From: Greg KH <gregkh@suse.de>
To: linux-kernel@vger.kernel.org, stable@kernel.org
Cc: Justin Forbes <jmforbes@linuxtx.org>,
Zwane Mwaikambo <zwane@arm.linux.org.uk>,
"Theodore Ts'o" <tytso@mit.edu>,
Randy Dunlap <rdunlap@xenotime.net>,
Dave Jones <davej@redhat.com>,
Chuck Wolber <chuckw@quantumlinux.com>,
Chris Wedgwood <reviews@ml.cw.f00f.org>,
Michael Krufky <mkrufky@linuxtv.org>,
Chuck Ebbert <cebbert@redhat.com>,
Domenico Andreoli <cavokz@gmail.com>,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
alan@lxorguk.ukuu.org.uk,
Netfilter Development Mailinglist
<netfilter-devel@vger.kernel.org>,
"David S. Miller" <davem@davemloft.net>,
Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>,
Patrick McHardy <kaber@trash.net>
Subject: [patch 02/38] NETFILTER: nf_conntrack_tcp: conntrack reopening fix
Date: Fri, 22 Feb 2008 16:29:34 -0800 [thread overview]
Message-ID: <20080223002934.GC7268@suse.de> (raw)
In-Reply-To: <20080223002907.GA7268@suse.de>
[-- Attachment #1: netfilter-nf_conntrack_tcp-conntrack-reopening-fix.patch --]
[-- Type: text/plain, Size: 4114 bytes --]
2.6.24-stable review patch. If anyone has any objections, please let us
know.
------------------
From: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
[NETFILTER]: nf_conntrack_tcp: conntrack reopening fix
[Upstream commits b2155e7f + d0c1fd7a]
TCP connection tracking in netfilter did not handle TCP reopening
properly: active close was taken into account for one side only and
not for any side, which is fixed now. The patch includes more comments
to explain the logic how the different cases are handled.
The bug was discovered by Jeff Chua.
Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
--- a/net/netfilter/nf_conntrack_proto_tcp.c
+++ b/net/netfilter/nf_conntrack_proto_tcp.c
@@ -135,7 +135,7 @@ enum tcp_bit_set {
* CLOSE_WAIT: ACK seen (after FIN)
* LAST_ACK: FIN seen (after FIN)
* TIME_WAIT: last ACK seen
- * CLOSE: closed connection
+ * CLOSE: closed connection (RST)
*
* LISTEN state is not used.
*
@@ -834,8 +834,21 @@ static int tcp_packet(struct nf_conn *conntrack,
case TCP_CONNTRACK_SYN_SENT:
if (old_state < TCP_CONNTRACK_TIME_WAIT)
break;
- if ((conntrack->proto.tcp.seen[!dir].flags &
- IP_CT_TCP_FLAG_CLOSE_INIT)
+ /* RFC 1122: "When a connection is closed actively,
+ * it MUST linger in TIME-WAIT state for a time 2xMSL
+ * (Maximum Segment Lifetime). However, it MAY accept
+ * a new SYN from the remote TCP to reopen the connection
+ * directly from TIME-WAIT state, if..."
+ * We ignore the conditions because we are in the
+ * TIME-WAIT state anyway.
+ *
+ * Handle aborted connections: we and the server
+ * think there is an existing connection but the client
+ * aborts it and starts a new one.
+ */
+ if (((conntrack->proto.tcp.seen[dir].flags
+ | conntrack->proto.tcp.seen[!dir].flags)
+ & IP_CT_TCP_FLAG_CLOSE_INIT)
|| (conntrack->proto.tcp.last_dir == dir
&& conntrack->proto.tcp.last_index == TCP_RST_SET)) {
/* Attempt to reopen a closed/aborted connection.
@@ -848,18 +861,25 @@ static int tcp_packet(struct nf_conn *conntrack,
}
/* Fall through */
case TCP_CONNTRACK_IGNORE:
- /* Ignored packets:
+ /* Ignored packets:
+ *
+ * Our connection entry may be out of sync, so ignore
+ * packets which may signal the real connection between
+ * the client and the server.
*
* a) SYN in ORIGINAL
* b) SYN/ACK in REPLY
* c) ACK in reply direction after initial SYN in original.
+ *
+ * If the ignored packet is invalid, the receiver will send
+ * a RST we'll catch below.
*/
if (index == TCP_SYNACK_SET
&& conntrack->proto.tcp.last_index == TCP_SYN_SET
&& conntrack->proto.tcp.last_dir != dir
&& ntohl(th->ack_seq) ==
conntrack->proto.tcp.last_end) {
- /* This SYN/ACK acknowledges a SYN that we earlier
+ /* b) This SYN/ACK acknowledges a SYN that we earlier
* ignored as invalid. This means that the client and
* the server are both in sync, while the firewall is
* not. We kill this session and block the SYN/ACK so
@@ -884,7 +904,7 @@ static int tcp_packet(struct nf_conn *conntrack,
write_unlock_bh(&tcp_lock);
if (LOG_INVALID(IPPROTO_TCP))
nf_log_packet(pf, 0, skb, NULL, NULL, NULL,
- "nf_ct_tcp: invalid packed ignored ");
+ "nf_ct_tcp: invalid packet ignored ");
return NF_ACCEPT;
case TCP_CONNTRACK_MAX:
/* Invalid packet */
@@ -938,8 +958,7 @@ static int tcp_packet(struct nf_conn *conntrack,
conntrack->proto.tcp.state = new_state;
if (old_state != new_state
- && (new_state == TCP_CONNTRACK_FIN_WAIT
- || new_state == TCP_CONNTRACK_CLOSE))
+ && new_state == TCP_CONNTRACK_FIN_WAIT)
conntrack->proto.tcp.seen[dir].flags |= IP_CT_TCP_FLAG_CLOSE_INIT;
timeout = conntrack->proto.tcp.retrans >= nf_ct_tcp_max_retrans
&& *tcp_timeouts[new_state] > nf_ct_tcp_timeout_max_retrans
_______________________________________________
stable mailing list
stable@linux.kernel.org
http://linux.kernel.org/mailman/listinfo/stable
--
next prev parent reply other threads:[~2008-02-23 0:34 UTC|newest]
Thread overview: 51+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20080223001946.979768610@mini.kroah.org>
2008-02-23 0:29 ` [patch 00/38] 2.6.24-stable review Greg KH
2008-02-23 0:29 ` [patch 01/38] SPARC/SPARC64: Fix usage of .section .sched.text in assembler code Greg KH
2008-02-23 0:29 ` Greg KH [this message]
2008-02-23 0:29 ` [patch 03/38] NFS: Fix a potential file corruption issue when writing Greg KH
2008-02-23 0:29 ` [patch 04/38] inotify: fix check for one-shot watches before destroying them Greg KH
2008-02-23 0:29 ` [patch 05/38] hugetlb: add locking for overcommit sysctl Greg KH
2008-02-23 0:29 ` [patch 06/38] quota: turn quotas off when remounting read-only Greg KH
2008-02-25 21:57 ` Jan Kara
2008-02-25 23:56 ` Greg KH
2008-02-23 0:29 ` [patch 07/38] XFS: Fix oops in xfs_file_readdir() Greg KH
2008-02-23 0:30 ` [patch 08/38] Fix dl2k constants Greg KH
2008-02-23 0:30 ` [patch 09/38] SCSI: sd: handle bad lba in sense information Greg KH
2008-02-23 0:30 ` [patch 10/38] TCP: Fix a bug in strategy_allowed_congestion_control Greg KH
2008-02-23 0:30 ` [patch 11/38] TC: oops in em_meta Greg KH
2008-02-23 0:30 ` [patch 12/38] SELinux: Fix double free in selinux_netlbl_sock_setsid() Greg KH
2008-02-23 0:30 ` [patch 13/38] PKT_SCHED: ematch: oops from uninitialized variable (resend) Greg KH
2008-02-23 0:30 ` [patch 14/38] NET: Add if_addrlabel.h to sanitized headers Greg KH
2008-02-23 0:30 ` [patch 15/38] IPV4: fib_trie: apply fixes from fib_hash Greg KH
2008-02-23 0:30 ` [patch 16/38] IPV4: fib: fix route replacement, fib_info is shared Greg KH
2008-02-23 0:30 ` [patch 17/38] IPCOMP: Fix reception of incompressible packets Greg KH
2008-02-23 0:30 ` [patch 18/38] IPCOMP: Fetch nexthdr before ipch is destroyed Greg KH
2008-02-23 0:30 ` [patch 19/38] INET_DIAG: Fix inet_diag_lock_handler error path Greg KH
2008-02-23 0:30 ` [patch 20/38] INET: Prevent out-of-sync truesize on ip_fragment slow path Greg KH
2008-02-23 0:30 ` [patch 21/38] BLUETOOTH: Add conn add/del workqueues to avoid connection fail Greg KH
2008-02-23 0:30 ` [patch 22/38] AUDIT: Increase skb->truesize in audit_expand Greg KH
2008-02-23 0:30 ` [patch 23/38] Be more robust about bad arguments in get_user_pages() Greg KH
2008-02-23 0:31 ` [patch 24/38] Disable G5 NAP mode during SMU commands on U3 Greg KH
2008-02-23 0:31 ` [patch 25/38] hrtimer: fix *rmtp handling in hrtimer_nanosleep() Greg KH
2008-02-23 0:31 ` [patch 26/38] hrtimer: fix *rmtp/restarts handling in compat_sys_nanosleep() Greg KH
2008-02-23 0:31 ` [patch 27/38] SLUB: Deal with annoying gcc warning on kfree() Greg KH
2008-02-23 0:31 ` [patch 28/38] hrtimer: check relative timeouts for overflow Greg KH
2008-02-23 0:31 ` [patch 29/38] hrtimer: catch expired CLOCK_REALTIME timers early Greg KH
2008-02-23 0:31 ` [patch 30/38] genirq: do not leave interupts enabled on free_irq Greg KH
2008-02-23 0:31 ` [patch 31/38] S390: Fix futex_atomic_cmpxchg_std inline assembly Greg KH
2008-02-23 0:31 ` [patch 32/38] USB: fix pm counter leak in usblp Greg KH
2008-02-23 0:31 ` [patch 33/38] SCSI: gdth: scan for scsi devices Greg KH
2008-02-23 3:02 ` Boaz Harrosh
2008-02-23 3:52 ` [stable] " Greg KH
2008-02-23 4:15 ` James Bottomley
2008-02-23 0:31 ` [patch 34/38] kbuild: allow -fstack-protector to take effect Greg KH
2008-02-23 0:46 ` Arjan van de Ven
2008-02-23 0:53 ` Greg KH
2008-02-23 3:41 ` Sam Ravnborg
2008-02-23 3:53 ` [stable] " Greg KH
2008-02-23 6:29 ` Sam Ravnborg
2008-02-23 0:31 ` [patch 35/38] PCMCIA: Fix station address detection in smc Greg KH
2008-02-23 0:31 ` [patch 36/38] POWERPC: Revert chrp_pci_fixup_vt8231_ata devinit to fix libata on pegasos Greg KH
2008-02-23 0:31 ` [patch 37/38] bonding: fix NULL pointer deref in startup processing Greg KH
2008-02-23 0:31 ` [patch 38/38] x86_64: CPA, fix cache attribute inconsistency bug Greg KH
2008-02-23 16:56 ` [patch 00/38] 2.6.24-stable review Chuck Ebbert
2008-02-24 14:55 ` Uli Luckas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080223002934.GC7268@suse.de \
--to=gregkh@suse.de \
--cc=akpm@linux-foundation.org \
--cc=alan@lxorguk.ukuu.org.uk \
--cc=cavokz@gmail.com \
--cc=cebbert@redhat.com \
--cc=chuckw@quantumlinux.com \
--cc=davej@redhat.com \
--cc=davem@davemloft.net \
--cc=jmforbes@linuxtx.org \
--cc=kaber@trash.net \
--cc=kadlec@blackhole.kfki.hu \
--cc=linux-kernel@vger.kernel.org \
--cc=mkrufky@linuxtv.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=rdunlap@xenotime.net \
--cc=reviews@ml.cw.f00f.org \
--cc=stable@kernel.org \
--cc=torvalds@linux-foundation.org \
--cc=tytso@mit.edu \
--cc=zwane@arm.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox