diff options
author | Florian Westphal <fw@strlen.de> | 2015-02-16 18:54:04 +0100 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2015-03-03 02:10:35 +0100 |
commit | ee586bbc28fb7128133457cf711880d13a3b7ce4 (patch) | |
tree | d1e1991b5d622b588c11608b9164499a96869e51 /net/rfkill | |
parent | Merge branch 'neigh_cleanups' (diff) | |
download | linux-ee586bbc28fb7128133457cf711880d13a3b7ce4.tar.xz linux-ee586bbc28fb7128133457cf711880d13a3b7ce4.zip |
netfilter: reject: don't send icmp error if csum is invalid
tcp resets are never emitted if the packet that triggers the
reject/reset has an invalid checksum.
For icmp error responses there was no such check.
It allows to distinguish icmp response generated via
iptables -I INPUT -p udp --dport 42 -j REJECT
and those emitted by network stack (won't respond if csum is invalid,
REJECT does).
Arguably its possible to avoid this by using conntrack and only
using REJECT with -m conntrack NEW/RELATED.
However, this doesn't work when connection tracking is not in use
or when using nf_conntrack_checksum=0.
Furthermore, sending errors in response to invalid csums doesn't make
much sense so just add similar test as in nf_send_reset.
Validate csum if needed and only send the response if it is ok.
Reference: http://bugzilla.redhat.com/show_bug.cgi?id=1169829
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/rfkill')
0 files changed, 0 insertions, 0 deletions