Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3938176pxj; Mon, 21 Jun 2021 09:46:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzy47nHDnGXokkjYqHtiki0OuoBFwJYxtZle6Ald1sfEn/OOQsdb2YEEFujUrWuT+lHTCk5 X-Received: by 2002:a50:ed8e:: with SMTP id h14mr23226744edr.272.1624293996717; Mon, 21 Jun 2021 09:46:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624293996; cv=none; d=google.com; s=arc-20160816; b=nVo585wXRjc49szv12Eu51cOxUgQXV3/OHOZvMX6gqH2Zg5/ODoCN0v6YTa1rBviFK axWkeBOxP0dqFX0SjnB0Vw64gowxdrgnebgz+chkPjhByCoq0R9T2tWGJxJj9uHbhOpA ct6/OVt+xxXxYR7h+arM0d65BHhPB54bGCp957Qshix/yFRl28kr/fugRm6j2TPvhV7M DONBTVuYwqqzpM/cEJ4ZeNfqlAjevWigirWKtH3H75Y0CbmfI+PMxO6LmjXpkb0/1v2j aSQG6z30cdb7e5oxFJnrgD5SjKfGM/ru+DVo0QVXfqMZcRqGYCtxMtqb1zbOky9LU9n1 7xJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=s2iQfOhDc13BWur3yvAiitKCghS1bBSj6C5a5faugzc=; b=IHiA09PmFlbwKF7qTIvOk7nm+3D1Tac8Kjw79NEPXlLEkwyTR3RIpwZfxs56N8uvOy Ing3mPJ2Rq3Hvg26xSR7eB4Nk12ceR1vtIOBF/N7q27gQjVOJAKULZyBoxRppKTiR3/U +7FIpgYqV9WYDCbb+gxfCwrwJR9p3hSJq7AVACj3jozMNpbYu7UB/vxa/vc+B8CXwq+3 aiaIuN6kalVyIqKtxvftAccjiA/QudctME1ebbZbHEiY9IMzwB67kHKkuMFHvFADnzeJ GxYqdwJnarqMUXMX2wepPDsdw/4lDFZQAxJMGM10F5/sUO+DfmPrTHytgK9qfWIQJWSu 7Arw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Sh6VLIj+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si685007edc.300.2021.06.21.09.46.12; Mon, 21 Jun 2021 09:46:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Sh6VLIj+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231561AbhFUQrc (ORCPT + 99 others); Mon, 21 Jun 2021 12:47:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:33480 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233050AbhFUQl6 (ORCPT ); Mon, 21 Jun 2021 12:41:58 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 49D6A613D9; Mon, 21 Jun 2021 16:31:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1624293070; bh=TEBC6VJ0urOkRPzqrKulqjfU+8+wbe2w3O/hXkL+ytE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Sh6VLIj+tnFUPfC9QkD0NsUKO12/3ZsEyRA3X3V9CBrnRFmfIeHjGe9BtLriFmoA/ ImVQPyO+moXLnAdObDGnEO0WEUznC2GfPlSYKP4BRaQ0FRTklZqTmgvXcEaTliTLwA VGIxXWTxscX1GIca4j0ahvTOXHisXgSOFp3S4rSc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juliusz Chroboczek , David Ahern , =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , "David S. Miller" , Sasha Levin Subject: [PATCH 5.12 086/178] icmp: dont send out ICMP messages with a source address of 0.0.0.0 Date: Mon, 21 Jun 2021 18:15:00 +0200 Message-Id: <20210621154925.591889477@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210621154921.212599475@linuxfoundation.org> References: <20210621154921.212599475@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 321827477360934dc040e9d3c626bf1de6c3ab3c ] When constructing ICMP response messages, the kernel will try to pick a suitable source address for the outgoing packet. However, if no IPv4 addresses are configured on the system at all, this will fail and we end up producing an ICMP message with a source address of 0.0.0.0. This can happen on a box routing IPv4 traffic via v6 nexthops, for instance. Since 0.0.0.0 is not generally routable on the internet, there's a good chance that such ICMP messages will never make it back to the sender of the original packet that the ICMP message was sent in response to. This, in turn, can create connectivity and PMTUd problems for senders. Fortunately, RFC7600 reserves a dummy address to be used as a source for ICMP messages (192.0.0.8/32), so let's teach the kernel to substitute that address as a last resort if the regular source address selection procedure fails. Below is a quick example reproducing this issue with network namespaces: ip netns add ns0 ip l add type veth peer netns ns0 ip l set dev veth0 up ip a add 10.0.0.1/24 dev veth0 ip a add fc00:dead:cafe:42::1/64 dev veth0 ip r add 10.1.0.0/24 via inet6 fc00:dead:cafe:42::2 ip -n ns0 l set dev veth0 up ip -n ns0 a add fc00:dead:cafe:42::2/64 dev veth0 ip -n ns0 r add 10.0.0.0/24 via inet6 fc00:dead:cafe:42::1 ip netns exec ns0 sysctl -w net.ipv4.icmp_ratelimit=0 ip netns exec ns0 sysctl -w net.ipv4.ip_forward=1 tcpdump -tpni veth0 -c 2 icmp & ping -w 1 10.1.0.1 > /dev/null tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on veth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes IP 10.0.0.1 > 10.1.0.1: ICMP echo request, id 29, seq 1, length 64 IP 0.0.0.0 > 10.0.0.1: ICMP net 10.1.0.1 unreachable, length 92 2 packets captured 2 packets received by filter 0 packets dropped by kernel With this patch the above capture changes to: IP 10.0.0.1 > 10.1.0.1: ICMP echo request, id 31127, seq 1, length 64 IP 192.0.0.8 > 10.0.0.1: ICMP net 10.1.0.1 unreachable, length 92 Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Reported-by: Juliusz Chroboczek Reviewed-by: David Ahern Signed-off-by: Toke Høiland-Jørgensen Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/uapi/linux/in.h | 3 +++ net/ipv4/icmp.c | 7 +++++++ 2 files changed, 10 insertions(+) diff --git a/include/uapi/linux/in.h b/include/uapi/linux/in.h index 7d6687618d80..d1b327036ae4 100644 --- a/include/uapi/linux/in.h +++ b/include/uapi/linux/in.h @@ -289,6 +289,9 @@ struct sockaddr_in { /* Address indicating an error return. */ #define INADDR_NONE ((unsigned long int) 0xffffffff) +/* Dummy address for src of ICMP replies if no real address is set (RFC7600). */ +#define INADDR_DUMMY ((unsigned long int) 0xc0000008) + /* Network number for local host loopback. */ #define IN_LOOPBACKNET 127 diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c index 616e2dc1c8fa..cd65d3146c30 100644 --- a/net/ipv4/icmp.c +++ b/net/ipv4/icmp.c @@ -759,6 +759,13 @@ void __icmp_send(struct sk_buff *skb_in, int type, int code, __be32 info, icmp_param.data_len = room; icmp_param.head_len = sizeof(struct icmphdr); + /* if we don't have a source address at this point, fall back to the + * dummy address instead of sending out a packet with a source address + * of 0.0.0.0 + */ + if (!fl4.saddr) + fl4.saddr = htonl(INADDR_DUMMY); + icmp_push_reply(&icmp_param, &fl4, &ipc, &rt); ende: ip_rt_put(rt); -- 2.30.2