:53 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: eric.dumazet@...il.com
Cc: fw@...len.de, brouer@...hat.com, hans.schillstrom@...csson.com,
subramanian.vijay@...il.com, dave.taht@...il.com,
netdev@...r.kernel.org, ncardwell@...gle.com, therbert@...gle.com,
mph@...h.dk
Subject: Re: [PATCH v2 net-next] tcp: avoid tx starvation by SYNACK packets
From: Eric Dumazet <eric.dumazet@...il.com>
Date: Wed, 27 Jun 2012 23:39:20 +0200
> On Wed, 2012-06-27 at 21:50 +0200, Florian Westphal wrote:
>
>> I doubt using jhash is safe for syncookies.
>>
>> There a several differences to other uses in kernel:
>> - all hash input except u32 cookie_secret[2] is known
>> - we transmit hash result (i.e, its visible to 3rd party)
>> - we do not re-seed the secret, ever
>>
>> it should be quite easy to recompute cookie_secret[] from known syncookie
>> values?
>
> We could re-seed the secrets every MSL seconds a bit like in
> tcp_cookie_generator()
>
> This would require check_tcp_syn_cookie() doing two checks (most recent
> seed, and previous one if first check failed)
That could help, but I'm leaning towards not doing this at all. Like
for the normal sequence number generation we really can't do this.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists