[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHmME9qKiAb3s98=-5PRuBWyQYECq_U56jTODSyiU_A=cuwYHQ@mail.gmail.com>
Date: Sun, 11 Dec 2016 16:37:00 +0100
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: Andrew Lunn <andrew@...n.ch>
Cc: linux-mips@...ux-mips.org, Netdev <netdev@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
Dan Lüdtke <mail@...rl.com>,
Willy Tarreau <w@....eu>,
Måns Rullgård <mans@...sr.com>,
Hannes Frederic Sowa <hannes@...essinduktion.org>,
WireGuard mailing list <wireguard@...ts.zx2c4.com>,
Greg KH <gregkh@...uxfoundation.org>,
Felix Fietkau <nbd@....name>, Jiri Benc <jbenc@...hat.com>,
David Miller <davem@...emloft.net>
Subject: Re: Misalignment, MIPS, and ip_hdr(skb)->version
On Sun, Dec 11, 2016 at 4:30 PM, Andrew Lunn <andrew@...n.ch> wrote:
> I'm not a crypto expert, but does this not give you a helping hand in
> breaking the crypto? You know the plain text value of these bytes, and
> where they are in the encrypted text.
You also know with some probability that there's going to be an IP
header and a TCP header, each with predictable fields. Maybe you're
reasonably certain there's an HTTP header in there too. Gasp! But fear
not...
Symmetric ciphers are generally not considered secure if they fall to
what's called a "known plaintext attack". Fortunately, modern ciphers
like AES and ChaCha20 and most others that you're aware of are
generally believed to be secure against KPA.
Powered by blists - more mailing lists