Date: Tue, 7 Sep 1999 20:25:30 -0700 (PDT) From: Kris Kennaway <kris@hub.freebsd.org> To: Geoff Rehmet <geoffr@is.co.za> Cc: hackers@freebsd.org, markm@iafrica.com, jlemon@freebsd.org Subject: RE: TCP sequence numbers Message-ID: <Pine.BSF.4.10.9909072024070.68426-100000@hub.freebsd.org> In-Reply-To: <E3453EC6C52ED3118E7E0090275CD47CFFB0F3@isjhbex.is.co.za>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 2 Sep 1999, Geoff Rehmet wrote: > > I'd expect Yarrow to be (perhaps quite a bit) slower than our existing > > PRNG - it's a more conservative design and uses primitives > > like SHA-1 (for > > yarrow-160). I don't know how much of an impact this would be for > > network performance. > > If it is only used to generate a secret every 5 minutes, that should not > be a problem. Hrm. RFC 1948 seems to warn against changing the secret while "live". It's not immediately obvious to me why this is so. Kris To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9909072024070.68426-100000>