Bug 485933
Summary: | Use CONFIG_SCTP_HMAC_SHA1 instead of ..._MD5 | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Miloslav Trmač <mitr> |
Component: | kernel | Assignee: | Neil Horman <nhorman> |
Status: | CLOSED RAWHIDE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | rawhide | CC: | kernel-maint, nhorman, quintela |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-04-01 05:48:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 485249 |
Description
Miloslav Trmač
2009-02-17 15:14:23 UTC
I think there has been some concern in the past here that using SHA1 hmacs might be a problem on some older systems that don't support that algorithm. But its probably worth updating rawhide, if for no other reason than to see what breaks. As far as I understand sctp, these cookies are only used by the host that generated them, so the only possible compatibility problem could arise if the peer has buffers so small that they can not handle the additional 4 bytes. This has been done: config-generic:# CONFIG_SCTP_HMAC_NONE is not set config-generic:CONFIG_SCTP_HMAC_SHA1=y config-generic:# CONFIG_SCTP_HMAC_MD5 is not set |