From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.5 required=3.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 25EBAC433DB for ; Mon, 22 Mar 2021 21:17:03 +0000 (UTC) Received: from shelob.surriel.com (shelob.surriel.com [96.67.55.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 6E39F61984 for ; Mon, 22 Mar 2021 21:17:02 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6E39F61984 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kernelnewbies-bounces@kernelnewbies.org Received: from localhost ([::1] helo=shelob.surriel.com) by shelob.surriel.com with esmtp (Exim 4.94) (envelope-from ) id 1lORui-00038p-Hu; Mon, 22 Mar 2021 17:16:40 -0400 Received: from mail-io1-xd2f.google.com ([2607:f8b0:4864:20::d2f]) by shelob.surriel.com with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94) (envelope-from ) id 1lORug-00038h-Hx for kernelnewbies@kernelnewbies.org; Mon, 22 Mar 2021 17:16:38 -0400 Received: by mail-io1-xd2f.google.com with SMTP id e8so15500108iok.5 for ; Mon, 22 Mar 2021 14:16:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=ayECeS81HT5a5qmHE9lDWqj1EoaigC/VfKD/r0GEF18=; b=mTGY90QqYvQA+ppZtYyFoO/HHOQizhHsaVVXuxxYS+CCLb4mhg6WkoTbCRU43OI2iM WbPjfBD9HYGAA8izueL2BJXEGvJHFPHwD1zvgb+12vjgnIR/JW/pSmB60D40tNWlPfqZ o63IH25jn8WJLZGsCLqmdSujLqajDu2+YPovNvFbOac2wWk/4YkE+4ZkaXWBLjATu2/x kmm57TLHLA6tnhiyGKDMElPRVYMEFGQPcIQaaIwtzpjyd5P8ZpmzrQ5T7NotJ+8Nv+S8 1dXr+wk1HmAHv1EBxY77XYynq5RuOImzNfeJ4oDxIxBxykP2GtxblF3CSMJPQQ7dSB0g 8mmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=ayECeS81HT5a5qmHE9lDWqj1EoaigC/VfKD/r0GEF18=; b=OxsJSlHHHdG4HrOODKImXrvASsO/9GMYreiahh83uFPvhcPN4CcaOeYMhJJgt0XuM3 1iRbTU/nOg9iT+6dIM1D503GCTm/1rX9iGaUZfqLb2Ephfs2HWxaaU50PFsOj6bQljU/ BaqLyvKd/Gd7kR7xhEk/D7UwDSXYMnOV+990iNkZl+9L5t/mPXo94yBy+Ula0Ul4qNeR Cj1/0G2k8PKX4kNKuYGB5f6UHF8ksylIk8qAmvETSngqd+J310otMqB8AzJPvDsdWtrT tfxqmhcyiJaLWcOgq6DBv/w2sk1FIF1mxTcDNeyEwBNx9dSxHUwVgSsjyCHFUqV633KU exwg== X-Gm-Message-State: AOAM5318d2/8jarYu9CtJchckcB4NU54EgLtt8bpfTaYfpowPOLjfnrp k5zgUQnmxIZSqDvZojz/XKGUQLaIJuugkIBVdSI= X-Google-Smtp-Source: ABdhPJw6G59xfgQX9hwTqrA3u+du6z2ErIPJxYBxb7h+GyWPp1omkc+nnY+oitoI+0+CcvYSoEqrNKpghGMEBWsPfWE= X-Received: by 2002:a6b:d20e:: with SMTP id q14mr1486822iob.200.1616447795859; Mon, 22 Mar 2021 14:16:35 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Jeffrey Walton Date: Mon, 22 Mar 2021 17:16:08 -0400 Message-ID: Subject: Re: kernel projects for students To: Muni Sekhar Cc: LKML , kernelnewbies X-BeenThere: kernelnewbies@kernelnewbies.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Learn about the Linux kernel List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: noloader@gmail.com Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: kernelnewbies-bounces@kernelnewbies.org On Mon, Mar 22, 2021 at 11:37 AM Muni Sekhar wrote: > > What are some good Linux projects in kernel space for final year > computer.science engineering students? > Could someone help and share your ideas on this please. Hedging deployed cryptography. Hedging can be used to keep the state of a machine unique and the rng's in good working order to minimize/eliminate the risk associated with low entropy devices and virtual machine resets. You would hook the network stack and look for the other party's random secret, like ClientHello.random in SSL/TLS [RFC 5246]. When the data arrives you add it to the machine's entropy pools. In addition to SSL/TLS, you also have SSH and IPsec to grab another party's entropy. I am sure there are others, but SSH, SSL/TLS and IPsec are the ones I would focus on. Also see "When Virtual is Harder than Real: Resource Allocation Challenges in Virtual Machine Based IT Environments," http://static.usenix.org/event/hotos05/final_papers/full_papers/garfinkel/garfinkel.pdf ; and "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography," http://www.isoc.org/isoc/conferences/ndss/10/pdf/15.pdf . Jeff _______________________________________________ Kernelnewbies mailing list Kernelnewbies@kernelnewbies.org https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies