On 11/5/21 4:08 AM, Dmitry Safonov wrote:
On 11/1/21 16:34, Leonard Crestez wrote: [..]
+/* Find TCP_AUTHOPT in header.
- Returns pointer to TCP_AUTHOPT or NULL if not found.
- */
+static u8 *tcp_authopt_find_option(struct tcphdr *th) +{
- int length = (th->doff << 2) - sizeof(*th);
- u8 *ptr = (u8 *)(th + 1);
- while (length >= 2) {
int opcode = *ptr++;
int opsize;
switch (opcode) {
case TCPOPT_EOL:
return NULL;
case TCPOPT_NOP:
length--;
continue;
default:
if (length < 2)
return NULL;
^ never true, as checked by the loop condition
opsize = *ptr++;
if (opsize < 2)
return NULL;
if (opsize > length)
return NULL;
if (opcode == TCPOPT_AUTHOPT)
return ptr - 2;
}
ptr += opsize - 2;
length -= opsize;
- }
- return NULL;
+}
Why copy'n'pasting tcp_parse_md5sig_option(), rather than adding a new argument to the function?
No good reason.
There is a requirement in RFC5925 that packets with both AO and MD5 signatures be dropped. This currently works but the implementation is convoluted: after an AO signature is found an error is returned if MD5 is also present.
A better solution would be to do a single scan for both options up front, for example in tcp_{v4,v6}_auth_inbound_check
-- Regards, Leonard