Files
linux/include/net
Eric Dumazet 86791bbfe5 tcp: implement RFC 5961 3.2
[ Upstream commit 282f23c6ee ]

Implement the RFC 5691 mitigation against Blind
Reset attack using RST bit.

Idea is to validate incoming RST sequence,
to match RCV.NXT value, instead of previouly accepted
window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)

If sequence is in window but not an exact match, send
a "challenge ACK", so that the other part can resend an
RST with the appropriate sequence.

Add a new sysctl, tcp_challenge_ack_limit, to limit
number of challenge ACK sent per second.

Add a new SNMP counter to count number of challenge acks sent.
(netstat -s | grep TCPChallengeACK)

Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Kiran Kumar Kella <kkiran@broadcom.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2013-01-11 09:03:48 -08:00
..
2011-03-31 11:26:23 -03:00
2011-03-31 11:26:23 -03:00
2011-05-05 11:10:14 -07:00
2005-08-29 15:32:25 -07:00
2010-12-31 10:47:46 -08:00
2010-06-03 03:21:52 -07:00
2009-03-21 19:06:54 -07:00
2012-06-10 00:33:02 +09:00
2010-10-27 11:37:32 -07:00
2011-03-31 11:26:23 -03:00
2010-10-25 13:09:45 -07:00
2008-06-11 21:00:38 -07:00
2010-10-27 11:37:32 -07:00
2011-03-31 11:26:23 -03:00
2005-04-16 15:20:36 -07:00
2005-04-16 15:20:36 -07:00
2005-04-16 15:20:36 -07:00
2005-04-16 15:20:36 -07:00
2008-02-29 11:46:17 -08:00
2005-04-16 15:20:36 -07:00
2005-04-16 15:20:36 -07:00
2005-04-16 15:20:36 -07:00
2009-12-26 20:46:28 -08:00
2010-06-03 03:21:52 -07:00
2009-01-06 11:38:15 -07:00
2005-08-29 16:01:32 -07:00
2011-05-17 14:16:58 -04:00
2011-03-31 11:26:23 -03:00
2011-01-24 15:32:47 -08:00
2009-03-21 19:06:50 -07:00
2010-11-24 11:16:43 -08:00
2011-05-19 16:21:22 -04:00
2008-07-05 21:25:39 -07:00
2013-01-11 09:03:48 -08:00
2011-03-01 12:35:03 -08:00
2011-03-01 12:35:03 -08:00
2009-10-07 16:39:43 -04:00
2011-03-31 11:26:23 -03:00
2010-11-28 11:12:20 -08:00