Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3754843pxf; Mon, 22 Mar 2021 14:18:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzE4FDF86/kgn5B/IAHR7g2sPLJjK6WA1z2kB/roACR6DxoOyAzsTBHhdifam/8P2YdKTRn X-Received: by 2002:a17:906:f9cc:: with SMTP id lj12mr1649269ejb.544.1616447919871; Mon, 22 Mar 2021 14:18:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616447919; cv=none; d=google.com; s=arc-20160816; b=gFxp/0fuC6/Oc159q8oO9liYmKGvMNBB0QAVtallAIgZl50svK3X0KCZNm/hOxuuMk rdFh4vnOYQHRUzpHuZVBJ0Uj6cgos25N4pI4bIy9nTjEqlY8dlgXFjYJrzzHt/PrCiGk kVIIVQH7l3ArIlvdpIBg+1u/CXlqcxWr+A4yaERFxoJSYPG02vngSe1BJuEfN7grlzo2 8wyAGZKeC+yBGpLq6VAxerH+cTx7tdqv6l6d9M9eDgli/UCY4Fc5tYjj5Tyf9C2d6kFY RG5iJugVxvUnm5inv3qAgbULh8KFSuIGchvBw1uBcet32mTe+CCkKVY2aCdiS2xs6rgH 99nw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:reply-to :in-reply-to:references:mime-version:dkim-signature; bh=ayECeS81HT5a5qmHE9lDWqj1EoaigC/VfKD/r0GEF18=; b=HhTKaE9VvQNd6imi2qeJEOggDCSTKMFqgi3Ew+5vzwNF5hOMSocKLRGryxY05ZTAy9 lEdcbYV3CSEWK1f4g7EQ+7DVr49wdXcIkI0KptySXi8pIZ840QzScHIF0ciJJAwmj/+8 ntBAgVlTiI8nPpPjMqvXVgoJjxYrf74q8UAKZlYZyniPzlGe9NLISkq4HH2MIJ9UCr6v a/HcCGxbg+DBE6snvWmmmBTsnx5iHJZrPujxy+d4q8CUOaiL4dnMgZGL2fzKwBHvgr3D tJEVsEufkxTnyLGW4TQ2xId1y7FI4jJGuIS/anZ6UMZYZDr28wXFo+egPyO0Rbvkz50D wvdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=mTGY90Qq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g8si12010601ejx.558.2021.03.22.14.18.17; Mon, 22 Mar 2021 14:18:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=mTGY90Qq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231486AbhCVVRI (ORCPT + 99 others); Mon, 22 Mar 2021 17:17:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52654 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229526AbhCVVQh (ORCPT ); Mon, 22 Mar 2021 17:16:37 -0400 Received: from mail-io1-xd31.google.com (mail-io1-xd31.google.com [IPv6:2607:f8b0:4864:20::d31]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84A15C061574 for ; Mon, 22 Mar 2021 14:16:36 -0700 (PDT) Received: by mail-io1-xd31.google.com with SMTP id j26so15483162iog.13 for ; Mon, 22 Mar 2021 14:16:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=ayECeS81HT5a5qmHE9lDWqj1EoaigC/VfKD/r0GEF18=; b=mTGY90QqYvQA+ppZtYyFoO/HHOQizhHsaVVXuxxYS+CCLb4mhg6WkoTbCRU43OI2iM WbPjfBD9HYGAA8izueL2BJXEGvJHFPHwD1zvgb+12vjgnIR/JW/pSmB60D40tNWlPfqZ o63IH25jn8WJLZGsCLqmdSujLqajDu2+YPovNvFbOac2wWk/4YkE+4ZkaXWBLjATu2/x kmm57TLHLA6tnhiyGKDMElPRVYMEFGQPcIQaaIwtzpjyd5P8ZpmzrQ5T7NotJ+8Nv+S8 1dXr+wk1HmAHv1EBxY77XYynq5RuOImzNfeJ4oDxIxBxykP2GtxblF3CSMJPQQ7dSB0g 8mmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=ayECeS81HT5a5qmHE9lDWqj1EoaigC/VfKD/r0GEF18=; b=dC3ch1aIgQlnFmUnh1X6+rVQb4AyIR0b5WQJVcuo1aiBDN2VxYn0KGXyI/FfOlg+YV yez4mKDlX8oPT7WALcK/5VxGXuS8uUEGzhVmVC0JP0YOf4xu4GgpVGvJyD7GKHgG0k1p 4FmYMJKTqhHHlTl0LLSOG9R2cWCe13bgBRAzo/bbIUKIPzOQRsYXHYilGTFYL1YVQGYl OMYaWmQ5FQ2flXcA0qo1UzmmSls8cE/7zAWfcesoM2Sr6+IKrR9Ag9x4Nh8MHd7sUgvC apqWsCFTkkLaryRfb46CRwfIxq7lILF/4JhLLMbp5wzQO/UKAbMaYVDVWKWRsKK2LJ9g KYmw== X-Gm-Message-State: AOAM532FdF8sXx40oIWHpEDpvqh/sRWuNUbsNdQvvp/r8p1CUzc3Be4E /K+0uu3+/S0Nk5yB5QjFm1wxpFIlQcCLn4rOb/Q= X-Received: by 2002:a6b:d20e:: with SMTP id q14mr1486822iob.200.1616447795859; Mon, 22 Mar 2021 14:16:35 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: Reply-To: noloader@gmail.com From: Jeffrey Walton Date: Mon, 22 Mar 2021 17:16:08 -0400 Message-ID: Subject: Re: kernel projects for students To: Muni Sekhar Cc: kernelnewbies , LKML Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 22, 2021 at 11:37 AM Muni Sekhar wrote: > > What are some good Linux projects in kernel space for final year > computer.science engineering students? > Could someone help and share your ideas on this please. Hedging deployed cryptography. Hedging can be used to keep the state of a machine unique and the rng's in good working order to minimize/eliminate the risk associated with low entropy devices and virtual machine resets. You would hook the network stack and look for the other party's random secret, like ClientHello.random in SSL/TLS [RFC 5246]. When the data arrives you add it to the machine's entropy pools. In addition to SSL/TLS, you also have SSH and IPsec to grab another party's entropy. I am sure there are others, but SSH, SSL/TLS and IPsec are the ones I would focus on. Also see "When Virtual is Harder than Real: Resource Allocation Challenges in Virtual Machine Based IT Environments," http://static.usenix.org/event/hotos05/final_papers/full_papers/garfinkel/garfinkel.pdf ; and "When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography," http://www.isoc.org/isoc/conferences/ndss/10/pdf/15.pdf . Jeff