lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAB=W+onwyyBGRj8NxN1=kKr1JWuz0vJ32f63kDpaWZJXdSesEg@mail.gmail.com>
Date:   Wed, 6 Mar 2019 15:51:34 -0700
From:   Captain Wiggum <captwiggum@...il.com>
To:     Eric Dumazet <eric.dumazet@...il.com>
Cc:     David Miller <davem@...emloft.net>, netdev@...r.kernel.org
Subject: Re: TAHI testing fails for IPv6 Fragments in Kernel 4.9

Thank you all for the reply.
The problem started with 4.9.133, and persists to latest 4.9 today.
I will work on the bisect approach to find the bad commit(s).
It will take a few days. I will reply back when I have more info.

On Wed, Mar 6, 2019 at 3:34 PM Eric Dumazet <eric.dumazet@...il.com> wrote:
>
>
>
> On 03/06/2019 02:28 PM, David Miller wrote:
> > From: Captain Wiggum <captwiggum@...il.com>
> > Date: Wed, 6 Mar 2019 15:26:43 -0700
> >
> >> We are using the TAHI Self-test tools from IPv6 Ready Logo Program:
> >> https://www.ipv6ready.org/?page=documents&tag=ipv6-core-protocols
> >>
> >> The test passed up to 4.9.133, then fails ever since.
> >>
> >> The are about 20 failing test cases regarding IPv6 fragments,
> >> where the kernel is issuing an ICMPv6 parameter problem pointing
> >> to the Fragmentation Header.
> >>
> >> I see lots of commits regarding improving fragment processing.
> >> Has anyone else run TAHI tests on kernel 4.9 or later?
> >> Is there any interest in looking into this to improve
> >> the IPv6 functionality?
> >
> > It is intentionally failing those tests to fix a denial of service
> > issue with ipv6 fragmentation and this will therefore not be changed.
>
>
> That was Florian patch that was later reverted, right ?
>
> 0ed4229b08c13c84a3c301a08defdc9e7f4467e6 ipv6: defrag: drop non-last frags smaller than min mtu
>
> -> reverted in
>
> d4289fcc9b16b89619ee1c54f829e05e56de8b9a net: IP6 defrag: use rbtrees for IPv6 defrag
>
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ