tcp: make global challenge ack rate limitation per net-ns and default disabled
authorEric Dumazet <edumazet@google.com>
Tue, 30 Aug 2022 18:56:56 +0000 (11:56 -0700)
committerJakub Kicinski <kuba@kernel.org>
Thu, 1 Sep 2022 02:56:48 +0000 (19:56 -0700)
commit79e3602caa6f9d59c4f66a268407080496dae408
tree639b61f605e41a495d774f43c4e3062296bd3836
parent8c70521238b7863c2af607e20bcba20f974c969b
tcp: make global challenge ack rate limitation per net-ns and default disabled

Because per host rate limiting has been proven problematic (side channel
attacks can be based on it), per host rate limiting of challenge acks ideally
should be per netns and turned off by default.

This is a long due followup of following commits:

083ae308280d ("tcp: enable per-socket rate limiting of all 'challenge acks'")
f2b2c582e824 ("tcp: mitigate ACK loops for connections as tcp_sock")
75ff39ccc1bd ("tcp: make challenge acks less predictable")

Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Jason Baron <jbaron@akamai.com>
Acked-by: Neal Cardwell <ncardwell@google.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Documentation/networking/ip-sysctl.rst
include/net/netns/ipv4.h
net/ipv4/tcp_input.c
net/ipv4/tcp_ipv4.c