lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 27 Apr 2022 08:56:21 -0700 From: Stephen Hemminger <stephen@...workplumber.org> To: Willy Tarreau <w@....eu> Cc: netdev@...r.kernel.org, David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Eric Dumazet <edumazet@...gle.com>, Moshe Kol <moshe.kol@...l.huji.ac.il>, Yossi Gilad <yossi.gilad@...l.huji.ac.il>, Amit Klein <aksecurity@...il.com>, linux-kernel@...r.kernel.org Subject: Re: [PATCH net 3/7] tcp: resalt the secret every 10 seconds On Wed, 27 Apr 2022 08:52:29 +0200 Willy Tarreau <w@....eu> wrote: > From: Eric Dumazet <edumazet@...gle.com> > > In order to limit the ability for an observer to recognize the source > ports sequence used to contact a set of destinations, we should > periodically shuffle the secret. 10 seconds looks effective enough > without causing particular issues. > > Cc: Moshe Kol <moshe.kol@...l.huji.ac.il> > Cc: Yossi Gilad <yossi.gilad@...l.huji.ac.il> > Cc: Amit Klein <aksecurity@...il.com> > Tested-by: Willy Tarreau <w@....eu> > Signed-off-by: Eric Dumazet <edumazet@...gle.com> > --- > net/core/secure_seq.c | 12 +++++++++--- > 1 file changed, 9 insertions(+), 3 deletions(-) > > diff --git a/net/core/secure_seq.c b/net/core/secure_seq.c > index 2cdd43a63f64..200ab4686275 100644 > --- a/net/core/secure_seq.c > +++ b/net/core/secure_seq.c > @@ -22,6 +22,8 @@ > static siphash_aligned_key_t net_secret; > static siphash_aligned_key_t ts_secret; > Rather than hard coding, why not have a sysctl knob for this? That way the tinfoil types can set it smaller.
Powered by blists - more mailing lists