Message ID | 1487759036-2800-1-git-send-email-alexey.kodanev@oracle.com |
---|---|
State | Accepted, archived |
Delegated to: | David Miller |
Headers | show |
On Wed, 2017-02-22 at 13:23 +0300, Alexey Kodanev wrote: > Found that when randomized tcp offsets are enabled (by default) > TCP client can still start new connections without them. Later, > if server does active close and re-uses sockets in TIME-WAIT > state, new SYN from client can be rejected on PAWS check inside > tcp_timewait_state_process(), because either tw_ts_recent or > rcv_tsval doesn't really have an offset set. > > Here is how to reproduce it with LTP netstress tool: > netstress -R 1 & > netstress -H 127.0.0.1 -lr 1000000 -a1 > > [...] > < S seq 1956977072 win 43690 TS val 295618 ecr 459956970 > > . ack 1956911535 win 342 TS val 459967184 ecr 1547117608 > < R seq 1956911535 win 0 length 0 > +1. < S seq 1956977072 win 43690 TS val 296640 ecr 459956970 > > S. seq 657450664 ack 1956977073 win 43690 TS val 459968205 ecr 296640 > > Fixes: 95a22caee396 ("tcp: randomize tcp timestamp offsets for each connection") > Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com> > --- > v2: * remove 'else if' clause and add new variable 'seq' to store tmp result, > * change slightly the subject and commit message. > > net/ipv4/tcp_ipv4.c | 16 ++++++++++------ > net/ipv6/tcp_ipv6.c | 16 ++++++++++------ > 2 files changed, 20 insertions(+), 12 deletions(-) > > diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c > index fe9da4f..c5169b8 100644 > --- a/net/ipv4/tcp_ipv4.c > +++ b/net/ipv4/tcp_ipv4.c > @@ -145,6 +145,7 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) > struct flowi4 *fl4; > struct rtable *rt; > int err; > + u32 seq; > struct ip_options_rcu *inet_opt; > > if (addr_len < sizeof(struct sockaddr_in)) > @@ -232,12 +233,15 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) > sk->sk_gso_type = SKB_GSO_TCPV4; > sk_setup_caps(sk, &rt->dst); > > - if (!tp->write_seq && likely(!tp->repair)) > - tp->write_seq = secure_tcp_sequence_number(inet->inet_saddr, > - inet->inet_daddr, > - inet->inet_sport, > - usin->sin_port, > - &tp->tsoffset); > + if (likely(!tp->repair)) { > + seq = secure_tcp_sequence_number(inet->inet_saddr, > + inet->inet_daddr, > + inet->inet_sport, > + usin->sin_port, > + &tp->tsoffset); > + if (!tp->write_seq) > + tp->write_seq = seq; > + } > Nice catch ! secure_tcp_sequence_number() could be renamed, because it has two purposes really. Acked-by: Eric Dumazet <edumazet@google.com>
On 02/22/2017 04:17 PM, Eric Dumazet wrote: > On Wed, 2017-02-22 at 13:23 +0300, Alexey Kodanev wrote: >> ... >> >> diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c >> index fe9da4f..c5169b8 100644 >> --- a/net/ipv4/tcp_ipv4.c >> +++ b/net/ipv4/tcp_ipv4.c >> @@ -145,6 +145,7 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) >> struct flowi4 *fl4; >> struct rtable *rt; >> int err; >> + u32 seq; >> struct ip_options_rcu *inet_opt; >> >> if (addr_len < sizeof(struct sockaddr_in)) >> @@ -232,12 +233,15 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) >> sk->sk_gso_type = SKB_GSO_TCPV4; >> sk_setup_caps(sk, &rt->dst); >> >> - if (!tp->write_seq && likely(!tp->repair)) >> - tp->write_seq = secure_tcp_sequence_number(inet->inet_saddr, >> - inet->inet_daddr, >> - inet->inet_sport, >> - usin->sin_port, >> - &tp->tsoffset); >> + if (likely(!tp->repair)) { >> + seq = secure_tcp_sequence_number(inet->inet_saddr, >> + inet->inet_daddr, >> + inet->inet_sport, >> + usin->sin_port, >> + &tp->tsoffset); >> + if (!tp->write_seq) >> + tp->write_seq = seq; >> + } >> > Nice catch ! > > secure_tcp_sequence_number() could be renamed, because it has two > purposes really. What about "secure_tcp_seq_and_tsoff(...)" ? Also, tcp_v4_init_sequence(...) -> tcp_v4_init_seq_and_tsoff(...) tcp_v6_init_sequence(...) -> tcp_v6_init_seq_and_tsoff(...) Thanks, Alexey
From: Alexey Kodanev <alexey.kodanev@oracle.com> Date: Wed, 22 Feb 2017 13:23:55 +0300 > Found that when randomized tcp offsets are enabled (by default) > TCP client can still start new connections without them. Later, > if server does active close and re-uses sockets in TIME-WAIT > state, new SYN from client can be rejected on PAWS check inside > tcp_timewait_state_process(), because either tw_ts_recent or > rcv_tsval doesn't really have an offset set. > > Here is how to reproduce it with LTP netstress tool: > netstress -R 1 & > netstress -H 127.0.0.1 -lr 1000000 -a1 > > [...] > < S seq 1956977072 win 43690 TS val 295618 ecr 459956970 > > . ack 1956911535 win 342 TS val 459967184 ecr 1547117608 > < R seq 1956911535 win 0 length 0 > +1. < S seq 1956977072 win 43690 TS val 296640 ecr 459956970 > > S. seq 657450664 ack 1956977073 win 43690 TS val 459968205 ecr 296640 > > Fixes: 95a22caee396 ("tcp: randomize tcp timestamp offsets for each connection") > Signed-off-by: Alexey Kodanev <alexey.kodanev@oracle.com> Applied.
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index fe9da4f..c5169b8 100644 --- a/net/ipv4/tcp_ipv4.c +++ b/net/ipv4/tcp_ipv4.c @@ -145,6 +145,7 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) struct flowi4 *fl4; struct rtable *rt; int err; + u32 seq; struct ip_options_rcu *inet_opt; if (addr_len < sizeof(struct sockaddr_in)) @@ -232,12 +233,15 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) sk->sk_gso_type = SKB_GSO_TCPV4; sk_setup_caps(sk, &rt->dst); - if (!tp->write_seq && likely(!tp->repair)) - tp->write_seq = secure_tcp_sequence_number(inet->inet_saddr, - inet->inet_daddr, - inet->inet_sport, - usin->sin_port, - &tp->tsoffset); + if (likely(!tp->repair)) { + seq = secure_tcp_sequence_number(inet->inet_saddr, + inet->inet_daddr, + inet->inet_sport, + usin->sin_port, + &tp->tsoffset); + if (!tp->write_seq) + tp->write_seq = seq; + } inet->inet_id = tp->write_seq ^ jiffies; diff --git a/net/ipv6/tcp_ipv6.c b/net/ipv6/tcp_ipv6.c index 4c60c6f..e49a273 100644 --- a/net/ipv6/tcp_ipv6.c +++ b/net/ipv6/tcp_ipv6.c @@ -123,6 +123,7 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr, struct dst_entry *dst; int addr_type; int err; + u32 seq; if (addr_len < SIN6_LEN_RFC2133) return -EINVAL; @@ -284,12 +285,15 @@ static int tcp_v6_connect(struct sock *sk, struct sockaddr *uaddr, sk_set_txhash(sk); - if (!tp->write_seq && likely(!tp->repair)) - tp->write_seq = secure_tcpv6_sequence_number(np->saddr.s6_addr32, - sk->sk_v6_daddr.s6_addr32, - inet->inet_sport, - inet->inet_dport, - &tp->tsoffset); + if (likely(!tp->repair)) { + seq = secure_tcpv6_sequence_number(np->saddr.s6_addr32, + sk->sk_v6_daddr.s6_addr32, + inet->inet_sport, + inet->inet_dport, + &tp->tsoffset); + if (!tp->write_seq) + tp->write_seq = seq; + } err = tcp_connect(sk); if (err)