Re: [CRYPTO] obfuscating kernel pointers

2010-11-15 Thread Tomas Mraz
On Mon, 2010-11-15 at 19:58 +0800, Herbert Xu wrote: > Tomas Mraz wrote: > > > > This would not be a 'hashing' algorithm but a simple block encryption > > algorithm in the ECB mode with the random key initialized at boot. The > > problem here is that the standard block ciphers have at least 64 bi

Re: [CRYPTO] obfuscating kernel pointers

2010-11-15 Thread Herbert Xu
Tomas Mraz wrote: > > This would not be a 'hashing' algorithm but a simple block encryption > algorithm in the ECB mode with the random key initialized at boot. The > problem here is that the standard block ciphers have at least 64 bit > block length as smaller block length ciphers would not be se

Re: [CRYPTO] obfuscating kernel pointers

2010-11-15 Thread Neil Horman
On Mon, Nov 15, 2010 at 09:43:12AM +0100, Tomas Mraz wrote: > On Fri, 2010-11-12 at 08:32 -0500, Dan Rosenberg wrote: > > Hi Crypto people, > > > > I'm planning on submitting a patch that introduces a new %p format > > specifier that obfuscates kernel pointers depending on privileges. This > > c

Re: [CRYPTO] obfuscating kernel pointers

2010-11-15 Thread Tomas Mraz
On Fri, 2010-11-12 at 08:32 -0500, Dan Rosenberg wrote: > Hi Crypto people, > > I'm planning on submitting a patch that introduces a new %p format > specifier that obfuscates kernel pointers depending on privileges. This > change is for security reasons - many networking protocols expose > point

Re: [CRYPTO] obfuscating kernel pointers

2010-11-12 Thread Dan Rosenberg
> > > adding a consistent random value to a your void * pointers sounds like a fine > solution to the problem, then. As long as you use the same random value for > the > lifetime of the system, that will give you consistent values. And you have to > use the same random input consistently to ha

Re: [CRYPTO] obfuscating kernel pointers

2010-11-12 Thread Neil Horman
On Fri, Nov 12, 2010 at 12:39:41PM -0500, Dan Rosenberg wrote: > Thanks for your response. > > > > > > Just use get_random_bytes, or initalize an instance of cprng with > > get_random_bytes. > > > > Will do. > > > > > Depends on your goal, if you just wnat to hide the pointers, why not just

Re: [CRYPTO] obfuscating kernel pointers

2010-11-12 Thread Dan Rosenberg
Thanks for your response. > > > Just use get_random_bytes, or initalize an instance of cprng with > get_random_bytes. > Will do. > > Depends on your goal, if you just wnat to hide the pointers, why not just > print > NULL instead of the value? If you want to maintain some level of uniquenes

Re: [CRYPTO] obfuscating kernel pointers

2010-11-12 Thread Neil Horman
On Fri, Nov 12, 2010 at 08:32:01AM -0500, Dan Rosenberg wrote: > Hi Crypto people, > > I'm planning on submitting a patch that introduces a new %p format > specifier that obfuscates kernel pointers depending on privileges. This > change is for security reasons - many networking protocols expose >