Files
linux/include/net
Eric Dumazet 86791bbfe5 tcp: implement RFC 5961 3.2
[ Upstream commit 282f23c6ee ]

Implement the RFC 5691 mitigation against Blind
Reset attack using RST bit.

Idea is to validate incoming RST sequence,
to match RCV.NXT value, instead of previouly accepted
window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)

If sequence is in window but not an exact match, send
a "challenge ACK", so that the other part can resend an
RST with the appropriate sequence.

Add a new sysctl, tcp_challenge_ack_limit, to limit
number of challenge ACK sent per second.

Add a new SNMP counter to count number of challenge acks sent.
(netstat -s | grep TCPChallengeACK)

Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Kiran Kumar Kella <kkiran@broadcom.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2013-01-11 09:03:48 -08:00
..
2011-03-31 11:26:23 -03:00
2011-03-31 11:26:23 -03:00
2011-05-05 11:10:14 -07:00
2010-12-31 10:47:46 -08:00
2010-06-03 03:21:52 -07:00
2012-06-10 00:33:02 +09:00
2010-10-27 11:37:32 -07:00
2011-03-31 11:26:23 -03:00
2010-10-25 13:09:45 -07:00
2010-10-27 11:37:32 -07:00
2011-03-31 11:26:23 -03:00
2010-06-03 03:21:52 -07:00
2011-05-17 14:16:58 -04:00
2011-03-31 11:26:23 -03:00
2011-01-24 15:32:47 -08:00
2010-11-24 11:16:43 -08:00
2011-05-19 16:21:22 -04:00
2013-01-11 09:03:48 -08:00
2011-03-01 12:35:03 -08:00
2011-03-01 12:35:03 -08:00
2011-03-31 11:26:23 -03:00
2010-11-28 11:12:20 -08:00