Searched hist:"282 f23c6ee343126156dd41218b22ece96d747e3" (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/net/ipv4/ |
H A D | proc.c | diff 282f23c6ee343126156dd41218b22ece96d747e3 Tue Jul 17 03:13:05 CDT 2012 Eric Dumazet <edumazet@google.com> tcp: implement RFC 5961 3.2
Implement the RFC 5691 mitigation against Blind Reset attack using RST bit.
Idea is to validate incoming RST sequence, to match RCV.NXT value, instead of previouly accepted window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)
If sequence is in window but not an exact match, send a "challenge ACK", so that the other part can resend an RST with the appropriate sequence.
Add a new sysctl, tcp_challenge_ack_limit, to limit number of challenge ACK sent per second.
Add a new SNMP counter to count number of challenge acks sent. (netstat -s | grep TCPChallengeACK)
Signed-off-by: Eric Dumazet <edumazet@google.com> Cc: Kiran Kumar Kella <kkiran@broadcom.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | sysctl_net_ipv4.c | diff 282f23c6ee343126156dd41218b22ece96d747e3 Tue Jul 17 03:13:05 CDT 2012 Eric Dumazet <edumazet@google.com> tcp: implement RFC 5961 3.2
Implement the RFC 5691 mitigation against Blind Reset attack using RST bit.
Idea is to validate incoming RST sequence, to match RCV.NXT value, instead of previouly accepted window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)
If sequence is in window but not an exact match, send a "challenge ACK", so that the other part can resend an RST with the appropriate sequence.
Add a new sysctl, tcp_challenge_ack_limit, to limit number of challenge ACK sent per second.
Add a new SNMP counter to count number of challenge acks sent. (netstat -s | grep TCPChallengeACK)
Signed-off-by: Eric Dumazet <edumazet@google.com> Cc: Kiran Kumar Kella <kkiran@broadcom.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | tcp_input.c | diff 282f23c6ee343126156dd41218b22ece96d747e3 Tue Jul 17 03:13:05 CDT 2012 Eric Dumazet <edumazet@google.com> tcp: implement RFC 5961 3.2
Implement the RFC 5691 mitigation against Blind Reset attack using RST bit.
Idea is to validate incoming RST sequence, to match RCV.NXT value, instead of previouly accepted window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)
If sequence is in window but not an exact match, send a "challenge ACK", so that the other part can resend an RST with the appropriate sequence.
Add a new sysctl, tcp_challenge_ack_limit, to limit number of challenge ACK sent per second.
Add a new SNMP counter to count number of challenge acks sent. (netstat -s | grep TCPChallengeACK)
Signed-off-by: Eric Dumazet <edumazet@google.com> Cc: Kiran Kumar Kella <kkiran@broadcom.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/include/net/ |
H A D | tcp.h | diff 282f23c6ee343126156dd41218b22ece96d747e3 Tue Jul 17 03:13:05 CDT 2012 Eric Dumazet <edumazet@google.com> tcp: implement RFC 5961 3.2
Implement the RFC 5691 mitigation against Blind Reset attack using RST bit.
Idea is to validate incoming RST sequence, to match RCV.NXT value, instead of previouly accepted window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)
If sequence is in window but not an exact match, send a "challenge ACK", so that the other part can resend an RST with the appropriate sequence.
Add a new sysctl, tcp_challenge_ack_limit, to limit number of challenge ACK sent per second.
Add a new SNMP counter to count number of challenge acks sent. (netstat -s | grep TCPChallengeACK)
Signed-off-by: Eric Dumazet <edumazet@google.com> Cc: Kiran Kumar Kella <kkiran@broadcom.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|