Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3920058pxj; Mon, 21 Jun 2021 09:23:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz6DGDrhM6uH9ZaoT6WbByQNYImINisdllx9kFdWjtu1ia/MJ0txniP4xumbcX6nDjXz9fF X-Received: by 2002:a92:c210:: with SMTP id j16mr8463757ilo.28.1624292586888; Mon, 21 Jun 2021 09:23:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624292586; cv=none; d=google.com; s=arc-20160816; b=RfMBYaDUBOhxBSwV8ZRmZFb2KNm7vLeK/2grlv4fD+iSy4iw5ZHUieJeI0QdeeV2cm 95eU4uKhgVi0PgzGyPAf+3fGK1AmQ5uSIVcQGzZmwLa1O8Cu5+yowPsTZExxQ4PJgmK9 YtAs4uungUDfG48HOBHSU+VfHMar152TcfjjBzEXG1yxkCc56oZtramibmE5QnmFICc1 y9AaMP8TkI0eUYNhMIWCzMHhqwpTPo2XeFxNTIZE+cYC7+F23VDvcqvzLOTHN4w8DeP3 4t9mxoZotT+HwmWSiXZZcxNaZ1EAr7DuoEJ583LqB7I45xrvuTM4u+8w6qtzULPv5vCe h4tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TS0hsqP1QcA+el6qCIc7msAzuzMVVzeNQ0UK86etEeA=; b=er/f6B+DHtqMp+KjGGxWKwZNsZSPSTiG+Y+RZfVQ5NdDsH1nUA2J55hCjMr5hAcajb qAQkB8kSSr+iZJZF4b/mpnJ20Dijx9WWzXay+xOJNUM1U0Nup3w+cNcE9c31bYmOhOzq OP4E0VEhzxcz8GeGvhmiLqeBRAJWwQUoJhmM+p++0gwQ8qNxwSxhdvS7ouFV5SXD4Uvj MXsfI/hAHXk1EVY1sZBSXQzV9RazUkV9Z9hWok2hGWQw375zqdakSDvHSnbwQRjzwqCb nv4Lm64KokFMgLBDt4KKrK0s1RWQUVDFgR25VBhIMM3wznjTNxIA3ZZY8lm8L08XmX2T UM1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uPhzhqC1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i9si12459125ila.58.2021.06.21.09.22.54; Mon, 21 Jun 2021 09:23:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uPhzhqC1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231514AbhFUQX4 (ORCPT + 99 others); Mon, 21 Jun 2021 12:23:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:42340 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231709AbhFUQWY (ORCPT ); Mon, 21 Jun 2021 12:22:24 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6EE666135D; Mon, 21 Jun 2021 16:19:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1624292396; bh=yhv+e6KBJc6Z2/Fs4/gIG6bn5UCZ7ennW4Pyxv5sGKc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uPhzhqC1thfDbV5Bh79REEAngLeXVWF/+lHDMfFCbiZZuxTLkaDoHqBzMO5l9gweN 8H55qPzBRRIeAez5gHLC6WFHRnWkCJnpUbw2OcuXwJdVZ9Jg7LTiL8pMOLyd1KNYyB +e+CvFnwSNzrq39CSYnnkG5TzdtRKM5YsLeG2obY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juliusz Chroboczek , David Ahern , =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , "David S. Miller" , Sasha Levin Subject: [PATCH 5.4 41/90] icmp: dont send out ICMP messages with a source address of 0.0.0.0 Date: Mon, 21 Jun 2021 18:15:16 +0200 Message-Id: <20210621154905.509386140@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210621154904.159672728@linuxfoundation.org> References: <20210621154904.159672728@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 321827477360934dc040e9d3c626bf1de6c3ab3c ] When constructing ICMP response messages, the kernel will try to pick a suitable source address for the outgoing packet. However, if no IPv4 addresses are configured on the system at all, this will fail and we end up producing an ICMP message with a source address of 0.0.0.0. This can happen on a box routing IPv4 traffic via v6 nexthops, for instance. Since 0.0.0.0 is not generally routable on the internet, there's a good chance that such ICMP messages will never make it back to the sender of the original packet that the ICMP message was sent in response to. This, in turn, can create connectivity and PMTUd problems for senders. Fortunately, RFC7600 reserves a dummy address to be used as a source for ICMP messages (192.0.0.8/32), so let's teach the kernel to substitute that address as a last resort if the regular source address selection procedure fails. Below is a quick example reproducing this issue with network namespaces: ip netns add ns0 ip l add type veth peer netns ns0 ip l set dev veth0 up ip a add 10.0.0.1/24 dev veth0 ip a add fc00:dead:cafe:42::1/64 dev veth0 ip r add 10.1.0.0/24 via inet6 fc00:dead:cafe:42::2 ip -n ns0 l set dev veth0 up ip -n ns0 a add fc00:dead:cafe:42::2/64 dev veth0 ip -n ns0 r add 10.0.0.0/24 via inet6 fc00:dead:cafe:42::1 ip netns exec ns0 sysctl -w net.ipv4.icmp_ratelimit=0 ip netns exec ns0 sysctl -w net.ipv4.ip_forward=1 tcpdump -tpni veth0 -c 2 icmp & ping -w 1 10.1.0.1 > /dev/null tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on veth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes IP 10.0.0.1 > 10.1.0.1: ICMP echo request, id 29, seq 1, length 64 IP 0.0.0.0 > 10.0.0.1: ICMP net 10.1.0.1 unreachable, length 92 2 packets captured 2 packets received by filter 0 packets dropped by kernel With this patch the above capture changes to: IP 10.0.0.1 > 10.1.0.1: ICMP echo request, id 31127, seq 1, length 64 IP 192.0.0.8 > 10.0.0.1: ICMP net 10.1.0.1 unreachable, length 92 Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Reported-by: Juliusz Chroboczek Reviewed-by: David Ahern Signed-off-by: Toke Høiland-Jørgensen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/uapi/linux/in.h | 3 +++ net/ipv4/icmp.c | 7 +++++++ 2 files changed, 10 insertions(+) diff --git a/include/uapi/linux/in.h b/include/uapi/linux/in.h index e7ad9d350a28..60e1241d4b77 100644 --- a/include/uapi/linux/in.h +++ b/include/uapi/linux/in.h @@ -284,6 +284,9 @@ struct sockaddr_in { /* Address indicating an error return. */ #define INADDR_NONE ((unsigned long int) 0xffffffff) +/* Dummy address for src of ICMP replies if no real address is set (RFC7600). */ +#define INADDR_DUMMY ((unsigned long int) 0xc0000008) + /* Network number for local host loopback. */ #define IN_LOOPBACKNET 127 diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c index dd8fae89be72..c88612242c89 100644 --- a/net/ipv4/icmp.c +++ b/net/ipv4/icmp.c @@ -739,6 +739,13 @@ void __icmp_send(struct sk_buff *skb_in, int type, int code, __be32 info, icmp_param.data_len = room; icmp_param.head_len = sizeof(struct icmphdr); + /* if we don't have a source address at this point, fall back to the + * dummy address instead of sending out a packet with a source address + * of 0.0.0.0 + */ + if (!fl4.saddr) + fl4.saddr = htonl(INADDR_DUMMY); + icmp_push_reply(&icmp_param, &fl4, &ipc, &rt); ende: ip_rt_put(rt); -- 2.30.2