Date: Fri, 13 Sep 2019 08:24:18 -0400 From: Andrew Gallatin <gallatin@cs.duke.edu> To: cem@freebsd.org, Andrew Gallatin <gallatin@freebsd.org> Cc: src-committers <src-committers@freebsd.org>, svn-src-all <svn-src-all@freebsd.org>, svn-src-head <svn-src-head@freebsd.org> Subject: Re: svn commit: r352228 - head/sys/netinet Message-ID: <50ec28c4-7e36-c69b-4003-bff07decf22a@cs.duke.edu> In-Reply-To: <CAG6CVpXOWtpi4zXunQRT2CwJWkcRmDBZF6-B3KHMrFOHwNfC0Q@mail.gmail.com> References: <201909111848.x8BImQnn056188@repo.freebsd.org> <CAG6CVpXOWtpi4zXunQRT2CwJWkcRmDBZF6-B3KHMrFOHwNfC0Q@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2019-09-11 17:16, Conrad Meyer wrote: > Small nitpick: > > On Wed, Sep 11, 2019 at 11:48 AM Andrew Gallatin <gallatin@freebsd.org> wrote: >> Note that on a system under a syn flood attack, arc4random() >> becomes quite expensive, and the chacha_poly crypto that it calls > > arc4random uses chacha20 — there is no "poly" involved. > > Best, > Conrad > Sorry for the mis-statement. poly is associated with chacha in my mind. In any case, calling arc4random() and the chacha it uses millions of times per second is expensive, and avoiding it provides some headroom. Drew
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50ec28c4-7e36-c69b-4003-bff07decf22a>