Skip to content
Permalink
Browse files
icmp: add response to RFC 8335 PROBE messages
Modify the icmp_rcv function to check PROBE messages and call icmp_echo
if a PROBE request is detected.

Modify the existing icmp_echo function to respond ot both ping and PROBE
requests.

This was tested using a custom modification to the iputils package and
wireshark. It supports IPV4 probing by name, ifindex, and probing by
both IPV4 and IPV6 addresses. It currently does not support responding
to probes off the proxy node (see RFC 8335 Section 2).

Signed-off-by: Andreas Roeseler <andreas.a.roeseler@gmail.com>
  • Loading branch information
aroeseler authored and intel-lab-lkp committed Mar 14, 2021
1 parent 3e57e03 commit 54d9928f1734e7b3511b945a2ce912b931a07776
Showing 1 changed file with 130 additions and 15 deletions.
@@ -93,6 +93,10 @@
#include <net/ip_fib.h>
#include <net/l3mdev.h>

#if IS_ENABLED(CONFIG_IPV6)
#include <net/addrconf.h>
#endif

/*
* Build xmit assembly blocks
*/
@@ -971,35 +975,135 @@ static bool icmp_redirect(struct sk_buff *skb)
}

/*
* Handle ICMP_ECHO ("ping") requests.
* Handle ICMP_ECHO ("ping") and ICMP_EXT_ECHO ("PROBE") requests.
*
* RFC 1122: 3.2.2.6 MUST have an echo server that answers ICMP echo
* requests.
* RFC 1122: 3.2.2.6 Data received in the ICMP_ECHO request MUST be
* included in the reply.
* RFC 1812: 4.3.3.6 SHOULD have a config option for silently ignoring
* echo requests, MUST have default=NOT.
* RFC 8335: 8 MUST have a config option to enable/disable ICMP
* Extended Echo Functionality, MUST be disabled by default
* See also WRT handling of options once they are done and working.
*/

static bool icmp_echo(struct sk_buff *skb)
{
struct icmp_ext_hdr *ext_hdr, _ext_hdr;
struct icmp_ext_echo_iio *iio, _iio;
struct icmp_bxm icmp_param;
struct net_device *dev;
struct net *net;
u16 ident_len;
char *buff;
u8 status;

net = dev_net(skb_dst(skb)->dev);
if (!net->ipv4.sysctl_icmp_echo_ignore_all) {
struct icmp_bxm icmp_param;

icmp_param.data.icmph = *icmp_hdr(skb);
icmp_param.data.icmph.type = ICMP_ECHOREPLY;
icmp_param.skb = skb;
icmp_param.offset = 0;
icmp_param.data_len = skb->len;
icmp_param.head_len = sizeof(struct icmphdr);
icmp_reply(&icmp_param, skb);
}
/* should there be an ICMP stat for ignored echos? */
return true;
if (net->ipv4.sysctl_icmp_echo_ignore_all)
return true;

icmp_param.data.icmph = *icmp_hdr(skb);
icmp_param.skb = skb;
icmp_param.offset = 0;
icmp_param.data_len = skb->len;
icmp_param.head_len = sizeof(struct icmphdr);

if (icmp_param.data.icmph.type == ICMP_ECHO)
goto send_reply;
if (!net->ipv4.sysctl_icmp_echo_enable_probe)
return true;
/* We currently only support probing interfaces on the proxy node
* Check to ensure L-bit is set
*/
if (!(ntohs(icmp_param.data.icmph.un.echo.sequence) & 1))
return true;
/* Clear status bits in reply message */
icmp_param.data.icmph.un.echo.sequence &= htons(0xFF00);
icmp_param.data.icmph.type = ICMP_EXT_ECHOREPLY;
ext_hdr = skb_header_pointer(skb, 0, sizeof(_ext_hdr), &_ext_hdr);
iio = skb_header_pointer(skb, sizeof(_ext_hdr), sizeof(_iio), &_iio);
if (!ext_hdr || !iio)
goto send_mal_query;
if (ntohs(iio->extobj_hdr.length) <= sizeof(iio->extobj_hdr))
goto send_mal_query;
ident_len = ntohs(iio->extobj_hdr.length) - sizeof(iio->extobj_hdr);
status = 0;
dev = NULL;
switch (iio->extobj_hdr.class_type) {
case EXT_ECHO_CTYPE_NAME:
if (ident_len >= IFNAMSIZ)
goto send_mal_query;
buff = kcalloc(IFNAMSIZ, sizeof(char), GFP_KERNEL);
if (!buff)
return -ENOMEM;
memcpy(buff, &iio->ident.name, ident_len);
/* RFC 8335 2.1 If the Object Payload would not otherwise terminate
* on a 32-bit boundary, it MUST be padded with ASCII NULL characters
*/
if (ident_len % sizeof(u32) != 0) {
u8 i;

for (i = ident_len; i % sizeof(u32) != 0; i++) {
if (buff[i] != '\0')
goto send_mal_query;
}
}
dev = dev_get_by_name(net, buff);
kfree(buff);
break;
case EXT_ECHO_CTYPE_INDEX:
if (ident_len != sizeof(iio->ident.ifindex))
goto send_mal_query;
dev = dev_get_by_index(net, ntohl(iio->ident.ifindex));
break;
case EXT_ECHO_CTYPE_ADDR:
if (ident_len != sizeof(iio->ident.addr.ctype3_hdr) + iio->ident.addr.ctype3_hdr.addrlen)
goto send_mal_query;
switch (ntohs(iio->ident.addr.ctype3_hdr.afi)) {
case ICMP_AFI_IP:
if (ident_len != sizeof(iio->ident.addr.ctype3_hdr) + sizeof(struct in_addr))
goto send_mal_query;
dev = ip_dev_find(net, iio->ident.addr.ip_addr.ipv4_addr.s_addr);
break;
#if IS_ENABLED(CONFIG_IPV6)
case ICMP_AFI_IP6:
if (ident_len != sizeof(iio->ident.addr.ctype3_hdr) + sizeof(struct in6_addr))
goto send_mal_query;
rcu_read_lock();
dev = ipv6_dev_find(net, &iio->ident.addr.ip_addr.ipv6_addr, dev);
if (dev)
dev_hold(dev);
rcu_read_unlock();
break;
#endif
default:
goto send_mal_query;
}
break;
default:
goto send_mal_query;
}
if (!dev) {
icmp_param.data.icmph.code = ICMP_EXT_NO_IF;
goto send_reply;
}
/* Fill bits in reply message */
if (dev->flags & IFF_UP)
status |= EXT_ECHOREPLY_ACTIVE;
if (__in_dev_get_rcu(dev) && __in_dev_get_rcu(dev)->ifa_list)
status |= EXT_ECHOREPLY_IPV4;
if (!list_empty(&dev->ip6_ptr->addr_list))
status |= EXT_ECHOREPLY_IPV6;
dev_put(dev);
icmp_param.data.icmph.un.echo.sequence |= htons(status);
send_reply:
icmp_reply(&icmp_param, skb);
return true;
send_mal_query:
icmp_param.data.icmph.code = ICMP_EXT_MAL_QUERY;
goto send_reply;
}

/*
@@ -1088,6 +1192,11 @@ int icmp_rcv(struct sk_buff *skb)
icmph = icmp_hdr(skb);

ICMPMSGIN_INC_STATS(net, icmph->type);

/* Check for ICMP Extended Echo (PROBE) messages */
if (icmph->type == ICMP_EXT_ECHO)
goto probe;

/*
* 18 is the highest 'known' ICMP type. Anything else is a mystery
*
@@ -1097,7 +1206,6 @@ int icmp_rcv(struct sk_buff *skb)
if (icmph->type > NR_ICMP_TYPES)
goto error;


/*
* Parse the ICMP message
*/
@@ -1123,7 +1231,7 @@ int icmp_rcv(struct sk_buff *skb)
}

success = icmp_pointers[icmph->type].handler(skb);

success_check:
if (success) {
consume_skb(skb);
return NET_RX_SUCCESS;
@@ -1137,6 +1245,12 @@ int icmp_rcv(struct sk_buff *skb)
error:
__ICMP_INC_STATS(net, ICMP_MIB_INERRORS);
goto drop;
probe:
/* We can't use icmp_pointers[].handler() because it is an array of
* size NR_ICMP_TYPES + 1 (19 elements) and PROBE has code 42.
*/
success = icmp_echo(skb);
goto success_check;
}

static bool ip_icmp_error_rfc4884_validate(const struct sk_buff *skb, int off)
@@ -1340,6 +1454,7 @@ static int __net_init icmp_sk_init(struct net *net)

/* Control parameters for ECHO replies. */
net->ipv4.sysctl_icmp_echo_ignore_all = 0;
net->ipv4.sysctl_icmp_echo_enable_probe = 0;
net->ipv4.sysctl_icmp_echo_ignore_broadcasts = 1;

/* Control parameter - ignore bogus broadcast responses? */

0 comments on commit 54d9928

Please sign in to comment.