Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Apr 2005 14:29:34 +0000 (UTC)
From:      Andre Oppermann <andre@FreeBSD.org>
To:        src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/sys/netinet ip_icmp.c ip_icmp.h tcp_subr.c
Message-ID:  <200504211429.j3LETYoT018408@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
andre       2005-04-21 14:29:34 UTC

  FreeBSD src repository

  Modified files:
    sys/netinet          ip_icmp.c ip_icmp.h tcp_subr.c 
  Log:
  Move Path MTU discovery ICMP processing from icmp_input() to
  tcp_ctlinput() and subject it to active tcpcb and sequence
  number checking.  Previously any ICMP unreachable/needfrag
  message would cause an update to the TCP hostcache.  Now only
  ICMP PMTU messages belonging to an active TCP session with
  the correct src/dst/port and sequence number will update the
  hostcache and complete the path MTU discovery process.
  
  Note that we don't entirely implement the recommended counter
  measures of Section 7.2 of the paper.  However we close down
  the possible degradation vector from trivially easy to really
  complex and resource intensive.  In addition we have limited
  the smallest acceptable MTU with net.inet.tcp.minmss sysctl
  for some time already, further reducing the effect of any
  degradation due to an attack.
  
  Security:       draft-gont-tcpm-icmp-attacks-03.txt Section 7.2
  MFC after:      3 days
  
  Revision  Changes    Path
  1.99      +1 -45     src/sys/netinet/ip_icmp.c
  1.24      +1 -0      src/sys/netinet/ip_icmp.h
  1.223     +36 -7     src/sys/netinet/tcp_subr.c



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200504211429.j3LETYoT018408>