Page MenuHomeFreeBSD

if_ovpn: ensure we never re-use sequence numbers
ClosedPublic

Authored by kp on May 20 2023, 6:38 PM.
Tags
None
Referenced Files
Unknown Object (File)
Mon, Oct 7, 10:15 PM
Unknown Object (File)
Fri, Oct 4, 9:13 PM
Unknown Object (File)
Fri, Oct 4, 2:53 PM
Unknown Object (File)
Wed, Oct 2, 3:11 PM
Unknown Object (File)
Wed, Oct 2, 1:21 AM
Unknown Object (File)
Wed, Oct 2, 12:15 AM
Unknown Object (File)
Sun, Sep 29, 8:18 PM
Unknown Object (File)
Sat, Sep 28, 2:39 PM

Details

Summary

if_ovpn already notified userpsace when there was a risk of sequence
number re-use, but it trusted userspace to actually rotate the key.

Convert the internal sequence number counter to 64 bits so we can detect
overflows and then refuse to send packets.

Event: BSDCan 2023
Sponsored by: Rubicon Communications, LLC ("Netgate")

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

kp requested review of this revision.May 20 2023, 6:38 PM
This revision was not accepted when it landed; it landed in state Needs Review.May 23 2023, 2:14 PM
This revision was automatically updated to reflect the committed changes.