Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp405908pxx; Wed, 28 Oct 2020 07:38:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzqfddQZYgStQZqioAXYEDMuEDH52GE0rQg2zQ5oLEt4xWzOsepcL2GeEKZK++NXegFpkrv X-Received: by 2002:a17:906:c102:: with SMTP id do2mr2357674ejc.236.1603895906473; Wed, 28 Oct 2020 07:38:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603895906; cv=none; d=google.com; s=arc-20160816; b=UMLMGifLmBl0n4uWFr1OindlCwpb68/avqRExTLCZicOmZt48mCZ9P1tmR4vnVEuk/ 2MvZH/N589Q725giEBzQSRQ8ds9O8RiGqQudWUjJPE0raTLr4v+Vj23zgBg2paS0Q17i Tp8gsEpxBSxkrkn7Z/i/9keBrdzCRuPEAUyT1U2KQJ3fMHwP2sjY5AwN21+mI1PxB9zz eYKiVEK29npxr5eECx6gUH13IKc/zbWkkkb9z+tjBHFZtYbyhuVe1SGOqcWsxJSzoVLK BpoQQFMjVCGXh3tiSLEGZAxYCmccGnpZl20d2SNQYx20OvFJh1wDf30sd8V6mI2puNr/ vErQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZV18JtENmdZi7C+KzoH6WAWqhozNEI3ZIdRgJ1Xfguw=; b=DQEG/j4Lp5N9aDkVkgmfs+nFm3UIT5CjOl30vcmGWuLcehEYWIzDLKLlNdf4iISs01 ieUiEbWMRWVlA4av7IcKnwTwy/nsY4wc4F7d8zUxYw0+NhnPeadPTipfToqVgDV4MseQ a+FrHsGEUgni732IzLxXYAcOwL0PDe4aEwh27ARAXcMqwNDvItOnacvx9aGXCfut9VRD v9eyGhhnUIFnB7eOktYizzVX956DVVViW0r/rzUYK3xCyulDWyx8wKjEV/6WmdSoorB3 XnwY1SaXX7OQlP0kbY2FisUi+nYRhVeazJWGAJ9va7gROF5OXO5uSKY/Gzg+soeyAkFg tgjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="WyUPj/9l"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p17si2879649ejg.48.2020.10.28.07.38.02; Wed, 28 Oct 2020 07:38:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="WyUPj/9l"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1806246AbgJ0QGF (ORCPT + 99 others); Tue, 27 Oct 2020 12:06:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:42512 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1802062AbgJ0Ppa (ORCPT ); Tue, 27 Oct 2020 11:45:30 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6396F21D42; Tue, 27 Oct 2020 15:45:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603813530; bh=mC850BtUPyQyxAiIbjrSA7Akdc3PkFFaza2+c8Ovwgc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WyUPj/9lSiy3ngblp7fPohqcm61rsaC7SILvuoF2BhXYSZM/4sDoOjgQOe9UIRBRe tIDQ9+3msBFx1NTJxtPw1FQocsohQ8HkbsWxopnccvrKr9umarXmcCOzvKEb9mYcJZ SfLbLQFppoDHsnOaoAD0HEzbM51F0YZhpL1JaUeI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Francesco Ruggeri , Pablo Neira Ayuso , Sasha Levin Subject: [PATCH 5.9 575/757] netfilter: conntrack: connection timeout after re-register Date: Tue, 27 Oct 2020 14:53:45 +0100 Message-Id: <20201027135517.483770959@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Francesco Ruggeri [ Upstream commit 4f25434bccc28cf8a07876ef5142a2869a674353 ] If the first packet conntrack sees after a re-register is an outgoing keepalive packet with no data (SEG.SEQ = SND.NXT-1), td_end is set to SND.NXT-1. When the peer correctly acknowledges SND.NXT, tcp_in_window fails check III (Upper bound for valid (s)ack: sack <= receiver.td_end) and returns false, which cascades into nf_conntrack_in setting skb->_nfct = 0 and in later conntrack iptables rules not matching. In cases where iptables are dropping packets that do not match conntrack rules this can result in idle tcp connections to time out. v2: adjust td_end when getting the reply rather than when sending out the keepalive packet. Fixes: f94e63801ab2 ("netfilter: conntrack: reset tcp maxwin on re-register") Signed-off-by: Francesco Ruggeri Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin --- net/netfilter/nf_conntrack_proto_tcp.c | 19 +++++++++++++------ 1 file changed, 13 insertions(+), 6 deletions(-) diff --git a/net/netfilter/nf_conntrack_proto_tcp.c b/net/netfilter/nf_conntrack_proto_tcp.c index e8c86ee4c1c48..c8fb2187ad4b2 100644 --- a/net/netfilter/nf_conntrack_proto_tcp.c +++ b/net/netfilter/nf_conntrack_proto_tcp.c @@ -541,13 +541,20 @@ static bool tcp_in_window(const struct nf_conn *ct, swin = win << sender->td_scale; sender->td_maxwin = (swin == 0 ? 1 : swin); sender->td_maxend = end + sender->td_maxwin; - /* - * We haven't seen traffic in the other direction yet - * but we have to tweak window tracking to pass III - * and IV until that happens. - */ - if (receiver->td_maxwin == 0) + if (receiver->td_maxwin == 0) { + /* We haven't seen traffic in the other + * direction yet but we have to tweak window + * tracking to pass III and IV until that + * happens. + */ receiver->td_end = receiver->td_maxend = sack; + } else if (sack == receiver->td_end + 1) { + /* Likely a reply to a keepalive. + * Needed for III. + */ + receiver->td_end++; + } + } } else if (((state->state == TCP_CONNTRACK_SYN_SENT && dir == IP_CT_DIR_ORIGINAL) -- 2.25.1