netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
@ 2015-07-27  6:35 Hangbin Liu
  2015-07-27 23:50 ` YOSHIFUJI Hideaki/吉藤英明
  0 siblings, 1 reply; 7+ messages in thread
From: Hangbin Liu @ 2015-07-27  6:35 UTC (permalink / raw)
  To: netdev; +Cc: YOSHIFUJI Hideaki, Hannes Frederic Sowa, Hangbin Liu

Commit 6fd99094de2b ("ipv6: Don't reduce hop limit for an interface")
disabled accept hop limit from RA if it is higher than the current hop
limit for security stuff. But this behavior kind of break the RFC definition.

RFC 4861, 6.3.4.  Processing Received Router Advertisements
   If the received Cur Hop Limit value is non-zero, the host SHOULD set
   its CurHopLimit variable to the received value.

So add sysctl option accept_ra_hop_limit to let user choose whether accept
hop limit info in RA.

Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
---
 Documentation/networking/ip-sysctl.txt | 11 +++++++++++
 include/linux/ipv6.h                   |  1 +
 include/uapi/linux/ipv6.h              |  1 +
 net/ipv6/addrconf.c                    | 10 ++++++++++
 net/ipv6/ndisc.c                       | 17 +++++++++++------
 5 files changed, 34 insertions(+), 6 deletions(-)

diff --git a/Documentation/networking/ip-sysctl.txt b/Documentation/networking/ip-sysctl.txt
index 5fae770..778c479 100644
--- a/Documentation/networking/ip-sysctl.txt
+++ b/Documentation/networking/ip-sysctl.txt
@@ -1346,6 +1346,17 @@ accept_ra_pinfo - BOOLEAN
 	Functional default: enabled if accept_ra is enabled.
 			    disabled if accept_ra is disabled.
 
+accept_ra_hop_limit - INTEGER
+	Learn hop limit in Router Advertisement.
+
+	Possible values are:
+		0 Do not accept hop limit in Router Advertisements.
+		1 Accept hop limit in Router Advertisements if it is higher
+		  than the current hop limit.
+		2 Accept hop limit in Router Advertisements anyway.
+
+	Default: 1
+
 accept_ra_rt_info_max_plen - INTEGER
 	Maximum prefix length of Route Information in RA.
 
diff --git a/include/linux/ipv6.h b/include/linux/ipv6.h
index 82806c6..a21a9c6 100644
--- a/include/linux/ipv6.h
+++ b/include/linux/ipv6.h
@@ -30,6 +30,7 @@ struct ipv6_devconf {
 	__s32		max_addresses;
 	__s32		accept_ra_defrtr;
 	__s32		accept_ra_pinfo;
+	__s32           accept_ra_hop_limit;
 #ifdef CONFIG_IPV6_ROUTER_PREF
 	__s32		accept_ra_rtr_pref;
 	__s32		rtr_probe_interval;
diff --git a/include/uapi/linux/ipv6.h b/include/uapi/linux/ipv6.h
index 5efa54a..a8c1083 100644
--- a/include/uapi/linux/ipv6.h
+++ b/include/uapi/linux/ipv6.h
@@ -171,6 +171,7 @@ enum {
 	DEVCONF_USE_OPTIMISTIC,
 	DEVCONF_ACCEPT_RA_MTU,
 	DEVCONF_STABLE_SECRET,
+	DEVCONF_ACCEPT_RA_HOP_LIMIT,
 	DEVCONF_MAX
 };
 
diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c
index 21c2c81..486a7a5 100644
--- a/net/ipv6/addrconf.c
+++ b/net/ipv6/addrconf.c
@@ -196,6 +196,7 @@ static struct ipv6_devconf ipv6_devconf __read_mostly = {
 	.accept_ra_defrtr	= 1,
 	.accept_ra_from_local	= 0,
 	.accept_ra_pinfo	= 1,
+	.accept_ra_hop_limit    = 1,
 #ifdef CONFIG_IPV6_ROUTER_PREF
 	.accept_ra_rtr_pref	= 1,
 	.rtr_probe_interval	= 60 * HZ,
@@ -237,6 +238,7 @@ static struct ipv6_devconf ipv6_devconf_dflt __read_mostly = {
 	.accept_ra_defrtr	= 1,
 	.accept_ra_from_local	= 0,
 	.accept_ra_pinfo	= 1,
+	.accept_ra_hop_limit    = 1,
 #ifdef CONFIG_IPV6_ROUTER_PREF
 	.accept_ra_rtr_pref	= 1,
 	.rtr_probe_interval	= 60 * HZ,
@@ -4561,6 +4563,7 @@ static inline void ipv6_store_devconf(struct ipv6_devconf *cnf,
 	array[DEVCONF_MAX_ADDRESSES] = cnf->max_addresses;
 	array[DEVCONF_ACCEPT_RA_DEFRTR] = cnf->accept_ra_defrtr;
 	array[DEVCONF_ACCEPT_RA_PINFO] = cnf->accept_ra_pinfo;
+	array[DEVCONF_ACCEPT_RA_HOP_LIMIT] = cnf->accept_ra_hop_limit;
 #ifdef CONFIG_IPV6_ROUTER_PREF
 	array[DEVCONF_ACCEPT_RA_RTR_PREF] = cnf->accept_ra_rtr_pref;
 	array[DEVCONF_RTR_PROBE_INTERVAL] =
@@ -5462,6 +5465,13 @@ static struct addrconf_sysctl_table
 			.mode		= 0644,
 			.proc_handler	= proc_dointvec,
 		},
+		{
+			.procname	= "accept_ra_hop_limit",
+			.data		= &ipv6_devconf.accept_ra_hop_limit,
+			.maxlen		= sizeof(int),
+			.mode		= 0644,
+			.proc_handler	= proc_dointvec,
+		},
 #ifdef CONFIG_IPV6_ROUTER_PREF
 		{
 			.procname	= "accept_ra_rtr_pref",
diff --git a/net/ipv6/ndisc.c b/net/ipv6/ndisc.c
index 0a05b35..aca67da 100644
--- a/net/ipv6/ndisc.c
+++ b/net/ipv6/ndisc.c
@@ -1226,13 +1226,18 @@ static void ndisc_router_discovery(struct sk_buff *skb)
 	if (rt)
 		rt6_set_expires(rt, jiffies + (HZ * lifetime));
 	if (ra_msg->icmph.icmp6_hop_limit) {
-		/* Only set hop_limit on the interface if it is higher than
-		 * the current hop_limit.
-		 */
-		if (in6_dev->cnf.hop_limit < ra_msg->icmph.icmp6_hop_limit) {
+		switch (in6_dev->cnf.accept_ra_hop_limit) {
+		case 0:
+			break;
+		case 1:
+			if (in6_dev->cnf.hop_limit > ra_msg->icmph.icmp6_hop_limit) {
+				ND_PRINTK(2, warn,
+					  "RA: Got route advertisement with lower hop_limit than current\n");
+				break;
+			}
+		default:
 			in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
-		} else {
-			ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than current\n");
+			break;
 		}
 		if (rt)
 			dst_metric_set(&rt->dst, RTAX_HOPLIMIT,
-- 
1.9.3

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
  2015-07-27  6:35 [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit Hangbin Liu
@ 2015-07-27 23:50 ` YOSHIFUJI Hideaki/吉藤英明
  2015-07-28  3:05   ` Hangbin Liu
  0 siblings, 1 reply; 7+ messages in thread
From: YOSHIFUJI Hideaki/吉藤英明 @ 2015-07-27 23:50 UTC (permalink / raw)
  To: Hangbin Liu, netdev; +Cc: hideaki.yoshifuji, Hannes Frederic Sowa

Hi,

Hangbin Liu wrote:
> Commit 6fd99094de2b ("ipv6: Don't reduce hop limit for an interface")
> disabled accept hop limit from RA if it is higher than the current hop
> limit for security stuff. But this behavior kind of break the RFC definition.
> 
> RFC 4861, 6.3.4.  Processing Received Router Advertisements
>    If the received Cur Hop Limit value is non-zero, the host SHOULD set
>    its CurHopLimit variable to the received value.
> 
> So add sysctl option accept_ra_hop_limit to let user choose whether accept
> hop limit info in RA.
> 

How about introducing "minimum hop limit", instead?

|commit 6fd99094de2b83d1d4c8457f2c83483b2828e75a
|Author: D.S. Ljungmark <ljungmark@modio.se>
|Date:   Wed Mar 25 09:28:15 2015 +0100
|
|    ipv6: Don't reduce hop limit for an interface
:
|    RFC 3756, Section 4.2.7, "Parameter Spoofing"
|    
:
|   >   As an example, one possible approach to mitigate this threat is to
|    >   ignore very small hop limits.  The nodes could implement a
|    >   configurable minimum hop limit, and ignore attempts to set it below
|    >   said limit.

--yoshfuji


> Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
> ---
>  Documentation/networking/ip-sysctl.txt | 11 +++++++++++
>  include/linux/ipv6.h                   |  1 +
>  include/uapi/linux/ipv6.h              |  1 +
>  net/ipv6/addrconf.c                    | 10 ++++++++++
>  net/ipv6/ndisc.c                       | 17 +++++++++++------
>  5 files changed, 34 insertions(+), 6 deletions(-)
> 
> diff --git a/Documentation/networking/ip-sysctl.txt b/Documentation/networking/ip-sysctl.txt
> index 5fae770..778c479 100644
> --- a/Documentation/networking/ip-sysctl.txt
> +++ b/Documentation/networking/ip-sysctl.txt
> @@ -1346,6 +1346,17 @@ accept_ra_pinfo - BOOLEAN
>  	Functional default: enabled if accept_ra is enabled.
>  			    disabled if accept_ra is disabled.
>  
> +accept_ra_hop_limit - INTEGER
> +	Learn hop limit in Router Advertisement.
> +
> +	Possible values are:
> +		0 Do not accept hop limit in Router Advertisements.
> +		1 Accept hop limit in Router Advertisements if it is higher
> +		  than the current hop limit.
> +		2 Accept hop limit in Router Advertisements anyway.
> +
> +	Default: 1
> +
>  accept_ra_rt_info_max_plen - INTEGER
>  	Maximum prefix length of Route Information in RA.
>  
> diff --git a/include/linux/ipv6.h b/include/linux/ipv6.h
> index 82806c6..a21a9c6 100644
> --- a/include/linux/ipv6.h
> +++ b/include/linux/ipv6.h
> @@ -30,6 +30,7 @@ struct ipv6_devconf {
>  	__s32		max_addresses;
>  	__s32		accept_ra_defrtr;
>  	__s32		accept_ra_pinfo;
> +	__s32           accept_ra_hop_limit;
>  #ifdef CONFIG_IPV6_ROUTER_PREF
>  	__s32		accept_ra_rtr_pref;
>  	__s32		rtr_probe_interval;
> diff --git a/include/uapi/linux/ipv6.h b/include/uapi/linux/ipv6.h
> index 5efa54a..a8c1083 100644
> --- a/include/uapi/linux/ipv6.h
> +++ b/include/uapi/linux/ipv6.h
> @@ -171,6 +171,7 @@ enum {
>  	DEVCONF_USE_OPTIMISTIC,
>  	DEVCONF_ACCEPT_RA_MTU,
>  	DEVCONF_STABLE_SECRET,
> +	DEVCONF_ACCEPT_RA_HOP_LIMIT,
>  	DEVCONF_MAX
>  };
>  
> diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c
> index 21c2c81..486a7a5 100644
> --- a/net/ipv6/addrconf.c
> +++ b/net/ipv6/addrconf.c
> @@ -196,6 +196,7 @@ static struct ipv6_devconf ipv6_devconf __read_mostly = {
>  	.accept_ra_defrtr	= 1,
>  	.accept_ra_from_local	= 0,
>  	.accept_ra_pinfo	= 1,
> +	.accept_ra_hop_limit    = 1,
>  #ifdef CONFIG_IPV6_ROUTER_PREF
>  	.accept_ra_rtr_pref	= 1,
>  	.rtr_probe_interval	= 60 * HZ,
> @@ -237,6 +238,7 @@ static struct ipv6_devconf ipv6_devconf_dflt __read_mostly = {
>  	.accept_ra_defrtr	= 1,
>  	.accept_ra_from_local	= 0,
>  	.accept_ra_pinfo	= 1,
> +	.accept_ra_hop_limit    = 1,
>  #ifdef CONFIG_IPV6_ROUTER_PREF
>  	.accept_ra_rtr_pref	= 1,
>  	.rtr_probe_interval	= 60 * HZ,
> @@ -4561,6 +4563,7 @@ static inline void ipv6_store_devconf(struct ipv6_devconf *cnf,
>  	array[DEVCONF_MAX_ADDRESSES] = cnf->max_addresses;
>  	array[DEVCONF_ACCEPT_RA_DEFRTR] = cnf->accept_ra_defrtr;
>  	array[DEVCONF_ACCEPT_RA_PINFO] = cnf->accept_ra_pinfo;
> +	array[DEVCONF_ACCEPT_RA_HOP_LIMIT] = cnf->accept_ra_hop_limit;
>  #ifdef CONFIG_IPV6_ROUTER_PREF
>  	array[DEVCONF_ACCEPT_RA_RTR_PREF] = cnf->accept_ra_rtr_pref;
>  	array[DEVCONF_RTR_PROBE_INTERVAL] =
> @@ -5462,6 +5465,13 @@ static struct addrconf_sysctl_table
>  			.mode		= 0644,
>  			.proc_handler	= proc_dointvec,
>  		},
> +		{
> +			.procname	= "accept_ra_hop_limit",
> +			.data		= &ipv6_devconf.accept_ra_hop_limit,
> +			.maxlen		= sizeof(int),
> +			.mode		= 0644,
> +			.proc_handler	= proc_dointvec,
> +		},
>  #ifdef CONFIG_IPV6_ROUTER_PREF
>  		{
>  			.procname	= "accept_ra_rtr_pref",
> diff --git a/net/ipv6/ndisc.c b/net/ipv6/ndisc.c
> index 0a05b35..aca67da 100644
> --- a/net/ipv6/ndisc.c
> +++ b/net/ipv6/ndisc.c
> @@ -1226,13 +1226,18 @@ static void ndisc_router_discovery(struct sk_buff *skb)
>  	if (rt)
>  		rt6_set_expires(rt, jiffies + (HZ * lifetime));
>  	if (ra_msg->icmph.icmp6_hop_limit) {
> -		/* Only set hop_limit on the interface if it is higher than
> -		 * the current hop_limit.
> -		 */
> -		if (in6_dev->cnf.hop_limit < ra_msg->icmph.icmp6_hop_limit) {
> +		switch (in6_dev->cnf.accept_ra_hop_limit) {
> +		case 0:
> +			break;
> +		case 1:
> +			if (in6_dev->cnf.hop_limit > ra_msg->icmph.icmp6_hop_limit) {
> +				ND_PRINTK(2, warn,
> +					  "RA: Got route advertisement with lower hop_limit than current\n");
> +				break;
> +			}
> +		default:
>  			in6_dev->cnf.hop_limit = ra_msg->icmph.icmp6_hop_limit;
> -		} else {
> -			ND_PRINTK(2, warn, "RA: Got route advertisement with lower hop_limit than current\n");
> +			break;
>  		}
>  		if (rt)
>  			dst_metric_set(&rt->dst, RTAX_HOPLIMIT,
> 

-- 
吉藤英明 <hideaki.yoshifuji@miraclelinux.com>
ミラクル・リナックス株式会社 技術本部 サポート部

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
  2015-07-27 23:50 ` YOSHIFUJI Hideaki/吉藤英明
@ 2015-07-28  3:05   ` Hangbin Liu
  2015-07-28  3:58     ` YOSHIFUJI Hideaki
  0 siblings, 1 reply; 7+ messages in thread
From: Hangbin Liu @ 2015-07-28  3:05 UTC (permalink / raw)
  To: YOSHIFUJI Hideaki/吉藤英明
  Cc: network dev, Hannes Frederic Sowa

2015-07-28 7:50 GMT+08:00 YOSHIFUJI Hideaki/吉藤英明
<hideaki.yoshifuji@miraclelinux.com>:
> Hi,
>
> Hangbin Liu wrote:
>> Commit 6fd99094de2b ("ipv6: Don't reduce hop limit for an interface")
>> disabled accept hop limit from RA if it is higher than the current hop
>> limit for security stuff. But this behavior kind of break the RFC definition.
>>
>> RFC 4861, 6.3.4.  Processing Received Router Advertisements
>>    If the received Cur Hop Limit value is non-zero, the host SHOULD set
>>    its CurHopLimit variable to the received value.
>>
>> So add sysctl option accept_ra_hop_limit to let user choose whether accept
>> hop limit info in RA.
>>
>
> How about introducing "minimum hop limit", instead?

Hi Yoshifuji,

This is a good idea. Maybe this can be another sysctl option?

The minimum hop limit can be an enhancement of the security issue, then we will
not only increase the hop limit, but also could decrease it in the
range of values we
accept.

On the other hand, with this patch, we can enable, disable or partly
enable accept
hop limit. If we only use "minimum hop limit", people could not use a static hop
limit value.

May be we use a “hop limit range" instead? How do you think?

Thanks
Hangbin

>
> |commit 6fd99094de2b83d1d4c8457f2c83483b2828e75a
> |Author: D.S. Ljungmark <ljungmark@modio.se>
> |Date:   Wed Mar 25 09:28:15 2015 +0100
> |
> |    ipv6: Don't reduce hop limit for an interface
> :
> |    RFC 3756, Section 4.2.7, "Parameter Spoofing"
> |
> :
> |   >   As an example, one possible approach to mitigate this threat is to
> |    >   ignore very small hop limits.  The nodes could implement a
> |    >   configurable minimum hop limit, and ignore attempts to set it below
> |    >   said limit.

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
  2015-07-28  3:05   ` Hangbin Liu
@ 2015-07-28  3:58     ` YOSHIFUJI Hideaki
  2015-07-29  2:00       ` Hangbin Liu
  0 siblings, 1 reply; 7+ messages in thread
From: YOSHIFUJI Hideaki @ 2015-07-28  3:58 UTC (permalink / raw)
  To: Hangbin Liu; +Cc: hideaki.yoshifuji, network dev, Hannes Frederic Sowa

Hi,

Hangbin Liu wrote:
> 2015-07-28 7:50 GMT+08:00 YOSHIFUJI Hideaki/吉藤英明
> <hideaki.yoshifuji@miraclelinux.com>:
>> Hi,
>>
>> Hangbin Liu wrote:
>>> Commit 6fd99094de2b ("ipv6: Don't reduce hop limit for an interface")
>>> disabled accept hop limit from RA if it is higher than the current hop
>>> limit for security stuff. But this behavior kind of break the RFC definition.
>>>
>>> RFC 4861, 6.3.4.  Processing Received Router Advertisements
>>>    If the received Cur Hop Limit value is non-zero, the host SHOULD set
>>>    its CurHopLimit variable to the received value.
>>>
>>> So add sysctl option accept_ra_hop_limit to let user choose whether accept
>>> hop limit info in RA.
>>>
>>
>> How about introducing "minimum hop limit", instead?
> 
> Hi Yoshifuji,
> 
> This is a good idea. Maybe this can be another sysctl option?
> 
> The minimum hop limit can be an enhancement of the security issue, then we will
> not only increase the hop limit, but also could decrease it in the
> range of values we
> accept.
> 
> On the other hand, with this patch, we can enable, disable or partly
> enable accept
> hop limit. If we only use "minimum hop limit", people could not use a static hop
> limit value.
> 
> May be we use a “hop limit range" instead? How do you think?

I think name of sysctl is the same as you suggested and change the
semantics.  default value is 0 to accept all hotlimit value
as before and people can set it to 32 (for example) to reject
too-small hoplimit (0-31).

--yoshfuji

> 
> Thanks
> Hangbin
> 
>>
>> |commit 6fd99094de2b83d1d4c8457f2c83483b2828e75a
>> |Author: D.S. Ljungmark <ljungmark@modio.se>
>> |Date:   Wed Mar 25 09:28:15 2015 +0100
>> |
>> |    ipv6: Don't reduce hop limit for an interface
>> :
>> |    RFC 3756, Section 4.2.7, "Parameter Spoofing"
>> |
>> :
>> |   >   As an example, one possible approach to mitigate this threat is to
>> |    >   ignore very small hop limits.  The nodes could implement a
>> |    >   configurable minimum hop limit, and ignore attempts to set it below
>> |    >   said limit.

-- 
Hideaki Yoshifuji <hideaki.yoshifuji@miraclelinux.com>
Technical Division, MIRACLE LINUX CORPORATION

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
  2015-07-28  3:58     ` YOSHIFUJI Hideaki
@ 2015-07-29  2:00       ` Hangbin Liu
  2015-07-29  2:14         ` YOSHIFUJI Hideaki
  0 siblings, 1 reply; 7+ messages in thread
From: Hangbin Liu @ 2015-07-29  2:00 UTC (permalink / raw)
  To: YOSHIFUJI Hideaki; +Cc: network dev, Hannes Frederic Sowa

2015-07-28 11:58 GMT+08:00 YOSHIFUJI Hideaki
<hideaki.yoshifuji@miraclelinux.com>:
> Hi,
>
> Hangbin Liu wrote:
>> 2015-07-28 7:50 GMT+08:00 YOSHIFUJI Hideaki/吉藤英明
>> <hideaki.yoshifuji@miraclelinux.com>:
>>> Hi,
>>>
>>> Hangbin Liu wrote:
>>>> Commit 6fd99094de2b ("ipv6: Don't reduce hop limit for an interface")
>>>> disabled accept hop limit from RA if it is higher than the current hop
>>>> limit for security stuff. But this behavior kind of break the RFC definition.
>>>>
>>>> RFC 4861, 6.3.4.  Processing Received Router Advertisements
>>>>    If the received Cur Hop Limit value is non-zero, the host SHOULD set
>>>>    its CurHopLimit variable to the received value.
>>>>
>>>> So add sysctl option accept_ra_hop_limit to let user choose whether accept
>>>> hop limit info in RA.
>>>>
>>>
>>> How about introducing "minimum hop limit", instead?
>>
>> Hi Yoshifuji,
>>
>> This is a good idea. Maybe this can be another sysctl option?
>>
>> The minimum hop limit can be an enhancement of the security issue, then we will
>> not only increase the hop limit, but also could decrease it in the
>> range of values we
>> accept.
>>
>> On the other hand, with this patch, we can enable, disable or partly
>> enable accept
>> hop limit. If we only use "minimum hop limit", people could not use a static hop
>> limit value.
>>
>> May be we use a “hop limit range" instead? How do you think?
>
> I think name of sysctl is the same as you suggested and change the
> semantics.  default value is 0 to accept all hotlimit value
> as before and people can set it to 32 (for example) to reject
> too-small hoplimit (0-31).

OK, then I will try submit a "minimum hop limit", thanks for your suggestion :)

Regards
Hangbin
>
> --yoshfuji
>
>>
>> Thanks
>> Hangbin
>>
>>>
>>> |commit 6fd99094de2b83d1d4c8457f2c83483b2828e75a
>>> |Author: D.S. Ljungmark <ljungmark@modio.se>
>>> |Date:   Wed Mar 25 09:28:15 2015 +0100
>>> |
>>> |    ipv6: Don't reduce hop limit for an interface
>>> :
>>> |    RFC 3756, Section 4.2.7, "Parameter Spoofing"
>>> |
>>> :
>>> |   >   As an example, one possible approach to mitigate this threat is to
>>> |    >   ignore very small hop limits.  The nodes could implement a
>>> |    >   configurable minimum hop limit, and ignore attempts to set it below
>>> |    >   said limit.
>
> --
> Hideaki Yoshifuji <hideaki.yoshifuji@miraclelinux.com>
> Technical Division, MIRACLE LINUX CORPORATION

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
  2015-07-29  2:00       ` Hangbin Liu
@ 2015-07-29  2:14         ` YOSHIFUJI Hideaki
  2015-07-29  9:58           ` Hangbin Liu
  0 siblings, 1 reply; 7+ messages in thread
From: YOSHIFUJI Hideaki @ 2015-07-29  2:14 UTC (permalink / raw)
  To: Hangbin Liu; +Cc: hideaki.yoshifuji, network dev, Hannes Frederic Sowa, davem

Hangbin Liu wrote:
> 2015-07-28 11:58 GMT+08:00 YOSHIFUJI Hideaki
> <hideaki.yoshifuji@miraclelinux.com>:
>> Hi,
>>
>> Hangbin Liu wrote:
>>> 2015-07-28 7:50 GMT+08:00 YOSHIFUJI Hideaki/吉藤英明
>>> <hideaki.yoshifuji@miraclelinux.com>:
>>>> Hi,
>>>>
>>>> Hangbin Liu wrote:
>>>>> Commit 6fd99094de2b ("ipv6: Don't reduce hop limit for an interface")
>>>>> disabled accept hop limit from RA if it is higher than the current hop
>>>>> limit for security stuff. But this behavior kind of break the RFC definition.
>>>>>
>>>>> RFC 4861, 6.3.4.  Processing Received Router Advertisements
>>>>>    If the received Cur Hop Limit value is non-zero, the host SHOULD set
>>>>>    its CurHopLimit variable to the received value.
>>>>>
>>>>> So add sysctl option accept_ra_hop_limit to let user choose whether accept
>>>>> hop limit info in RA.
>>>>>
>>>>
>>>> How about introducing "minimum hop limit", instead?
>>>
>>> Hi Yoshifuji,
>>>
>>> This is a good idea. Maybe this can be another sysctl option?
>>>
>>> The minimum hop limit can be an enhancement of the security issue, then we will
>>> not only increase the hop limit, but also could decrease it in the
>>> range of values we
>>> accept.
>>>
>>> On the other hand, with this patch, we can enable, disable or partly
>>> enable accept
>>> hop limit. If we only use "minimum hop limit", people could not use a static hop
>>> limit value.
>>>
>>> May be we use a “hop limit range" instead? How do you think?
>>
>> I think name of sysctl is the same as you suggested and change the
>> semantics.  default value is 0 to accept all hotlimit value
>> as before and people can set it to 32 (for example) to reject
>> too-small hoplimit (0-31).
> 
> OK, then I will try submit a "minimum hop limit", thanks for your suggestion :)

accept_ra_min_hop_limit would be better as we have
accept_ra_rt_info_max_plen.

> 
> Regards
> Hangbin
>>
>> --yoshfuji
>>
>>>
>>> Thanks
>>> Hangbin
>>>
>>>>
>>>> |commit 6fd99094de2b83d1d4c8457f2c83483b2828e75a
>>>> |Author: D.S. Ljungmark <ljungmark@modio.se>
>>>> |Date:   Wed Mar 25 09:28:15 2015 +0100
>>>> |
>>>> |    ipv6: Don't reduce hop limit for an interface
>>>> :
>>>> |    RFC 3756, Section 4.2.7, "Parameter Spoofing"
>>>> |
>>>> :
>>>> |   >   As an example, one possible approach to mitigate this threat is to
>>>> |    >   ignore very small hop limits.  The nodes could implement a
>>>> |    >   configurable minimum hop limit, and ignore attempts to set it below
>>>> |    >   said limit.
>>
>> --
>> Hideaki Yoshifuji <hideaki.yoshifuji@miraclelinux.com>
>> Technical Division, MIRACLE LINUX CORPORATION

-- 
Hideaki Yoshifuji <hideaki.yoshifuji@miraclelinux.com>
Technical Division, MIRACLE LINUX CORPORATION

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit
  2015-07-29  2:14         ` YOSHIFUJI Hideaki
@ 2015-07-29  9:58           ` Hangbin Liu
  0 siblings, 0 replies; 7+ messages in thread
From: Hangbin Liu @ 2015-07-29  9:58 UTC (permalink / raw)
  To: YOSHIFUJI Hideaki; +Cc: network dev, Hannes Frederic Sowa, David Miller

2015-07-29 10:14 GMT+08:00 YOSHIFUJI Hideaki
<hideaki.yoshifuji@miraclelinux.com>:
>>>> May be we use a “hop limit range" instead? How do you think?
>>>
>>> I think name of sysctl is the same as you suggested and change the
>>> semantics.  default value is 0 to accept all hotlimit value
>>> as before and people can set it to 32 (for example) to reject
>>> too-small hoplimit (0-31).
>>
>> OK, then I will try submit a "minimum hop limit", thanks for your suggestion :)
>
> accept_ra_min_hop_limit would be better as we have
> accept_ra_rt_info_max_plen.
>
Opps, I missed this mail and send a [PATCH] net/ipv6: add sysctl
option min_hop_limit...
I will send a [PATCHv3] net/ipv6: add sysctl option
accept_ra_min_hop_limit as this patch's
follow up. Sorry for the version confusion.

Thanks
Hangbin

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2015-07-29  9:58 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-07-27  6:35 [PATCHv2] net/ipv6: add sysctl option accept_ra_hop_limit Hangbin Liu
2015-07-27 23:50 ` YOSHIFUJI Hideaki/吉藤英明
2015-07-28  3:05   ` Hangbin Liu
2015-07-28  3:58     ` YOSHIFUJI Hideaki
2015-07-29  2:00       ` Hangbin Liu
2015-07-29  2:14         ` YOSHIFUJI Hideaki
2015-07-29  9:58           ` Hangbin Liu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).