You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
/* Don't even process incoming useless or malicious packets * - broadcasts/multicasts, * - suspected TCP LAND attacks (if the current interface is NOT a Loopback interface) * - Packets from IP source 0.0.0.0 */if (ip_addr_isbroadcast(¤t_iphdr_dest, inp) ||ip_addr_ismulticast(¤t_iphdr_dest) ||
(ip_addr_cmp(&(iphdr->src), &(iphdr->dest)) &&ip_addr_cmp(&(iphdr->src), &(inp->ip_addr)) && !ip_addr_isloopback(&(inp->ip_addr))) ||ip_addr_isany(¤t_iphdr_src)) {
TCP_STATS_INC(tcp.proterr);
goto dropped;
}
the tcp_input() function is checking for multicast or broadcast packets and drops them because they shouldn't be processed there.
This should be extended to also drop the following potentially malicious packets:
The text was updated successfully, but these errors were encountered: