diff options
author | Eric Dumazet <edumazet@google.com> | 2022-05-02 10:46:10 +0200 |
---|---|---|
committer | Jakub Kicinski <kuba@kernel.org> | 2022-05-04 19:22:21 -0700 |
commit | 4dfa9b438ee34caca4e6a4e5e961641807367f6f (patch) | |
tree | 984d6cdbe8afca38457c885a6456e13bf7c87750 /net/ipv4/inet_hashtables.c | |
parent | 9e9b70ae923baf2b5e8a0ea4fd0c8451801ac526 (diff) | |
download | lwn-4dfa9b438ee34caca4e6a4e5e961641807367f6f.tar.gz lwn-4dfa9b438ee34caca4e6a4e5e961641807367f6f.zip |
tcp: resalt the secret every 10 seconds
In order to limit the ability for an observer to recognize the source
ports sequence used to contact a set of destinations, we should
periodically shuffle the secret. 10 seconds looks effective enough
without causing particular issues.
Cc: Moshe Kol <moshe.kol@mail.huji.ac.il>
Cc: Yossi Gilad <yossi.gilad@mail.huji.ac.il>
Cc: Amit Klein <aksecurity@gmail.com>
Cc: Jason A. Donenfeld <Jason@zx2c4.com>
Tested-by: Willy Tarreau <w@1wt.eu>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'net/ipv4/inet_hashtables.c')
0 files changed, 0 insertions, 0 deletions