lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 07 Dec 2014 14:14:40 +0100 From: Hannes Frederic Sowa <hannes@...essinduktion.org> To: George Spelvin <linux@...izon.com> Cc: herbert@...dor.apana.org.au, dborkman@...hat.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, tgraf@...g.ch Subject: Re: Where exactly will arch_fast_hash be used Hi, On So, 2014-12-07 at 00:20 -0500, George Spelvin wrote: > If you want DoS-resistant hash tables, I'm working on adding SipHash > to the kernel. > > This is a keyed pseudo-random function designed specifically for that > application. I am starting with ext4 directory hashes, and then intended > to expand to secure sequence numbers (since it's far faster than MD5). Please consider xfs, too. AFAIK xfs doesn't seed their hashing so far and the hashing function is pretty weak. One example: http://marc.info/?l=linux-xfs&m=139590613002926&w=2 > (I'm trying to figure out a good interface, since the crypto API > is a bit heavy for something to heavily optimized.) Ack. If we want to use it in the networking stack we should be able to use it without a dependency to the crypto framework. Bye, Hannes -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists