[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070918024812.GA15799@router.lepton.home>
Date: Tue, 18 Sep 2007 10:48:12 +0800
From: lepton <ytht.net@...il.com>
To: unlisted-recipients:; (no To-header on input)
Cc: ytht.net@...il.com, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org, davem@...emloft.net
Subject: Re: [PATCH] 2.6.22.6 NETWORKING [IPV4]: Always use source addr in skb to reply packet
Hi,
sorry for lack of details.
let's think about ip_send_reply. it is only called
by tcp_v4_send_ack and tcp_v4_reset. I don't know why
we need a source address diffrent from ip_hdr(skb)->s_addr
icmp_reply is only called by icmp_echo and icmp_timestamp.
Is there a situation to need we use a source address diffrent
from ip_hdr(skb)->s_addr?
My situaiton is:
I DNAT some tcp packet to my box. some times the box will
reply reset or ack packet with tcp_v4_send_ack and tcp_v4_reset,
when this happens, it will use the rt->s_addr instead of
ip_hdr(skb)->s_addr, then the packet will send out without change
the source addr. Becaus netfilter don't know these packets belongs
to the DNATed connection.
Another people's situaiton is (quoted from email to me):
While conducting a research about networking, I discovered
improper handling of ICMP echo reply messages in Linux 2.4.26. I
looked into the code and noticed that the icmp_reply function sets the
destination address in the reply packet to rt->rt_src. This produces
strange results in some cases as can be easily shown with hping and
tcpdump. Here is an example (NOTE: eth0 address is set to
10.10.10.1/24):
# tcpdump -n -i any icmp &
[1] 16842
tcpdump: WARNING: Promiscuous mode not supported on the "any" device
tcpdump: verbose output suppressed, use -v or -vv for full protocol
decode
listening on any, link-type LINUX_SLL (Linux cooked), capture size 96
bytes
# hping2 --icmp --spoof 10.10.10.3 10.10.10.1
HPING 10.10.10.1 (eth0 10.10.10.1): icmp mode set, 28 headers + 0
data bytes
02:16:53.206016 IP 10.10.10.3 > 10.10.10.1: icmp 8: echo request seq
0
02:16:53.206082 IP 10.10.10.1 > 10.10.10.1: icmp 8: echo reply seq 0
02:16:54.202123 IP 10.10.10.3 > 10.10.10.1: icmp 8: echo request seq
If ICMP echo requests with a spoofed source address are sent to the
address of our eth0 interface (which of course happens through the
loopback interface), the code of icmp_reply sets the destination
address in the reply to 10.10.10.1 instead of simply reversing the
source and destination addresses as required by the RFC.
On Tue, Sep 18, 2007 at 11:26:44AM +0900, YOSHIFUJI Hideaki / ?$B5HF#1QL@?(B wrote:
> In article <20070917.192044.48396034.davem@...emloft.net> (at Mon, 17 Sep 2007 19:20:44 -0700 (PDT)), David Miller <davem@...emloft.net> says:
>
> > From: lepton <ytht.net@...il.com>
> > Date: Tue, 18 Sep 2007 10:16:17 +0800
> >
> > > Hi,
> > > In some situation, icmp_reply and ip_send_reply will send
> > > out packet with the wrong source addr, the following patch
> > > will fix this.
> > >
> > > I don't understand why we must use rt->rt_src in the current
> > > code, if this is a wrong fix, please correct me.
> > >
> > > Signed-off-by: Lepton Wu <ytht.net@...il.com>
> >
> > That the address is wrong is your opinion only :-)
> >
> > Source address selection is a rather complex topic, and
> > here we are definitely purposefully using the source
> > address selected by the routing lookup for the reply.
>
> And, if you do think something is "wrong", you need to describe it
> in detail, at least.
>
> --yoshfuji
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists