ebiederm@xmission.com (Eric W. Biederman) writes:
> I agree that you cannot do a perfect job. The goal is to get something
> that is good enough so that it can be enabled and not give an automatic root
> exploit if someone accidentally leaves it on at the wrong time.
You can always use a simple mac / shared secret scheme. Just use HMAC on each
packet. The kernel has all the needed code in crypto/ now.
May not be military grade, but should be good enough to stop most attacks.
-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sat Nov 23 2002 - 22:00:20 EST