Page MenuHomeFreeBSD

Don't retain TF_RCVD_TSTMP when TF_NOOPT prevents sending timestamps
ClosedPublic

Authored by rscheff on Feb 13 2021, 4:55 PM.
Tags
None
Referenced Files
Unknown Object (File)
Oct 13 2024, 3:40 AM
Unknown Object (File)
Oct 1 2024, 4:11 AM
Unknown Object (File)
Sep 27 2024, 12:10 PM
Unknown Object (File)
Sep 27 2024, 7:03 AM
Unknown Object (File)
Sep 26 2024, 7:16 AM
Unknown Object (File)
Sep 23 2024, 5:15 PM
Unknown Object (File)
Sep 23 2024, 11:34 AM
Unknown Object (File)
Sep 22 2024, 1:53 AM
Subscribers

Details

Summary

The strict adherance to RFC7323 (D27148) requires the server to take
into consideration, if it will be sending out a TSopt in the SYN,ACK.

Retaining the TF_RCVD_TSTMP would otherwise later indicate the
successful negotiation of the TSopt - even when the session was set up
without TS support.

See also bug 253576

MFC after: 3 days

Test Plan
ifconfig epair0 create
ifconfig epair0a 10.0.0.101 up
ifconfig epair0b 10.0.0.102 up
nc --no-tcpopt -l 10.0.0.101 12345 &
nc -s 10.0.0.102 10.0.0.101 12345 &

netstat -nap tcp

verify, that both half-connections are in the established state

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Passed
Unit
No Test Coverage
Build Status
Buildable 36984
Build 33873: arc lint + arc unit

Event Timeline

sys/netinet/tcp_input.c
1652–1653

We need to replace

if ((to.to_flags & TOF_SCALE) &&
    (tp->t_flags & TF_REQ_SCALE)) {

by

if ((to.to_flags & TOF_SCALE) &&
    (tp->t_flags & TF_REQ_SCALE) &&
    !(tp->t_flags & TF_NOOPT)) {
sys/netinet/tcp_syncache.c
1665

I guess the same argument applies to window scaling.
So I would suggest to replace

if (V_tcp_do_rfc1323) {

by

if (V_tcp_do_rfc1323 && !(ltflags & TF_NOOPT)) {

and remove the condition here.

tuexen requested changes to this revision.Feb 14 2021, 12:21 AM
This revision now requires changes to proceed.Feb 14 2021, 12:21 AM

The above modifications are necessary in combination with D28656 to allow the following packetdrill script to run successfully:

 0.00 `sysctl -w net.inet.tcp.hostcache.purgenow=1`
+0.00 `sysctl -w net.inet.tcp.syncookies_only=0`
+0.00 `sysctl -w net.inet.tcp.syncookies=1`
+0.00 `sysctl -w net.inet.tcp.rfc1323=1`
+0.00 `sysctl -w net.inet.tcp.sack.enable=1`
+0.00 `sysctl -w net.inet.tcp.ecn.enable=2`

+0.00 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0.00 fcntl(3, F_GETFL) = 0x02 (flags O_RDWR)
+0.00 fcntl(3, F_SETFL, O_RDWR | O_NONBLOCK) = 0
+0.00 setsockopt(3, IPPROTO_TCP, TCP_NOOPT, [1], 4) = 0
+0.00 connect(3, ..., ...) = -1 EINPROGRESS (Operation now in progress)
+0.00 > S    0:0(0)       win 65535
+0.05 < S    0:0(0)       win 65535 <mss 1460,nop,wscale 6,sackOK,TS val 100 ecr 0>
+0.00 > S.   0:0(0) ack 1 win 65535
+0.00 <  .   1:1(0) ack 1 win 65535
+0.00 < P.   1:2(1) ack 1 win 65535
+0.04 >  .   1:1(0) ack 2 win 65535
  • consider TF_NOOPT for all SYN options (simultaneous SYN)

Generalizing, the other options need to be disabled too, in case of a simultaneous SYN. Disabling the request before that, during the tcp_newtcpcb() for an abundance of safety.

sys/netinet/tcp_subr.c
1766–1771

I think this can't be true, since you just created the tcb and it is initialized with 0. So I would suggest to remove this change.

Programmatically, correct. Which makes me wonder, shouldn't the TF_NOOPT (and other flags) be inherited from a listening socket, when you accept() an incoming connection?

E.g. if you want to check if specific options are set on an accepted socket (rather then the listening socket), it currently doesn't seem to reflect the settings actually in effect, but the system global defaults...

  • remove check in tcp_newtcpcb() again
sys/netinet/tcp_input.c
1677–1678

I don't think we should never be here with TCP_NOOPT.
Also disabling the path is not the correct action here.

rscheff marked an inline comment as done.
  • moving the parallel SYN check further down, to gracefully disable FASTOPEN
sys/netinet/tcp_input.c
1677–1678

This also deals with the parallel open state: While we may not have sent TFO in the outgoing SYN, the incoming SYN could have a TFO option. I suggest to gracefully disable TFO in this case, instead of having one half-connecting in TFO state, and the other without TFO, as NOOPT prevents the transmission of TFO later in tcp_output().

sys/netinet/tcp_input.c
1677–1678

If you want to do a check here, do it above. The way you do it now results in disabling TFO with a reason for doing so.

1677–1678

This also deals with the parallel open state: While we may not have sent TFO in the outgoing SYN, the incoming SYN could have a TFO option. I suggest to gracefully disable TFO in this case, instead of having one half-connecting in TFO state, and the other without TFO, as NOOPT prevents the transmission of TFO later in tcp_output().

This revision is now accepted and ready to land.Feb 25 2021, 2:43 PM