diff options
author | Eric Dumazet <edumazet@google.com> | 2022-05-02 11:46:10 +0300 |
---|---|---|
committer | Jakub Kicinski <kuba@kernel.org> | 2022-05-05 05:22:21 +0300 |
commit | 4dfa9b438ee34caca4e6a4e5e961641807367f6f (patch) | |
tree | 984d6cdbe8afca38457c885a6456e13bf7c87750 /tools/perf/scripts/python/stackcollapse.py | |
parent | 9e9b70ae923baf2b5e8a0ea4fd0c8451801ac526 (diff) | |
download | linux-4dfa9b438ee34caca4e6a4e5e961641807367f6f.tar.xz |
tcp: resalt the secret every 10 seconds
In order to limit the ability for an observer to recognize the source
ports sequence used to contact a set of destinations, we should
periodically shuffle the secret. 10 seconds looks effective enough
without causing particular issues.
Cc: Moshe Kol <moshe.kol@mail.huji.ac.il>
Cc: Yossi Gilad <yossi.gilad@mail.huji.ac.il>
Cc: Amit Klein <aksecurity@gmail.com>
Cc: Jason A. Donenfeld <Jason@zx2c4.com>
Tested-by: Willy Tarreau <w@1wt.eu>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions