Page MenuHomeFreeBSD

Disallow broken ECN TCP stacks from using ECN
ClosedPublic

Authored by rscheff on Jan 28 2019, 1:56 AM.
Tags
None
Referenced Files
F82196589: D18996.id53306.diff
Fri, Apr 26, 9:06 AM
Unknown Object (File)
Thu, Apr 25, 9:04 PM
Unknown Object (File)
Wed, Apr 24, 6:10 AM
Unknown Object (File)
Fri, Mar 29, 1:15 PM
Unknown Object (File)
Mar 25 2024, 10:07 PM
Unknown Object (File)
Jan 23 2024, 9:48 PM
Unknown Object (File)
Jan 3 2024, 5:16 AM
Unknown Object (File)
Dec 22 2023, 10:06 PM
Subscribers

Details

Summary

RFC3168 specifies on page 15, how to correctly negotiate for a TCP session with ECN support.

There are a (diminishing) number of middleboxes reflecting reserved TCP header bits. Simultaneously an increasing interest in deploying ECN, may lead to
the incorrect behavior for TCP sessions.

On a SYN, both CWR and ECE have to be set, while on the SYN,ACK only the ECE must be set, and CWR must be clear.

Test Plan

Simulating a non-compliant ECN client, injecting ECE-marked ACKs should not result in a reduction of cwnd (and no packets with the CWR bit set).

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

Here are two test scripts to validate both the proper behavior of ECN as a client, against a conformant RFC3168 client, as well as a non-conformant client which reflects back all header flags as received:

This revision is now accepted and ready to land.Jan 28 2019, 12:04 PM
tuexen requested changes to this revision.Jan 28 2019, 12:23 PM

Please apply the same fix to tcp_stacks/rack.c.

This revision now requires changes to proceed.Jan 28 2019, 12:23 PM
  • adding RACK stack to ECN handshake check
  • trailing whitespace
This revision was not accepted when it landed; it landed in state Needs Review.Jan 28 2019, 12:45 PM
This revision was automatically updated to reflect the committed changes.