Hi Eddie,
first of all thank you for help with this bug.
You are correct, the cause is somewhere else, it was an oversight.
Arnaldo, can you please ignore this patch (16g); I have withdrawn it from the
online directory.
Instead,
* a proper bug fix with description follows;
* the bug and its cause are documented on
http://www.erg.abdn.ac.uk/users/gerrit/dccp/docs/seqno_bug/
(in short, the Sync did not acknowledge GSR, but rather P.seqno);
* I have further implemented rate-limiting for Syncs as suggested in 7.5.4.
Rate-limiting
proved to be an efficient countermeasure for this bug: it broke the vicious
circle of
invalid-Reset => Sync => invalid Reset. This was because the second received
Reset is
already subject to rate-limiting; hence there is no Sync in reply; hence no
further
sequence-invalid Reset is triggered.
I believe that rate-limiting can be of similiar help in other situations
involving
sequence-invalid packets.
* The reason that the bug does not show with the more recent patches is that
previously
it was possible for a DCCP application to silently crash, be killed,
terminated without
its connected peer taking notice of it. Patches 17a and 17b implement an
ABORT function
which sends a DCCP-Reset Code 2 "Aborted" which will terminate the
connection. Thus
mayhem due to half-closed connections is avoided.
Thanks again for pointing this out,
Gerrit
Quoting Eddie Kohler:
| Hi Gerrit,
|
| I agree that the bug is scary! It would be good to fix. But this fix isn't
a
| good fix, especially because it makes it trivially easy to shoot down a
| connection if you know the port numbers. Would you mind withdrawing the
patch
| until the bug reappears?
|
| Eddie
|
|
| Gerrit Renker wrote:
| > Eddie,
| >
| > I have spent half a day or so trying to reconstruct the condition which
triggered this bug.
| > With the new patches regarding closing state I couldn't trigger this bug
anymore. Which is
| > not to say that it has gone away.
| >
| > All I can say is that I have observed this bug as described and that it is
pretty scary -
| > the computer freezes for several minutes (until the server connection
timer declares the
| > connection as dead) and it generates a massive load of packets.
| >
| > I will try to follow this up when I have some more time; as indicated by
the comment in
| > the patch below, I am lacking the resources to implement rate-limiting for
DCCP-Sync; too
| > many other things to fix.
| >
| > Anyone else any ideas / suggestions?
| >
| > Gerrit
| >
| >
| > Quoting Eddie Kohler:
| > | Hi Gerrit,
| > |
| > | I'm surprised this kind of flood happens & think it may represent a bug
in the
| > | stack. What is the acknowledgement number on the Sync packet sent in
step
| > | (6)? It should be GSR, according to Step 6 of the pseudocode in
Section 8.5.
| > | If it was GSR, I would expect the following denouement:
| > |
| > | 5. client responds with Reset packet Code 3 with seqno=0
| > | 6. server thinks that seqno=0 is out of synch (step 6), sends Sync with
| > | seqno=GSS, ackno=GSR, then increments GSS;
| > | 7. client responds with Reset packet Code 3 with seqno=GSR+1 and
ackno=GSS (it
| > | can do this because it takes the seqno from the received packet's
ackno, per
| > | Section 8.3.1);
| > | 8. the Reset is now in synch, so the server kills the connection.
| > |
| > | No flood should be possible with valid stacks; some people actually
verified
| > | this theoretically.
| > |
| > | Of course stacks can be INvalid, in which case one should rate-limit
Syncs, as
| > | allowed by the protocol.
| > |
| > | Your solution, which is to accept Resets with seqno 0, makes it
trivially
| > | simple for an attacker to kill any connection. It should not be
committed!
| > | Can we figure out why the stack has the chatter problem first?
| > |
| > | Eddie
| > |
| > |
| > | Gerrit Renker wrote:
| > | > [DCCP]: Protect against Reset/Sync floods due to buggy applications
| > | >
| > | > This patch protects against Reset/Sync floods which happens as a
result
| > | > of either buggy or crashing client applications. The Reset/Sync flood
| > | > is triggered as follows:
| > | >
| > | > 1. Client establishes connection to listening server;
| > | > 2. before server can write data to client, client crashes;
| > | > 3. crashing client removes connection state at client host;
| > | > 4. server still thinks client is alive and sends data;
| > | > 5. client responds to server packet with Reset packet Code 3,
| > | > "No Connection", with seqno=0 - as per RFC 4340, 8.3.1;
| > | > 6. server thinks that seqno=0 is out of synch (step 6), sends Sync;
| > | > 7. goto (6).
| > | >
| > | > The result is a drastic flood of packets: In one occasion I counted
| > | > 345549 Reset/Sync packets, before the server finally killed itself.
| > | >
| > | > Fix:
| > | > ----
| > | > Since this condition is peculiar and can be distinguished from other
| > | > sequence-invalid packets, a special case has been added. The Reset
| > | > is accepted if
| > | > * it has Reset Code 3, "No Connection" AND
| > | > * it has sequence number 0 as described in RFC 4340, 8.3.1.
| > | >
| > | > If both conditions are satisfied, the Reset is enqueued in the
receive queue
| > | > as usual, and will very soon terminate the crashed connection.
| > | >
| > | > Signed-off-by: Gerrit Renker <[EMAIL PROTECTED]>
| > | > ---
| > | > net/dccp/input.c | 17 +++++++++++++++++
| > | > 1 file changed, 17 insertions(+)
| > | >
| > | > --- a/net/dccp/input.c
| > | > +++ b/net/dccp/input.c
| > | > @@ -155,6 +155,22 @@ static int dccp_check_seqno(struct sock
| > | > (DCCP_SKB_CB(skb)->dccpd_ack_seq !=
| > | > DCCP_PKT_WITHOUT_ACK_SEQ))
| > | > dp->dccps_gar = DCCP_SKB_CB(skb)->dccpd_ack_seq;
| > | > +
| > | > + } else if (dh->dccph_type == DCCP_PKT_RESET &&
| > | > + dccp_hdr_reset(skb)->dccph_reset_code ==
| > | > + DCCP_RESET_CODE_NO_CONNECTION &&
| > | > + DCCP_SKB_CB(skb)->dccpd_seq == 0) {
| > | > + /*
| > | > + * This happens when connection is established and
client app
| > | > + * crashes before server can send data. The crashing
client
| > | > + * removes connection state, so the server gets a Code
3 Reset
| > | > + * packet with seqno 0 (RFC 4340, 8.3.1). Responding
here with
| > | > + * a Sync leads to a Reset-Storm which will flood the
network
| > | > + * until the server gives up on this connection or is
killed.
| > | > + * We let this case pass so that the Reset gets
enqueued and
| > | > + * will terminate the erratic connection.
| > | > + */
| > | > + DCCP_WARN("DCCP: Peer sent RESET with seqno 0\n");
| > | > } else {
| > | > DCCP_WARN("DCCP: Step 6 failed for %s packet, "
| > | > "(LSWL(%llu) <= P.seqno(%llu) <= S.SWH(%llu))
and "
| > | > @@ -168,6 +184,7 @@ static int dccp_check_seqno(struct sock
| > | > (unsigned long long) lawl,
| > | > (unsigned long long)
DCCP_SKB_CB(skb)->dccpd_ack_seq,
| > | > (unsigned long long) dp->dccps_awh);
| > | > + /* FIXME: Rate-limit DCCP-Sync packets as per RFC 4340,
7.5.4 */
| > | > dccp_send_sync(sk, DCCP_SKB_CB(skb)->dccpd_seq,
DCCP_PKT_SYNC);
| > | > return -1;
| > | > }
| > | > -
| > | > To unsubscribe from this list: send the line "unsubscribe dccp" in
| > | > the body of a message to [EMAIL PROTECTED]
| > | > More majordomo info at http://vger.kernel.org/majordomo-info.html
| > |
| > |
|
|
-
To unsubscribe from this list: send the line "unsubscribe dccp" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html