lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169646642777.7507.18371535328786220058.git-patchwork-notify@kernel.org> Date: Thu, 05 Oct 2023 00:40:27 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Xin Long <lucien.xin@...il.com> Cc: netdev@...r.kernel.org, linux-sctp@...r.kernel.org, davem@...emloft.net, kuba@...nel.org, edumazet@...gle.com, pabeni@...hat.com, marcelo.leitner@...il.com Subject: Re: [PATCH net] sctp: update transport state when processing a dupcook packet Hello: This patch was applied to netdev/net.git (main) by Jakub Kicinski <kuba@...nel.org>: On Sun, 1 Oct 2023 10:58:45 -0400 you wrote: > During the 4-way handshake, the transport's state is set to ACTIVE in > sctp_process_init() when processing INIT_ACK chunk on client or > COOKIE_ECHO chunk on server. > > In the collision scenario below: > > 192.168.1.2 > 192.168.1.1: sctp (1) [INIT] [init tag: 3922216408] > 192.168.1.1 > 192.168.1.2: sctp (1) [INIT] [init tag: 144230885] > 192.168.1.2 > 192.168.1.1: sctp (1) [INIT ACK] [init tag: 3922216408] > 192.168.1.1 > 192.168.1.2: sctp (1) [COOKIE ECHO] > 192.168.1.2 > 192.168.1.1: sctp (1) [COOKIE ACK] > 192.168.1.1 > 192.168.1.2: sctp (1) [INIT ACK] [init tag: 3914796021] > > [...] Here is the summary with links: - [net] sctp: update transport state when processing a dupcook packet https://git.kernel.org/netdev/net/c/2222a78075f0 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists