[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20130923.213951.458607592939783973.davem@davemloft.net>
Date: Mon, 23 Sep 2013 21:39:51 -0400 (EDT)
From: David Miller <davem@...emloft.net>
To: eric.dumazet@...il.com
Cc: therbert@...gle.com, netdev@...r.kernel.org,
jesse.brandeburg@...el.com
Subject: Re: [PATCH 1/2] net: Toeplitz library functions
From: Eric Dumazet <eric.dumazet@...il.com>
Date: Mon, 23 Sep 2013 17:03:11 -0700
> 1) Security alert here.
>
> Many devices (lets say Android phones) have no entropy at this point,
> all devices will have same toeplitz key.
>
> Check build_ehash_secret() for a possible point for the feeding of the
> key. (and commit 08dcdbf6a7b9d14c2302c5bd0c5390ddf122f664 )
>
> If hardware toeplitz is ever used, we want to make sure every host uses
> a private and hidden Toeplitz key.
>
> 2) Also it seems a given tuple would hash the same on different
> namespaces. Could be a problem if one particular TCP hash bucket is
> holding thousand of sockets.
>
> 3) jhash() is fast, there is no possible cache line misses
4) Random input to the hash is now not used at all, instant exploit
because now any attacker can open up connections over and over that
will all hash to the same hash bucket making our lookups linear.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists