]> git.karo-electronics.de Git - karo-tx-linux.git/commit
xfrm: Workaround incompatibility of ESN and async crypto
authorSteffen Klassert <steffen.klassert@secunet.com>
Tue, 4 Sep 2012 00:03:29 +0000 (00:03 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 12 Oct 2012 20:38:40 +0000 (05:38 +0900)
commit20eb20851385e53d27dff9ed79c4e68e58e3d9da
treeb3a5a5e16f823d5ca39f44124bf18b5f63fa2a2f
parent657197486950474bf30290344339fd0914fe99c9
xfrm: Workaround incompatibility of ESN and async crypto

[ Upstream commit 3b59df46a449ec9975146d71318c4777ad086744 ]

ESN for esp is defined in RFC 4303. This RFC assumes that the
sequence number counters are always up to date. However,
this is not true if an async crypto algorithm is employed.

If the sequence number counters are not up to date on sequence
number check, we may incorrectly update the upper 32 bit of
the sequence number. This leads to a DOS.

We workaround this by comparing the upper sequence number,
(used for authentication) with the upper sequence number
computed after the async processing. We drop the packet
if these numbers are different.

To do this, we introduce a recheck function that does this
check in the ESN case.

Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
include/net/xfrm.h
net/xfrm/xfrm_input.c
net/xfrm/xfrm_replay.c