summaryrefslogtreecommitdiff
path: root/net/ipv4/inet_hashtables.c
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2022-05-02 10:46:10 +0200
committerJakub Kicinski <kuba@kernel.org>2022-05-04 19:22:21 -0700
commit4dfa9b438ee34caca4e6a4e5e961641807367f6f (patch)
tree984d6cdbe8afca38457c885a6456e13bf7c87750 /net/ipv4/inet_hashtables.c
parent9e9b70ae923baf2b5e8a0ea4fd0c8451801ac526 (diff)
downloadlwn-4dfa9b438ee34caca4e6a4e5e961641807367f6f.tar.gz
lwn-4dfa9b438ee34caca4e6a4e5e961641807367f6f.zip
tcp: resalt the secret every 10 seconds
In order to limit the ability for an observer to recognize the source ports sequence used to contact a set of destinations, we should periodically shuffle the secret. 10 seconds looks effective enough without causing particular issues. Cc: Moshe Kol <moshe.kol@mail.huji.ac.il> Cc: Yossi Gilad <yossi.gilad@mail.huji.ac.il> Cc: Amit Klein <aksecurity@gmail.com> Cc: Jason A. Donenfeld <Jason@zx2c4.com> Tested-by: Willy Tarreau <w@1wt.eu> Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'net/ipv4/inet_hashtables.c')
0 files changed, 0 insertions, 0 deletions