|
Message-ID: <CAHmME9rZAS_77=DsD2LRM=77PWua8B_ZPNxQSvr-2dAZht3faA@mail.gmail.com> Date: Wed, 14 Dec 2016 00:36:22 +0100 From: "Jason A. Donenfeld" <Jason@...c4.com> To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Andi Kleen <ak@...ux.intel.com>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, LKML <linux-kernel@...r.kernel.org>, Linux Crypto Mailing List <linux-crypto@...r.kernel.org>, George Spelvin <linux@...izon.com>, Scott Bauer <sbauer@....utah.edu>, Andy Lutomirski <luto@...capital.net>, Greg KH <gregkh@...uxfoundation.org>, Eric Biggers <ebiggers3@...il.com>, Jean-Philippe Aumasson <jeanphilippe.aumasson@...il.com>, "Daniel J . Bernstein" <djb@...yp.to> Subject: Re: [PATCH v3] siphash: add cryptographically secure hashtable function Hi Linus, On Tue, Dec 13, 2016 at 8:25 PM, Linus Torvalds <torvalds@...ux-foundation.org> wrote: > Yeah,. the TCP sequence number md5_transform() cases are likely the > best example of something where siphash might be good. That tends to > be really just a couple words of data (the address and port info) plus > the net_secret[] hash. I think they currently simply just fill in the > fixed-sized 64-byte md5-round area. > > I wonder it's worth it to have a special spihash version that does > that same "fixed 64-byte area" thing. What happens in MD5 the hash function is that it first initializes its initial 128-bit hash to a magic constant, and then reads 64 bytes at a time from the input and calls md5_transform on that, which each time manipulates that 128-bit value from its starting value. At the end of the input, some special padding is applied for small final blocks, some finalization, and then the resultant hash is whatever that 128-bit value is at the end of the process. What the tcp stack does with secure_tcp_sequence_number function in net/core/secure_seq.c, and a variety of other places, is to just supply that 128-bit initial value not with the magic constant, but instead with saddr||daddr||sport||dport||net_secret[15] and then calls md5_transform on the 64-byte long term secret random value (net_secret). From the resultant 128-bit value, they take the first 32-bits. In addition to being rather heavy weight, this strikes me as cryptographically a bit dubious too. But that's where your "fixed 64-byte area" notion comes from. Siphash makes things a lot more simple than that. Since siphash is a PRF and not a mere hash function, it takes an explicit secret key parameter, which would be net_secret, some input data, which would be saddr||daddr||sport||dport, and then spits out a 64-bit number, 32 bits of which would be used as the sequence number. seq_num = seq_scale(siphash24(saddr||daddr||sport||dport, net_secret)); A lot simpler, faster, and actually secure. > But please talk to the netwotrking people. Maybe that's the proper way > to get this merged? I had hoped to do it the lazy way, and just have it just wind up in lib/. But I suppose you and Greg are of course right, and I should submit this with a real usage. So I'll do that, and resubmit in another thread as a series to LKML and netdev. Thanks for your feedback! Jason
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.