-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Need to shield the module from malformed packets further. #40
Comments
Done validating outer packets. Still have a ways to go for inner ones.
Dude, Why are you skipping the kernel's packet defragmentation function? You could grab packets with the NF_INET_LOCAL_IN hook and receive only defragmented packets... or use conntrack but it seems it got removed... :( |
Because if the kernel reassembles the fragments for us, we lose the MTU computed during path MTU discovery. And that means we won't know the ideal fragment size when we need to refragment the packet. If the NAT64 picks an incorrect MTU, it could become a black hole. |
I always thought PMTUD was meant to avoid fragmentation... source: http://packetlife.net/blog/2008/aug/18/path-mtu-discovery/ |
Yup, my mistake; sorry. |
Test case ID: N/A
Date: 2013/05/14
OS: N/A
Tester: AL
Error module: core, translate_packet
Description: Considering we'll eventually have to skip the kernel's packet defragmentation module, our validation routines are too weak. In order to avoid wild pointers, we'll have to ensure the next and length fields are consistent both in network and transport headers.
Observations: These validations need to be applied to ICMP inner packets too.
The text was updated successfully, but these errors were encountered: