Skip to content

Commit

Permalink
tcp: authopt: Add prefixlen support
Browse files Browse the repository at this point in the history
This allows making a key apply to an addr/prefix instead of just the
full addr. This is enabled through a custom flag, default behavior is
still full address match.

This is equivalent to TCP_MD5SIG_FLAG_PREFIX from TCP_MD5SIG and has
the same use-cases.

Signed-off-by: Leonard Crestez <cdleonard@gmail.com>
  • Loading branch information
cdleonard authored and intel-lab-lkp committed Dec 8, 2021
1 parent a000a9d commit 7498e50
Show file tree
Hide file tree
Showing 3 changed files with 75 additions and 4 deletions.
2 changes: 2 additions & 0 deletions include/net/tcp_authopt.h
Expand Up @@ -43,6 +43,8 @@ struct tcp_authopt_key_info {
u8 key[TCP_AUTHOPT_MAXKEYLEN];
/** @l3index: Same as &tcp_authopt_key.ifindex */
int l3index;
/** @prefix: Length of addr match (default full) */
int prefixlen;
/** @addr: Same as &tcp_authopt_key.addr */
struct sockaddr_storage addr;
/** @alg: Algorithm implementation matching alg_id */
Expand Down
10 changes: 10 additions & 0 deletions include/uapi/linux/tcp.h
Expand Up @@ -405,6 +405,8 @@ struct tcp_authopt {
* @TCP_AUTHOPT_KEY_IFINDEX: Key only valid for `tcp_authopt.ifindex`
* @TCP_AUTHOPT_KEY_NOSEND: Key invalid for send (expired)
* @TCP_AUTHOPT_KEY_NORECV: Key invalid for recv (expired)
* @TCP_AUTHOPT_KEY_PREFIXLEN: Valid value in `tcp_authopt.prefixlen`, otherwise
* match full address length
*/
enum tcp_authopt_key_flag {
TCP_AUTHOPT_KEY_DEL = (1 << 0),
Expand All @@ -413,6 +415,7 @@ enum tcp_authopt_key_flag {
TCP_AUTHOPT_KEY_IFINDEX = (1 << 3),
TCP_AUTHOPT_KEY_NOSEND = (1 << 4),
TCP_AUTHOPT_KEY_NORECV = (1 << 5),
TCP_AUTHOPT_KEY_PREFIXLEN = (1 << 6),
};

/**
Expand Down Expand Up @@ -467,6 +470,13 @@ struct tcp_authopt_key {
* This is similar to `tcp_msg5sig.tcpm_ifindex`
*/
int ifindex;
/**
* @prefixlen: length of prefix to match
*
* Without the TCP_AUTHOPT_KEY_PREFIXLEN flag this is ignored and a full
* address match is performed.
*/
int prefixlen;
};

/* setsockopt(fd, IPPROTO_TCP, TCP_ZEROCOPY_RECEIVE, ...) */
Expand Down
67 changes: 63 additions & 4 deletions net/ipv4/tcp_authopt.c
@@ -1,6 +1,11 @@
// SPDX-License-Identifier: GPL-2.0-or-later

#include "linux/in6.h"
#include "linux/inetdevice.h"
#include "linux/net.h"
#include "linux/socket.h"
#include "linux/tcp.h"
#include "net/ipv6.h"
#include <linux/kernel.h>
#include <net/tcp.h>
#include <net/tcp_authopt.h>
Expand Down Expand Up @@ -221,6 +226,10 @@ static bool tcp_authopt_key_match_exact(struct tcp_authopt_key_info *info,
return false;
if ((info->flags & TCP_AUTHOPT_KEY_IFINDEX) && info->l3index != key->ifindex)
return false;
if ((info->flags & TCP_AUTHOPT_KEY_PREFIXLEN) != (key->flags & TCP_AUTHOPT_KEY_PREFIXLEN))
return false;
if ((info->flags & TCP_AUTHOPT_KEY_PREFIXLEN) && info->prefixlen != key->prefixlen)
return false;
if ((info->flags & TCP_AUTHOPT_KEY_ADDR_BIND) != (key->flags & TCP_AUTHOPT_KEY_ADDR_BIND))
return false;
if (info->flags & TCP_AUTHOPT_KEY_ADDR_BIND)
Expand All @@ -238,13 +247,16 @@ static bool tcp_authopt_key_match_skb_addr(struct tcp_authopt_key_info *key,

if (keyaf == AF_INET && iph->version == 4) {
struct sockaddr_in *key_addr = (struct sockaddr_in *)&key->addr;
u32 mask = inet_make_mask(key->prefixlen);

return iph->saddr == key_addr->sin_addr.s_addr;
return (iph->saddr & mask) == key_addr->sin_addr.s_addr;
} else if (keyaf == AF_INET6 && iph->version == 6) {
struct ipv6hdr *ip6h = (struct ipv6hdr *)skb_network_header(skb);
struct sockaddr_in6 *key_addr = (struct sockaddr_in6 *)&key->addr;

return ipv6_addr_equal(&ip6h->saddr, &key_addr->sin6_addr);
return ipv6_prefix_equal(&ip6h->saddr,
&key_addr->sin6_addr,
key->prefixlen);
}

/* This actually happens with ipv6-mapped-ipv4-addresses
Expand All @@ -264,12 +276,15 @@ static bool tcp_authopt_key_match_sk_addr(struct tcp_authopt_key_info *key,

if (keyaf == AF_INET) {
struct sockaddr_in *key_addr = (struct sockaddr_in *)&key->addr;
u32 mask = inet_make_mask(key->prefixlen);

return addr_sk->sk_daddr == key_addr->sin_addr.s_addr;
return (addr_sk->sk_daddr & mask) == key_addr->sin_addr.s_addr;
} else if (keyaf == AF_INET6) {
struct sockaddr_in6 *key_addr = (struct sockaddr_in6 *)&key->addr;

return ipv6_addr_equal(&addr_sk->sk_v6_daddr, &key_addr->sin6_addr);
return ipv6_prefix_equal(&addr_sk->sk_v6_daddr,
&key_addr->sin6_addr,
key->prefixlen);
}

return false;
Expand Down Expand Up @@ -298,6 +313,12 @@ static bool better_key_match(struct tcp_authopt_key_info *old, struct tcp_authop
return false;
if (old->l3index == 0 && new->l3index)
return true;
/* Full address match overrides match by prefixlen */
if (!(new->flags & TCP_AUTHOPT_KEY_PREFIXLEN) && (old->flags & TCP_AUTHOPT_KEY_PREFIXLEN))
return false;
/* Longer prefixes are better matches */
if (new->prefixlen > old->prefixlen)
return true;

return false;
}
Expand Down Expand Up @@ -598,16 +619,27 @@ void tcp_authopt_clear(struct sock *sk)
TCP_AUTHOPT_KEY_EXCLUDE_OPTS | \
TCP_AUTHOPT_KEY_ADDR_BIND | \
TCP_AUTHOPT_KEY_IFINDEX | \
TCP_AUTHOPT_KEY_PREFIXLEN | \
TCP_AUTHOPT_KEY_NOSEND | \
TCP_AUTHOPT_KEY_NORECV)

static bool ipv6_addr_is_prefix(struct in6_addr *addr, int plen)
{
struct in6_addr copy;

ipv6_addr_prefix_copy(&copy, addr, plen);

return !!memcmp(&copy, addr, sizeof(*addr));
}

int tcp_set_authopt_key(struct sock *sk, sockptr_t optval, unsigned int optlen)
{
struct tcp_authopt_key opt;
struct tcp_authopt_info *info;
struct tcp_authopt_key_info *key_info, *old_key_info;
struct tcp_authopt_alg_imp *alg;
int l3index = 0;
int prefixlen;
int err;

sock_owned_by_me(sk);
Expand Down Expand Up @@ -643,6 +675,32 @@ int tcp_set_authopt_key(struct sock *sk, sockptr_t optval, unsigned int optlen)
return -EINVAL;
}

/* check prefixlen */
if (opt.flags & TCP_AUTHOPT_KEY_PREFIXLEN) {
prefixlen = opt.prefixlen;
if (sk->sk_family == AF_INET) {
if (prefixlen < 0 || prefixlen > 32)
return -EINVAL;
if (((struct sockaddr_in *)&opt.addr)->sin_addr.s_addr &
~inet_make_mask(prefixlen))
return -EINVAL;
}
if (sk->sk_family == AF_INET6) {
if (prefixlen < 0 || prefixlen > 128)
return -EINVAL;
if (!ipv6_addr_is_prefix(&((struct sockaddr_in6 *)&opt.addr)->sin6_addr,
prefixlen))
return -EINVAL;
}
} else {
if (sk->sk_family == AF_INET)
prefixlen = 32;
else if (sk->sk_family == AF_INET6)
prefixlen = 128;
else
return -EINVAL;
}

/* Initialize tcp_authopt_info if not already set */
info = __tcp_authopt_info_get_or_create(sk);
if (IS_ERR(info))
Expand Down Expand Up @@ -690,6 +748,7 @@ int tcp_set_authopt_key(struct sock *sk, sockptr_t optval, unsigned int optlen)
memcpy(key_info->key, opt.key, opt.keylen);
memcpy(&key_info->addr, &opt.addr, sizeof(key_info->addr));
key_info->l3index = l3index;
key_info->prefixlen = prefixlen;
hlist_add_head_rcu(&key_info->node, &info->head);

return 0;
Expand Down

0 comments on commit 7498e50

Please sign in to comment.