Date: Thu, 22 Feb 2001 21:20:44 -0600 From: Jonathan Lemon <jlemon@flugsvamp.com> To: Jesper Skriver <jesper@skriver.dk> Cc: Jonathan Lemon <jlemon@flugsvamp.com>, net@freebsd.org Subject: Re: ICMP unreachables, take II. Message-ID: <20010222212044.H5714@prism.flugsvamp.com> In-Reply-To: <20010223034952.A6694@skriver.dk> References: <20010222185412.E5714@prism.flugsvamp.com> <20010223034952.A6694@skriver.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 23, 2001 at 03:49:52AM +0100, Jesper Skriver wrote:
>
> I still think we should react to the following as a minimum
> - type 3 code 0 net unreachable
> - type 3 code 1 host unreachable
RFC 1122, Section 4.2.3.9 says:
o Destination Unreachable -- codes 0, 1, 5
Since these Unreachable messages indicate soft error
conditions, TCP MUST NOT abort the connection, and it
SHOULD make the information available to the
application.
I think that these should be transients.
> Perhaps you could keep some of the comment ...
Hmm, yeah, I was probably a little too overzealous with the axe there
> > if (cmd == PRC_QUENCH)
> > notify = tcp_quench;
> > - else if ((icmp_unreach_like_rst == 1) && ((cmd == PRC_UNREACH_HOST) ||
> > - (cmd == PRC_UNREACH_ADMIN_PROHIB)) && (ip) &&
> > - ((IP_VHL_HL(ip->ip_vhl) << 2) == sizeof(struct ip))) {
>
> Sure we'll not try to read off the end of the recieved packet, when we
> remove the check for the header length.
>
> I put it there as a extra check against "attackers" sending us malformed
> ICMP messages with only part of the attached IP header, or even without
> it.
Yup, but if you exmaine icmp_input, which calls this code, it has
already verified that there are a full 8 bytes of the TCP packet
in existence; if this is not the case, icmp_input will drop the packet.
--
Jonathan
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010222212044.H5714>
