Received: by 2002:ab2:6816:0:b0:1f9:5764:f03e with SMTP id t22csp2957220lqo; Tue, 21 May 2024 02:26:23 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWyvnYeYx8El8UgXFn9hkvo4vhLapAspf3dS9KaS9XDqVWPO0HMLP9oO9eFIKxkhL7KZDbyiPK3mJJI26groLBVttQGS1lUSQZ9W82vNA== X-Google-Smtp-Source: AGHT+IHGxS5/V1CwUo00v4NrNZZoaZQEwGLS0DP/ku7epuYrB2qd41uc4jW4Q0O5SMCznbJF6Ce9 X-Received: by 2002:a05:6358:7f07:b0:18a:68c9:d7b8 with SMTP id e5c5f4694b2df-193baf0130fmr3357757955d.8.1716283583313; Tue, 21 May 2024 02:26:23 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716283583; cv=pass; d=google.com; s=arc-20160816; b=cVO/Zl2oTgeNrGkvmKpBOUNzLP03gvNo312cVk/oirFdqqIpIE6Ny3MqWRSurz+i+4 oKRPSDER89n5yDQ7BqF4DfnfyZtiWP28dWVWxIGQPTwYge3tUll53/uksfdphTsZa8w8 H04AgXDJ/gUIUvqyCOZ7EL44A/ua/qJh3xMYUsg3/qqCTe1hmLpKkJWTY7uVvSjFb9JZ wyavl1Up26pTfZXH+PMUC4fA1g7brzqJsq7ONGpBXw3N3cBAlby861XbwaxoIFstP4e+ fnDAQJo/wLcVqm1aK5uAZMXTvwIlYwPZm66QgXAj2LTjAUkgkkf7nJ6uien/lrOXxsXq wTgA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-disposition:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:references :message-id:subject:cc:to:from:date; bh=0+dgQc5ix8QBwGhe01b/2Y5A1Fp9ZV7pYP2g0bJ2J3I=; fh=wFpsINSBKfqh+mi3yGTIN28X0ktEHfochf396tXCqq8=; b=zzbWMMqiN9OYQny212GoOb7M+ZERS74iMhhYJLY+3zZzAVGdIHfYvi/iVSa1WZTyTi 2lWgX9dV3F8NByqEU+TJSPH3WDvEquTRtO6UECvun/pZ+78mDWJX0VKhEhtvGcx+5Reb AMYhxA2hYyCPoBB8MoG1/d5WsHjI7vL6x4fwDTEKPKMCJvhZa4akYLttZTVBHk9kIb44 rLaflk4EakRp77jrClFAgogWnZD2j5SUkLV49T/s0frpa4pl7/QBxHTcOTC8Sw/LlAIA K5pOW/A6k+53X2lkIHWW0R6lnsMnpmWglyCM33tKp+Kuc2X6gbqSbytXy0QPzKTVmCvO xixA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=strlen.de); spf=pass (google.com: domain of linux-kernel+bounces-184703-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-184703-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id 41be03b00d2f7-63413d7217bsi23464170a12.809.2024.05.21.02.26.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 May 2024 02:26:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-184703-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=strlen.de); spf=pass (google.com: domain of linux-kernel+bounces-184703-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-184703-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id B09BDB21D0C for ; Tue, 21 May 2024 09:26:20 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 50D715FBB1; Tue, 21 May 2024 09:26:11 +0000 (UTC) Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [91.216.245.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 66CFB50A6E; Tue, 21 May 2024 09:26:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.216.245.30 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716283570; cv=none; b=KXfjc2kL4RSUUWGVR0Hu1l/pFbNgPC8N73a6CyQf4Hpl6AanDx7neAmdHf5Eb99xacUVh8S4HJ7Brz68HFFbMrVLV9tX1qyYOVYOQfr/z55GbL/nAvSXGGeYugGU+OhyO66pJQk8Onx0j2VYdoRJiH4lun2YOa0Gcp0NgEABs5M= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716283570; c=relaxed/simple; bh=qp8oBdFsawfuJIIVhfh79qxmfUvb81lWJfUIcUyDsCM=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=NVR3KxNtmeyKOP2H1nhiLqMjSpUg3u29lCdPRxNyqXOeSjxeQCBt6SucDjGVEdAQUSVI0MeiSlZ/qNgQzx9X6ia2LDP0IezLiRN9IWC7PWl/vM1WQ1rMH/xqe3pFVjx1ZHT8WLUzHHfEJRxmAsmyb6wkLn8n/wdIboiJ5JAhvPw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=strlen.de; spf=pass smtp.mailfrom=strlen.de; arc=none smtp.client-ip=91.216.245.30 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=strlen.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=strlen.de Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1s9Ljy-0007Zk-GI; Tue, 21 May 2024 11:25:11 +0200 Date: Tue, 21 May 2024 11:25:02 +0200 From: Florian Westphal To: ye.xingchen@zte.com.cn Cc: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, corbet@lwn.net, dsahern@kernel.org, ncardwell@google.com, soheil@google.com, haiyangz@microsoft.com, lixiaoyan@google.com, mfreemon@cloudflare.com, david.laight@aculab.com, netdev@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, fan.yu9@zte.com.cn, he.peilin@zte.com.cn, xu.xin16@zte.com.cn, yang.yang29@zte.com.cn, yang.guang5@zte.com.cn, zhang.yunkai@zte.com.cn Subject: Re: [PATCH net-next v2] icmp: Add icmp_timestamp_ignore_all to control ICMP_TIMESTAMP Message-ID: <20240521092502.GB2980@breakpoint.cc> References: <20240520165335899feIJEvG6iuT4f7FBU6ctk@zte.com.cn> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240520165335899feIJEvG6iuT4f7FBU6ctk@zte.com.cn> User-Agent: Mutt/1.10.1 (2018-07-13) ye.xingchen@zte.com.cn wrote: > From: YeXingchen > > The CVE-1999-0524 vulnerability is associated with ICMP > timestamp messages, which can be exploited to conduct > a denial-of-service (DoS) attack. In the Vulnerability > Priority Rating (VPR) system, this vulnerability was > rated as a medium risk in May of this year. > Link:https://www.tenable.com/plugins/nessus/10113 Please explain at least one scenario where this is a problem. AFAICS there is none and Linux is not affected by this. > To protect embedded systems that cannot run firewalls > from attacks exploiting the CVE-1999-0524 vulnerability, > the icmp_timestamp_ignore_all sysctl is offered as If there is an actual problem, then this should be on by default or the entire feature should be removed. But I don't think there is a problem in the first place.