Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 1 Oct 2014 19:34:04 -0400
From:      Tom Pusateri <pusateri@bangj.com>
To:        Michael Tuexen <Michael.Tuexen@lurchi.franken.de>
Cc:        FreeBSD Net <freebsd-net@freebsd.org>
Subject:   Re: UDP/IPv6 handling
Message-ID:  <2DA609BE-5704-463A-99BB-E64CB71931B2@bangj.com>
In-Reply-To: <B30E0A41-51B0-442C-9476-0D9E99C0D37C@lurchi.franken.de>
References:  <B30E0A41-51B0-442C-9476-0D9E99C0D37C@lurchi.franken.de>

next in thread | previous in thread | raw e-mail | index | archive | help

Lots of embedded devices (like Cisco IP Phones) send TFTP requests with 0 checksums. 

Tom



> On Oct 1, 2014, at 12:58 PM, Michael Tuexen <Michael.Tuexen@lurchi.franken.de> wrote:
> 
> Dear all,
> 
> in udp6_input() we have the following code:
> 
>    if (nxt == IPPROTO_UDP && plen != ulen) {
>        UDPSTAT_INC(udps_badlen);
>        goto badunlocked;
>    } 
>    /*
>     * Checksum extended UDP header and data.
>     */
>    if (uh->uh_sum == 0) {
>        if (ulen > plen || ulen < sizeof(struct udphdr)) {
>            UDPSTAT_INC(udps_nosum);
>            goto badunlocked;
>        }
>    }
> 
> I'm trying to understand the UDP code path...
> 
> So (ulen > plen) can't be true. I'm wondering why do we only check the ulen is not too
> short only in the case when the UDP checksum is zero. A zero checksum should also never happen.
> 
> I think we should check for ulen < sizeof(struct udphdr) in any case.
> 
> Opinions?
> 
> Best regards
> Michael
> _______________________________________________
> freebsd-net@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-net
> To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2DA609BE-5704-463A-99BB-E64CB71931B2>