* [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid
@ 2008-08-18 6:00 Wei Yongjun
2008-08-18 15:18 ` [PATCHv2] dccp: Do not send Dccp-Sync after received Gerrit Renker
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Wei Yongjun @ 2008-08-18 6:00 UTC (permalink / raw)
To: dccp
RFC4340 said:
7.5.4. Handling Sequence-Invalid Packets
o A sequence-invalid DCCP-Reset packet MUST elicit a DCCP-Sync
packet in response (subject to a possible rate limit). This
response packet MUST use a new Sequence Number, and thus will
increase GSS; GSR will not change, however, since the received
packet was sequence-invalid. The response packet's
Acknowledgement Number MUST equal GSR.
But reponse to a sequence-invalid DCCP-Reset with acknowledgement
number equal to GSR will help to attack for sequence number. The
attack method as the following:
Endpoint A Endpoint B
(OPEN)
Dccp-Request ---------------->
(SEQ=X)
<---------------- SYNC
(SEQ=GSS+1, ACK=X)
Dccp-Reset ---------------->
(SEQ=X+1, ACK=GSS+1)
<---------------- SYNC
(SEQ=GSS+2, ACK=GSR)
X = invalid sequence number
GSS = sequence number of endpoint B
GSR = sequence number of endpoint A
After we received SYNC from endpoint B, we known the sequence number
of both side.
The best way to avoid this is not send Dccp-Sync after received
sequence-invalid Dccp-Reset.
Signed-off-by: Wei Yongjun <yjwei@cn.fujitsu.com>
---
net/dccp/input.c | 8 ++++++--
1 files changed, 6 insertions(+), 2 deletions(-)
diff --git a/net/dccp/input.c b/net/dccp/input.c
index 71b24d4..fdb3c2c 100644
--- a/net/dccp/input.c
+++ b/net/dccp/input.c
@@ -242,6 +242,12 @@ static int dccp_check_seqno(struct sock *sk, struct sk_buff *skb)
if (dh->dccph_type != DCCP_PKT_SYNC &&
(ackno != DCCP_PKT_WITHOUT_ACK_SEQ))
dp->dccps_gar = ackno;
+ } else if (dh->dccph_type = DCCP_PKT_RESET) {
+ /*
+ * Ignore sequence-invalid Dccp-Reset to avoid sequence numbers
+ * attack.
+ */
+ return -1;
} else {
unsigned long now = jiffies;
/*
@@ -273,8 +279,6 @@ static int dccp_check_seqno(struct sock *sk, struct sk_buff *skb)
dp->dccps_rate_last = now;
- if (dh->dccph_type = DCCP_PKT_RESET)
- seqno = dp->dccps_gsr;
dccp_send_sync(sk, seqno, DCCP_PKT_SYNC);
return -1;
}
--
1.5.3.8
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCHv2] dccp: Do not send Dccp-Sync after received
2008-08-18 6:00 [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Wei Yongjun
@ 2008-08-18 15:18 ` Gerrit Renker
2008-08-18 21:23 ` [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Eddie Kohler
2008-08-19 0:32 ` Wei Yongjun
2 siblings, 0 replies; 4+ messages in thread
From: Gerrit Renker @ 2008-08-18 15:18 UTC (permalink / raw)
To: dccp
> 7.5.4. Handling Sequence-Invalid Packets
>
> o A sequence-invalid DCCP-Reset packet MUST elicit a DCCP-Sync
> packet in response (subject to a possible rate limit). This
> response packet MUST use a new Sequence Number, and thus will
> increase GSS; GSR will not change, however, since the received
> packet was sequence-invalid. The response packet's
> Acknowledgement Number MUST equal GSR.
>
> But reponse to a sequence-invalid DCCP-Reset with acknowledgement
> number equal to GSR will help to attack for sequence number. The
> attack method as the following:
>
> Endpoint A Endpoint B
> (OPEN)
> Dccp-Request ---------------->
> (SEQ=X)
> <---------------- SYNC
> (SEQ=GSS+1, ACK=X)
> Dccp-Reset ---------------->
> (SEQ=X+1, ACK=GSS+1)
> <---------------- SYNC
> (SEQ=GSS+2, ACK=GSR)
>
> X = invalid sequence number
> GSS = sequence number of endpoint B
> GSR = sequence number of endpoint A
>
The requiremement of using GSR here is related to fixing another bug which
leads to a flood of Sync/Reset packets. A description of that bug is on
http://www.mail-archive.com/dccp@vger.kernel.org/msg01594.html
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid
2008-08-18 6:00 [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Wei Yongjun
2008-08-18 15:18 ` [PATCHv2] dccp: Do not send Dccp-Sync after received Gerrit Renker
@ 2008-08-18 21:23 ` Eddie Kohler
2008-08-19 0:32 ` Wei Yongjun
2 siblings, 0 replies; 4+ messages in thread
From: Eddie Kohler @ 2008-08-18 21:23 UTC (permalink / raw)
To: dccp
Gerrit Renker wrote:
>> 7.5.4. Handling Sequence-Invalid Packets
>>
>> o A sequence-invalid DCCP-Reset packet MUST elicit a DCCP-Sync
>> packet in response (subject to a possible rate limit). This
>> response packet MUST use a new Sequence Number, and thus will
>> increase GSS; GSR will not change, however, since the received
>> packet was sequence-invalid. The response packet's
>> Acknowledgement Number MUST equal GSR.
>>
>> But reponse to a sequence-invalid DCCP-Reset with acknowledgement
>> number equal to GSR will help to attack for sequence number. ...
>
> The requiremement of using GSR here is related to fixing another bug which
> leads to a flood of Sync/Reset packets. A description of that bug is on
> http://www.mail-archive.com/dccp@vger.kernel.org/msg01594.html
Furthermore, Yongjun, I don't see how this is an "attack." DCCP is not robust
against an attacker who can receive packets in the relevant connection, such
as the two DCCP-Syncs in your example. Your attack is out of the threat model.
Eddie
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid
2008-08-18 6:00 [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Wei Yongjun
2008-08-18 15:18 ` [PATCHv2] dccp: Do not send Dccp-Sync after received Gerrit Renker
2008-08-18 21:23 ` [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Eddie Kohler
@ 2008-08-19 0:32 ` Wei Yongjun
2 siblings, 0 replies; 4+ messages in thread
From: Wei Yongjun @ 2008-08-19 0:32 UTC (permalink / raw)
To: dccp
Eddie Kohler wrote:
> Gerrit Renker wrote:
>>> 7.5.4. Handling Sequence-Invalid Packets
>>>
>>> o A sequence-invalid DCCP-Reset packet MUST elicit a DCCP-Sync
>>> packet in response (subject to a possible rate limit). This
>>> response packet MUST use a new Sequence Number, and thus will
>>> increase GSS; GSR will not change, however, since the received
>>> packet was sequence-invalid. The response packet's
>>> Acknowledgement Number MUST equal GSR.
>>>
>>> But reponse to a sequence-invalid DCCP-Reset with acknowledgement
>>> number equal to GSR will help to attack for sequence number. ...
> >
>> The requiremement of using GSR here is related to fixing another bug
>> which
>> leads to a flood of Sync/Reset packets. A description of that bug is on
>> http://www.mail-archive.com/dccp@vger.kernel.org/msg01594.html
>
> Furthermore, Yongjun, I don't see how this is an "attack." DCCP is
> not robust against an attacker who can receive packets in the relevant
> connection, such as the two DCCP-Syncs in your example. Your attack
> is out of the threat model.
>
I misunderstood the sequence number attack.^_^
Thanks
Wei Yongjun
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2008-08-19 0:32 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-08-18 6:00 [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Wei Yongjun
2008-08-18 15:18 ` [PATCHv2] dccp: Do not send Dccp-Sync after received Gerrit Renker
2008-08-18 21:23 ` [PATCHv2] dccp: Do not send Dccp-Sync after received sequence-invalid Eddie Kohler
2008-08-19 0:32 ` Wei Yongjun
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.