netfilter: Mark SYN/ACK packets as invalid from original direction
authorJozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Fri, 31 Aug 2012 09:55:53 +0000 (09:55 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 26 Nov 2012 19:34:54 +0000 (11:34 -0800)
commit9e8b32b0a0e7981f157b2073dd4c6f354340c3e6
tree3d999405a1fe7d3485e97dd60b1d477190366172
parentd87b26d50da9eca1be14216c9f7dac5b9b0ae3f9
netfilter: Mark SYN/ACK packets as invalid from original direction

commit 64f509ce71b08d037998e93dd51180c19b2f464c upstream.

Clients should not send such packets. By accepting them, we open
up a hole by wich ephemeral ports can be discovered in an off-path
attack.

See: "Reflection scan: an Off-Path Attack on TCP" by Jan Wrobel,
http://arxiv.org/abs/1201.2074

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
net/netfilter/nf_conntrack_proto_tcp.c