diff options
author | 2023-10-23 20:22:08 +0100 | |
---|---|---|
committer | 2023-10-27 10:35:45 +0100 | |
commit | 953af8e3acb68d2db11937cec3bc5da31de5c12e (patch) | |
tree | 2c56c02d543050285dd073b65827682066114e26 /net/unix/af_unix.c | |
parent | net/tcp: Add tcp_hash_fail() ratelimited logs (diff) | |
download | wireguard-linux-953af8e3acb68d2db11937cec3bc5da31de5c12e.tar.xz wireguard-linux-953af8e3acb68d2db11937cec3bc5da31de5c12e.zip |
net/tcp: Ignore specific ICMPs for TCP-AO connections
Similarly to IPsec, RFC5925 prescribes:
">> A TCP-AO implementation MUST default to ignore incoming ICMPv4
messages of Type 3 (destination unreachable), Codes 2-4 (protocol
unreachable, port unreachable, and fragmentation needed -- ’hard
errors’), and ICMPv6 Type 1 (destination unreachable), Code 1
(administratively prohibited) and Code 4 (port unreachable) intended
for connections in synchronized states (ESTABLISHED, FIN-WAIT-1, FIN-
WAIT-2, CLOSE-WAIT, CLOSING, LAST-ACK, TIME-WAIT) that match MKTs."
A selftest (later in patch series) verifies that this attack is not
possible in this TCP-AO implementation.
Co-developed-by: Francesco Ruggeri <fruggeri@arista.com>
Signed-off-by: Francesco Ruggeri <fruggeri@arista.com>
Co-developed-by: Salam Noureddine <noureddine@arista.com>
Signed-off-by: Salam Noureddine <noureddine@arista.com>
Signed-off-by: Dmitry Safonov <dima@arista.com>
Acked-by: David Ahern <dsahern@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions