lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20120922.154802.549925222027300949.davem@davemloft.net> Date: Sat, 22 Sep 2012 15:48:02 -0400 (EDT) From: David Miller <davem@...emloft.net> To: ncardwell@...gle.com Cc: netdev@...r.kernel.org, edumazet@...gle.com, ycheng@...gle.com, hkchu@...gle.com Subject: Re: [PATCH net-next 4/4] tcp: TCP Fast Open Server - call tcp_validate_incoming() for all packets From: Neal Cardwell <ncardwell@...gle.com> Date: Sat, 22 Sep 2012 10:18:57 -0400 > A TCP Fast Open (TFO) passive connection must call both > tcp_check_req() and tcp_validate_incoming() for all incoming ACKs that > are attempting to complete the 3WHS. > > This is needed to parallel all the action that happens for a non-TFO > connection, where for an ACK that is attempting to complete the 3WHS > we call both tcp_check_req() and tcp_validate_incoming(). > > For example, upon receiving the ACK that completes the 3WHS, we need > to call tcp_fast_parse_options() and update ts_recent based on the > incoming timestamp value in the ACK. > > One symptom of the problem with the previous code was that for passive > TFO connections using TCP timestamps, the outgoing TS ecr values > ignored the incoming TS val value on the ACK that completed the 3WHS. > > Signed-off-by: Neal Cardwell <ncardwell@...gle.com> Applied. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists