HomeFreeBSD

tcp: mitigate a side channel for detection of TCP connections

Description

tcp: mitigate a side channel for detection of TCP connections

If a blind attacker wants to guess by sending ACK segments if there
exists a TCP connection , this might trigger a challenge ACK on an
existing TCP connection. To make this hit non-observable for the
attacker, also increment the global counter, which would have been
incremented if it would have been a non-hit.
This issue was reported as issue number 11 in Keyu Man et al.:
SCAD: Towards a Universal and Automated Network Side-Channel

Vulnerability Detection

Reviewed by: Nick Banks, Peter Lei
Sponsored by: Netflix, Inc.
Differential Revision: https://reviews.freebsd.org/D51724

(cherry picked from commit f0f6e50388963cae44bb92bb69ed7a1135dd2eec)

Details

Provenance
tuexenAuthored on Aug 9 2025, 12:17 PM
Reviewer
nick
Differential Revision
D51724: tcp: mitigate a side channel for detection of TCP connections
Parents
rGe7331da314b5: tcp: rate limit the sending of all RST segments
Branches
Unknown
Tags
Unknown