Date: Tue, 14 Nov 2006 20:20:47 +0100 From: Max Laier <max@love2party.net> To: David Malone <dwmalone@maths.tcd.ie> Cc: freebsd-hackers@freebsd.org, freebsd-net@freebsd.org Subject: Re: ipv6 connection hash function wanted ... Message-ID: <200611142020.53178.max@love2party.net> In-Reply-To: <20061114190930.GA23096@walton.maths.tcd.ie> References: <200611141709.26644.max@love2party.net> <20061114190930.GA23096@walton.maths.tcd.ie>
next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart1347703.ze6erUDHTS Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Tuesday 14 November 2006 20:09, David Malone wrote: > On Tue, Nov 14, 2006 at 05:09:20PM +0100, Max Laier wrote: > > Any ideas? Any papers that deal with this problem? > > Assuming you don't want to use one of the standard cryptographic > ones (which I can imagine being a bit slow for something done > per-packet), then one option might be to use a simpler hash that > is keyed. Choose the key at boot/module load time and make it hard > to produce collisions unless you know the key. That's exactly what I am looking for ... now I need someone[tm] - with=20 better Math-Knowledge than mine - to write such a thing down in a simple=20 formula :-) i.e. take those bits from there and there and XOR them with=20 your canary yada-yada-yada ... =2D-=20 /"\ Best regards, | mlaier@freebsd.org \ / Max Laier | ICQ #67774661 X http://pf4freebsd.love2party.net/ | mlaier@EFnet / \ ASCII Ribbon Campaign | Against HTML Mail and News --nextPart1347703.ze6erUDHTS Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (FreeBSD) iD8DBQBFWhcVXyyEoT62BG0RAjiKAJ9dSHkBUj3/uxRoU6aoJ3ZTJ0oF9ACfQXpp 7h8OmbXL25j6zXx34OEJYhU= =apir -----END PGP SIGNATURE----- --nextPart1347703.ze6erUDHTS--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200611142020.53178.max>