Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3925343pxj; Mon, 21 Jun 2021 09:30:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwmF2+ohbdCE7ofUo/W7+fv+D8ks6AoiGwPKy91zs9sPzZMixJbQYWLrboksfNnUZIVtr6 X-Received: by 2002:a05:6e02:c6:: with SMTP id r6mr19170676ilq.79.1624293019922; Mon, 21 Jun 2021 09:30:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624293019; cv=none; d=google.com; s=arc-20160816; b=ZTG9WrWi5jpVxVE9PrtHbD1LilYie2SfawLg5/3y8yKhwKS37JIFv796oDc+s4s/kc xktxBy6rbNpg/rloDzHRCneRKatbveJjTgoa8oh8KobbtxR76W/qEZwwpx3GFzUb28TH WP2QUOHCXNqsdoCzcggsDGqERkQRU3/6JULuxAKZ6iq+kugcG2w6Mi2WH3Tli8JB4jEk k7hLnyjEQsuSIlNjyqJrAfqJEpRJ9IMNabAXe5E5qLgUICooJn5c6/kTnidadviEqc/F ofkxUWKcNEBRI0t2rSK/9aO8tqn9ZISbq5tnM9j2+VBBav8s2aq7LeUeF6zZb7RL7PFO Pu5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UqCaSecK70cCnVDkjtXgsa0VD4Dy2JcudKwMOgCfkO8=; b=QRJZ4rSrJ6g/LECVHjDbTXBBBUuIGVJxJY/kUVxU1AbbTypzpK9pTvL8G8ElGX76wU 1BSYgY+glemFjS4KVt+E0TtTXCrjmOv1+MdVuOo7pwmXcIB5lBZv1rNJI+jdmnuNwi9w 9rKfT2eB96VMKDAaIoBJDamV6MN8cFCS5a1myABxk7EvQm5H0kErSohhoW3N/v9amHij mRZusPk+YZFRiq+7a8evD5VMFf0B1qmEFTSPZKjMUa8KZRDNBtz54NDFLtt1uMi6Iovm H9YZfFx9ZvvPjN4ikqNjOf8u6gb0qgLSQlSM9djFc2uo0mgc+cqfOJ9IFHIYOfMVPxQ1 3T6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=u09nKt6A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p8si16502465ilh.98.2021.06.21.09.30.07; Mon, 21 Jun 2021 09:30:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=u09nKt6A; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232112AbhFUQbt (ORCPT + 99 others); Mon, 21 Jun 2021 12:31:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:49790 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231843AbhFUQ2z (ORCPT ); Mon, 21 Jun 2021 12:28:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6B498613F0; Mon, 21 Jun 2021 16:23:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1624292632; bh=1BONI1phd+DeAmCBt/NRqb/agyoHz3Q7VTty+jAU2U4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u09nKt6AVQIZ4FeywZs5xFpyQqogA2GR8XatKNkoyqSpzTYJB10cj5yxeMhD3AgUf Yzw0Cm8JJfOg9dvqvUPqs1iqowYVR78cCqpMP9QxhfyTTFEeb9MlSNu0a7N78PNj25 LjdqnhQXXXL3qoXCChdzf5f3prmhwIFQlxt5GCB8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juliusz Chroboczek , David Ahern , =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , "David S. Miller" , Sasha Levin Subject: [PATCH 5.10 072/146] icmp: dont send out ICMP messages with a source address of 0.0.0.0 Date: Mon, 21 Jun 2021 18:15:02 +0200 Message-Id: <20210621154915.442150884@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210621154911.244649123@linuxfoundation.org> References: <20210621154911.244649123@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 321827477360934dc040e9d3c626bf1de6c3ab3c ] When constructing ICMP response messages, the kernel will try to pick a suitable source address for the outgoing packet. However, if no IPv4 addresses are configured on the system at all, this will fail and we end up producing an ICMP message with a source address of 0.0.0.0. This can happen on a box routing IPv4 traffic via v6 nexthops, for instance. Since 0.0.0.0 is not generally routable on the internet, there's a good chance that such ICMP messages will never make it back to the sender of the original packet that the ICMP message was sent in response to. This, in turn, can create connectivity and PMTUd problems for senders. Fortunately, RFC7600 reserves a dummy address to be used as a source for ICMP messages (192.0.0.8/32), so let's teach the kernel to substitute that address as a last resort if the regular source address selection procedure fails. Below is a quick example reproducing this issue with network namespaces: ip netns add ns0 ip l add type veth peer netns ns0 ip l set dev veth0 up ip a add 10.0.0.1/24 dev veth0 ip a add fc00:dead:cafe:42::1/64 dev veth0 ip r add 10.1.0.0/24 via inet6 fc00:dead:cafe:42::2 ip -n ns0 l set dev veth0 up ip -n ns0 a add fc00:dead:cafe:42::2/64 dev veth0 ip -n ns0 r add 10.0.0.0/24 via inet6 fc00:dead:cafe:42::1 ip netns exec ns0 sysctl -w net.ipv4.icmp_ratelimit=0 ip netns exec ns0 sysctl -w net.ipv4.ip_forward=1 tcpdump -tpni veth0 -c 2 icmp & ping -w 1 10.1.0.1 > /dev/null tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on veth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes IP 10.0.0.1 > 10.1.0.1: ICMP echo request, id 29, seq 1, length 64 IP 0.0.0.0 > 10.0.0.1: ICMP net 10.1.0.1 unreachable, length 92 2 packets captured 2 packets received by filter 0 packets dropped by kernel With this patch the above capture changes to: IP 10.0.0.1 > 10.1.0.1: ICMP echo request, id 31127, seq 1, length 64 IP 192.0.0.8 > 10.0.0.1: ICMP net 10.1.0.1 unreachable, length 92 Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Reported-by: Juliusz Chroboczek Reviewed-by: David Ahern Signed-off-by: Toke Høiland-Jørgensen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/uapi/linux/in.h | 3 +++ net/ipv4/icmp.c | 7 +++++++ 2 files changed, 10 insertions(+) diff --git a/include/uapi/linux/in.h b/include/uapi/linux/in.h index 7d6687618d80..d1b327036ae4 100644 --- a/include/uapi/linux/in.h +++ b/include/uapi/linux/in.h @@ -289,6 +289,9 @@ struct sockaddr_in { /* Address indicating an error return. */ #define INADDR_NONE ((unsigned long int) 0xffffffff) +/* Dummy address for src of ICMP replies if no real address is set (RFC7600). */ +#define INADDR_DUMMY ((unsigned long int) 0xc0000008) + /* Network number for local host loopback. */ #define IN_LOOPBACKNET 127 diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c index ff3818333fcf..b71b836cc7d1 100644 --- a/net/ipv4/icmp.c +++ b/net/ipv4/icmp.c @@ -759,6 +759,13 @@ void __icmp_send(struct sk_buff *skb_in, int type, int code, __be32 info, icmp_param.data_len = room; icmp_param.head_len = sizeof(struct icmphdr); + /* if we don't have a source address at this point, fall back to the + * dummy address instead of sending out a packet with a source address + * of 0.0.0.0 + */ + if (!fl4.saddr) + fl4.saddr = htonl(INADDR_DUMMY); + icmp_push_reply(&icmp_param, &fl4, &ipc, &rt); ende: ip_rt_put(rt); -- 2.30.2