Hello,
On Tue, 5 Feb 2013, Daniel Borkmann wrote:
> In our test lab, we have a simple SCTP client connecting to a SCTP
> server via an IPVS load balancer. On some machines, load balancing
> works, but on others the initial handshake just fails, thus no
> SCTP connection whatsoever can be established!
>
> We observed that the SCTP INIT-ACK handshake reply from the IPVS
> machine to the client had a correct IP checksum, but corrupt SCTP
> checksum when forwarded, thus on the client-side the packet was
> dropped and an intial handshake retriggered until all attempts
> run into the void.
>
> To fix this issue, this patch i) adds a missing CHECKSUM_UNNECESSARY
> after the full checksum (re-)calculation (as done in IPVS TCP and UDP
> code as well), ii) calculates the checksum in little-endian format
> (as fixed with the SCTP code in commit 4458f04c: sctp: Clean up sctp
> checksumming code) and iii) refactors duplicate checksum code into a
> common function. Tested by myself.
>
> Cc: Simon Horman <horms@xxxxxxxxxxxx>
> Cc: Julian Anastasov <ja@xxxxxx>
> Signed-off-by: Daniel Borkmann <dborkman@xxxxxxxxxx>
Looks good to me. Simon, please apply as bugfix.
It seems we have this problem from day 1 (2.6.34).
Acked-by: Julian Anastasov <ja@xxxxxx>
> ---
> net/netfilter/ipvs/ip_vs_proto_sctp.c | 35
> ++++++++++++++++-----------------
> 1 files changed, 17 insertions(+), 18 deletions(-)
>
> diff --git a/net/netfilter/ipvs/ip_vs_proto_sctp.c
> b/net/netfilter/ipvs/ip_vs_proto_sctp.c
> index 746048b..ae8ec6f 100644
> --- a/net/netfilter/ipvs/ip_vs_proto_sctp.c
> +++ b/net/netfilter/ipvs/ip_vs_proto_sctp.c
> @@ -61,14 +61,27 @@ sctp_conn_schedule(int af, struct sk_buff *skb, struct
> ip_vs_proto_data *pd,
> return 1;
> }
>
> +static void sctp_nat_csum(struct sk_buff *skb, sctp_sctphdr_t *sctph,
> + unsigned int sctphoff)
> +{
> + __u32 crc32;
> + struct sk_buff *iter;
> +
> + crc32 = sctp_start_cksum((__u8 *)sctph, skb_headlen(skb) - sctphoff);
> + skb_walk_frags(skb, iter)
> + crc32 = sctp_update_cksum((u8 *) iter->data,
> + skb_headlen(iter), crc32);
> + sctph->checksum = sctp_end_cksum(crc32);
> +
> + skb->ip_summed = CHECKSUM_UNNECESSARY;
> +}
> +
> static int
> sctp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
> struct ip_vs_conn *cp, struct ip_vs_iphdr *iph)
> {
> sctp_sctphdr_t *sctph;
> unsigned int sctphoff = iph->len;
> - struct sk_buff *iter;
> - __be32 crc32;
>
> #ifdef CONFIG_IP_VS_IPV6
> if (cp->af == AF_INET6 && iph->fragoffs)
> @@ -92,13 +105,7 @@ sctp_snat_handler(struct sk_buff *skb, struct
> ip_vs_protocol *pp,
> sctph = (void *) skb_network_header(skb) + sctphoff;
> sctph->source = cp->vport;
>
> - /* Calculate the checksum */
> - crc32 = sctp_start_cksum((u8 *) sctph, skb_headlen(skb) - sctphoff);
> - skb_walk_frags(skb, iter)
> - crc32 = sctp_update_cksum((u8 *) iter->data, skb_headlen(iter),
> - crc32);
> - crc32 = sctp_end_cksum(crc32);
> - sctph->checksum = crc32;
> + sctp_nat_csum(skb, sctph, sctphoff);
>
> return 1;
> }
> @@ -109,8 +116,6 @@ sctp_dnat_handler(struct sk_buff *skb, struct
> ip_vs_protocol *pp,
> {
> sctp_sctphdr_t *sctph;
> unsigned int sctphoff = iph->len;
> - struct sk_buff *iter;
> - __be32 crc32;
>
> #ifdef CONFIG_IP_VS_IPV6
> if (cp->af == AF_INET6 && iph->fragoffs)
> @@ -134,13 +139,7 @@ sctp_dnat_handler(struct sk_buff *skb, struct
> ip_vs_protocol *pp,
> sctph = (void *) skb_network_header(skb) + sctphoff;
> sctph->dest = cp->dport;
>
> - /* Calculate the checksum */
> - crc32 = sctp_start_cksum((u8 *) sctph, skb_headlen(skb) - sctphoff);
> - skb_walk_frags(skb, iter)
> - crc32 = sctp_update_cksum((u8 *) iter->data, skb_headlen(iter),
> - crc32);
> - crc32 = sctp_end_cksum(crc32);
> - sctph->checksum = crc32;
> + sctp_nat_csum(skb, sctph, sctphoff);
>
> return 1;
> }
> --
> 1.7.1
Regards
--
Julian Anastasov <ja@xxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe lvs-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
|