* Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk
@ 2017-01-17 13:11 Julian Cordes
2017-01-17 18:13 ` Xin Long
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Julian Cordes @ 2017-01-17 13:11 UTC (permalink / raw)
To: linux-sctp
[-- Attachment #1: Type: text/plain, Size: 438 bytes --]
An INIT-chunk with a FORWARD-TSN-SUPPORTED parameter having a length of
8 bytes is accepted by the linux kernel.
According to the definition in https://tools.ietf.org/html/rfc3758#page-5
the length of this parameter has to be 4 bytes long, so the
implementation should ideally react with an ABORT.
Testscript available at:
https://github.com/nplab/PR_SCTP_Testsuite/blob/master/forward-tsn/error-cases/init-with-forward-tsn-too-long.pkt
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 473 bytes --]
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk
2017-01-17 13:11 Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk Julian Cordes
@ 2017-01-17 18:13 ` Xin Long
2017-01-17 20:03 ` Julian Cordes
2017-01-18 4:38 ` Xin Long
2 siblings, 0 replies; 4+ messages in thread
From: Xin Long @ 2017-01-17 18:13 UTC (permalink / raw)
To: linux-sctp
On Tue, Jan 17, 2017 at 9:11 PM, Julian Cordes <julian.cordes@gmail.com> wrote:
> An INIT-chunk with a FORWARD-TSN-SUPPORTED parameter having a length of
> 8 bytes is accepted by the linux kernel.
> According to the definition in https://tools.ietf.org/html/rfc3758#page-5
> the length of this parameter has to be 4 bytes long, so the
> implementation should ideally react with an ABORT.
>
> Testscript available at:
> https://github.com/nplab/PR_SCTP_Testsuite/blob/master/forward-tsn/error-cases/init-with-forward-tsn-too-long.pkt
To react with an ABORT seems not RFC demands, no clear description for
that actually.
In sctp_verify_param(), sctp does send the necessary ABORT for the
other abnormal params that RFC demands.
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk
2017-01-17 13:11 Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk Julian Cordes
2017-01-17 18:13 ` Xin Long
@ 2017-01-17 20:03 ` Julian Cordes
2017-01-18 4:38 ` Xin Long
2 siblings, 0 replies; 4+ messages in thread
From: Julian Cordes @ 2017-01-17 20:03 UTC (permalink / raw)
To: linux-sctp
2017-01-17 19:13 GMT+01:00 Xin Long <lucien.xin@gmail.com>:
> On Tue, Jan 17, 2017 at 9:11 PM, Julian Cordes <julian.cordes@gmail.com> wrote:
>> An INIT-chunk with a FORWARD-TSN-SUPPORTED parameter having a length of
>> 8 bytes is accepted by the linux kernel.
>> According to the definition in https://tools.ietf.org/html/rfc3758#page-5
>> the length of this parameter has to be 4 bytes long, so the
>> implementation should ideally react with an ABORT.
>>
>> Testscript available at:
>> https://github.com/nplab/PR_SCTP_Testsuite/blob/master/forward-tsn/error-cases/init-with-forward-tsn-too-long.pkt
>
> To react with an ABORT seems not RFC demands, no clear description for
> that actually.
> In sctp_verify_param(), sctp does send the necessary ABORT for the
> other abnormal params that RFC demands.
You are right,
these situations are not specified clearly in the RFC. I have talked
about this with Michael Tüxen before, he has suggested that the
implementation should either silently discard the INIT-Chunk or send
an ABORT-Chunk. The linux implementation accepts at the moment this
invalid INIT-Chunk and replies with an INIT-ACK-Chunk. I am not sure
if this is wanted behaviour?
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk
2017-01-17 13:11 Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk Julian Cordes
2017-01-17 18:13 ` Xin Long
2017-01-17 20:03 ` Julian Cordes
@ 2017-01-18 4:38 ` Xin Long
2 siblings, 0 replies; 4+ messages in thread
From: Xin Long @ 2017-01-18 4:38 UTC (permalink / raw)
To: linux-sctp
On Wed, Jan 18, 2017 at 4:03 AM, Julian Cordes <julian.cordes@gmail.com> wrote:
> 2017-01-17 19:13 GMT+01:00 Xin Long <lucien.xin@gmail.com>:
>> On Tue, Jan 17, 2017 at 9:11 PM, Julian Cordes <julian.cordes@gmail.com> wrote:
>>> An INIT-chunk with a FORWARD-TSN-SUPPORTED parameter having a length of
>>> 8 bytes is accepted by the linux kernel.
>>> According to the definition in https://tools.ietf.org/html/rfc3758#page-5
>>> the length of this parameter has to be 4 bytes long, so the
>>> implementation should ideally react with an ABORT.
>>>
>>> Testscript available at:
>>> https://github.com/nplab/PR_SCTP_Testsuite/blob/master/forward-tsn/error-cases/init-with-forward-tsn-too-long.pkt
>>
>> To react with an ABORT seems not RFC demands, no clear description for
>> that actually.
>> In sctp_verify_param(), sctp does send the necessary ABORT for the
>> other abnormal params that RFC demands.
>
> You are right,
> these situations are not specified clearly in the RFC. I have talked
> about this with Michael Tüxen before, he has suggested that the
> implementation should either silently discard the INIT-Chunk or send
> an ABORT-Chunk. The linux implementation accepts at the moment this
> invalid INIT-Chunk and replies with an INIT-ACK-Chunk. I am not sure
> if this is wanted behaviour?
It maybe just forget to check it, will think about it, and I need to check if
other params' processing also has the similar issue.
Thanks.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2017-01-18 4:38 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-01-17 13:11 Issue with handling too long FORWARD-TSN-SUPPORTED parameter in INIT chunk Julian Cordes
2017-01-17 18:13 ` Xin Long
2017-01-17 20:03 ` Julian Cordes
2017-01-18 4:38 ` Xin Long
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).