Date: Thu, 20 Dec 2001 14:31:01 -0600 From: Jonathan Lemon <jlemon@flugsvamp.com> To: Mike Silbersack <silby@silby.com> Cc: Jonathan Lemon <jlemon@FreeBSD.org>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/netinet tcp_syncache.c Message-ID: <20011220143101.E26326@prism.flugsvamp.com> In-Reply-To: <Pine.BSF.4.30.0112200219160.74187-100000@niwun.pair.com> References: <200112190612.fBJ6CE264053@freefall.freebsd.org> <Pine.BSF.4.30.0112200219160.74187-100000@niwun.pair.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Dec 20, 2001 at 02:28:42AM -0500, Mike Silbersack wrote: > > Hm, I have a question about this change: Isn't using md5 for every > outgoing packet going to eat a lot of cpu time? Not every outgoing packet, every outgoing SYN,ACK. And it is no more heavyweight than the existing tcp_new_isn(), which uses MD5 to generate the ISN for initial outgoing SYNs. > I think it might be a > more reasonable heuristic to change to md5 generation only when the syn > cache is more than half full and use arc4random at other times; this would > use less cpu in the common case, but provide the cookie support when it is > needed most. Hmm, this will break the syncookie logic; since you don't know ahead of time which entries are going to got dropped. > (It'd also reduce my fears that someone might try some brute > force attacks on the cookies.) I've been trying to brute force the cookies, and haven't been at all successful. According to nmap (unscientific survey!), it still has: TCP Sequence Prediction: Class=truly random Difficulty=9999999 (Good luck!) However, this is a valid point; even though I'm using arc4random key material, someone might still come up with an attack that works. > For the hash function itself... perhaps part of the seq # the other end > has sent should be incorporated in the hash? I think that with this > scheme, we'd get duplicate syn-acks generated by different syns. I don't follow this. All the syncache hash function needs is a reasonable dispersion through the hash table; we still do an exact match by examining the syncache entries. If you mean the syncookie hash, the ISN is part of the cookie itself. > Also, tcp_syncookies should probably unconditionally force a change back > to arc4random() generation when disabled, given that it also disregards > late arriving ack cookie responses. I did seriously consider that, but decided against it at the last minute. Perhaps I should rethink it, given that arc4random is faster than MD5(). -- Jonathan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011220143101.E26326>