Re: [PATCH nf-next] netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 21, 2022 at 10:44:39AM +0100, Pablo Neira Ayuso wrote:
> On Mon, Mar 21, 2022 at 10:42:05AM +0100, Pablo Neira Ayuso wrote:
> > When tcp_options is called all flags are cleared.
> > When the IP_CT_TCP_FLAG_BE_LIBERAL is set it should be preserved
> > otherwise such connections will fail in the window check.
> 
> 
> This patch completes 8437a6209f76 ("netfilter: nft_flow_offload: set liberal tracking mode for tcp")
> 
> I'm going to send v2 to add a wrapper function to update these flags,
> so we do not accidentally reset IP_CT_TCP_FLAG_BE_LIBERAL.

Hm. Actually I don't see a clear way to add such wrapper function, so
patch LGTM as is.

> > Signed-off-by: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
> > Signed-off-by: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
> > ---
> > Supersedes: https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220318144939.69465-1-pablo@xxxxxxxxxxxxx/ which is not correct, it breaks TCP FIN handling.
> > 
> >  net/netfilter/nf_conntrack_proto_tcp.c | 6 ++++--
> >  1 file changed, 4 insertions(+), 2 deletions(-)
> > 
> > diff --git a/net/netfilter/nf_conntrack_proto_tcp.c b/net/netfilter/nf_conntrack_proto_tcp.c
> > index d1582b888c0d..d8599ab5f767 100644
> > --- a/net/netfilter/nf_conntrack_proto_tcp.c
> > +++ b/net/netfilter/nf_conntrack_proto_tcp.c
> > @@ -342,7 +342,7 @@ static void tcp_options(const struct sk_buff *skb,
> >  		return;
> >  
> >  	state->td_scale =
> > -	state->flags = 0;
> > +	state->flags &= IP_CT_TCP_FLAG_BE_LIBERAL;
> >  
> >  	while (length > 0) {
> >  		int opcode=*ptr++;
> > @@ -873,7 +873,7 @@ int nf_conntrack_tcp_packet(struct nf_conn *ct,
> >  	struct nf_tcp_net *tn = nf_tcp_pernet(net);
> >  	struct nf_conntrack_tuple *tuple;
> >  	enum tcp_conntrack new_state, old_state;
> > -	unsigned int index, *timeouts;
> > +	unsigned int index, flags, *timeouts;
> >  	enum ip_conntrack_dir dir;
> >  	const struct tcphdr *th;
> >  	struct tcphdr _tcph;
> > @@ -968,8 +968,10 @@ int nf_conntrack_tcp_packet(struct nf_conn *ct,
> >  			ct->proto.tcp.last_flags &= ~IP_CT_EXP_CHALLENGE_ACK;
> >  			ct->proto.tcp.seen[ct->proto.tcp.last_dir].flags =
> >  				ct->proto.tcp.last_flags;
> > +			flags = ct->proto.tcp.seen[dir].flags;
> >  			memset(&ct->proto.tcp.seen[dir], 0,
> >  			       sizeof(struct ip_ct_tcp_state));
> > +			ct->proto.tcp.seen[dir].flags = flags & IP_CT_TCP_FLAG_BE_LIBERAL;
> >  			break;
> >  		}
> >  		ct->proto.tcp.last_index = index;
> > -- 
> > 2.30.2
> > 



[Index of Archives]     [Netfitler Users]     [Berkeley Packet Filter]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux