lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20140429171554.GA6456@omega>
Date:	Tue, 29 Apr 2014 19:16:09 +0200
From:	Alexander Aring <alex.aring@...il.com>
To:	Tom Herbert <therbert@...gle.com>
Cc:	davem@...emloft.net, netdev@...r.kernel.org
Subject: Re: [PATCH 8/8 v3] net: Implmement RFC 6936 (zero csums for UDP/IPv6)

Hello Tom Herbert,

On Tue, Apr 29, 2014 at 09:19:18AM -0700, Tom Herbert wrote:
> RFC 6936 relaxes the requirement of RFC 2460 that UDP/IPv6 packets which
> are received with a zero UDP checksum value must be dropped. RFC 6936
> allows zero checksums to support tunnels over UDP.
> 
> When sk_no_check is set we allow on a socket we allow a zero IPv6
> UDP checksum. This is for both sending zero checksum and accepting
> a zero checksum on receive.
> 

I only want to mention that this is a interesting feature which we "maybe"
also can use for the 6LoWPAN IPHC format [0]. This is another possible use
case for this. We doesn't support this at the moment, maybe in the near
future...

It's to save some payload in the UDP header because we could drop the
checksum there, integrity check is already handeld by the MAC layer.

Cheers
Alex

[0] http://tools.ietf.org/html/rfc6282#section-4.3.2
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ