lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 26 Oct 2012 07:06:11 +0200 From: Eric Dumazet <eric.dumazet@...il.com> To: Vijay Subramanian <subramanian.vijay@...il.com> Cc: netdev@...r.kernel.org, davem@...emloft.net, Venkat Venkatsubra <venkat.x.venkatsubra@...cle.com>, Elliot Hughes <enh@...gle.com>, Eric Dumazet <edumazet@...gle.com> Subject: Re: [PATCH net-next 1/1] tcp: Prevent needless syn-ack rexmt during TWHS On Thu, 2012-10-25 at 17:45 -0700, Vijay Subramanian wrote: > If server socket is slow to accept() connections, request_socks can represent > connections for which the three-way handshake is already done. From client's > point of view, the connection is in ESTABLISHED state but on server side, socket > is not in accept_queue or ESTABLISHED state. When the syn-ack timer expires, > because of the order in which tests are performed, server can retransmit the > synack repeatedly. Following patch prevents the server from retransmitting the > synack needlessly (and prevents client from replying with ack). This reduces > traffic when server is slow to accept() connections. > > If the server socket has received the third ack during connection establishment, > this is remembered in inet_rsk(req)->acked. The request_sock will expire in > around 30 seconds and will be dropped if it does not move into accept_queue. > > With help from Eric Dumazet. > > Reported-by: Elliot Hughes <enh@...gle.com> > Cc: Eric Dumazet <edumazet@...gle.com> > Signed-off-by: Vijay Subramanian <subramanian.vijay@...il.com> > --- > Ignoring "WARNING: line over 80 characters" in the interest of readability. > > Eric, > What about your earlier patch that modified sk_acceptq_is_full()? Acked-by: Eric Dumazet <edumazet@...gle.com> Please note Elliott Hughes takes two t, and by the way didnt reported this particular problem. but the fact that client got the SYNACK message while socket was not yet available to the server side. About earlier patch, this would break : tcp_abort_on_overflow - BOOLEAN If listening service is too slow to accept new connections, reset them. Default state is FALSE. It means that if overflow occurred due to a burst, connection will recover. Enable this option _only_ if you are really sure that listening daemon cannot be tuned to accept connections faster. Enabling this option can harm clients of your server. And even if tcp_abort_on_overflow is TRUE, earlier patch would break some ability to have a momentary burst of SYN packets above the listen() backlog. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists