]>
Commit | Line | Data |
---|---|---|
7cd23e53 JD |
1 | /* |
2 | * Copyright (C) 2016 Jason A. Donenfeld <[email protected]>. All Rights Reserved. | |
3 | */ | |
4 | ||
6e5714ea DM |
5 | #include <linux/kernel.h> |
6 | #include <linux/init.h> | |
7 | #include <linux/cryptohash.h> | |
8 | #include <linux/module.h> | |
9 | #include <linux/cache.h> | |
10 | #include <linux/random.h> | |
11 | #include <linux/hrtimer.h> | |
12 | #include <linux/ktime.h> | |
13 | #include <linux/string.h> | |
e34c9a69 | 14 | #include <linux/net.h> |
7cd23e53 | 15 | #include <linux/siphash.h> |
6e5714ea DM |
16 | #include <net/secure_seq.h> |
17 | ||
cb03db9d | 18 | #if IS_ENABLED(CONFIG_IPV6) || IS_ENABLED(CONFIG_INET) |
7cd23e53 | 19 | #include <linux/in6.h> |
25429d7b | 20 | #include <net/tcp.h> |
6e5714ea | 21 | |
7cd23e53 | 22 | static siphash_key_t net_secret __read_mostly; |
28ee1b74 | 23 | static siphash_key_t ts_secret __read_mostly; |
9a3bab6b | 24 | |
34d92d53 | 25 | static __always_inline void net_secret_init(void) |
6e5714ea | 26 | { |
7cd23e53 | 27 | net_get_random_once(&net_secret, sizeof(net_secret)); |
6e5714ea | 28 | } |
84b114b9 ED |
29 | |
30 | static __always_inline void ts_secret_init(void) | |
31 | { | |
32 | net_get_random_once(&ts_secret, sizeof(ts_secret)); | |
33 | } | |
cb03db9d | 34 | #endif |
6e5714ea | 35 | |
68109090 | 36 | #ifdef CONFIG_INET |
6e5714ea DM |
37 | static u32 seq_scale(u32 seq) |
38 | { | |
39 | /* | |
40 | * As close as possible to RFC 793, which | |
41 | * suggests using a 250 kHz clock. | |
42 | * Further reading shows this assumes 2 Mb/s networks. | |
43 | * For 10 Mb/s Ethernet, a 1 MHz clock is appropriate. | |
44 | * For 10 Gb/s Ethernet, a 1 GHz clock should be ok, but | |
45 | * we also need to limit the resolution so that the u32 seq | |
46 | * overlaps less than one time per MSL (2 minutes). | |
47 | * Choosing a clock of 64 ns period is OK. (period of 274 s) | |
48 | */ | |
d2de875c | 49 | return seq + (ktime_get_real_ns() >> 6); |
6e5714ea | 50 | } |
68109090 | 51 | #endif |
6e5714ea | 52 | |
dfd56b8b | 53 | #if IS_ENABLED(CONFIG_IPV6) |
5d2ed052 ED |
54 | u32 secure_tcpv6_ts_off(const struct net *net, |
55 | const __be32 *saddr, const __be32 *daddr) | |
28ee1b74 FW |
56 | { |
57 | const struct { | |
58 | struct in6_addr saddr; | |
59 | struct in6_addr daddr; | |
60 | } __aligned(SIPHASH_ALIGNMENT) combined = { | |
61 | .saddr = *(struct in6_addr *)saddr, | |
62 | .daddr = *(struct in6_addr *)daddr, | |
63 | }; | |
64 | ||
5d2ed052 | 65 | if (net->ipv4.sysctl_tcp_timestamps != 1) |
28ee1b74 FW |
66 | return 0; |
67 | ||
84b114b9 | 68 | ts_secret_init(); |
28ee1b74 FW |
69 | return siphash(&combined, offsetofend(typeof(combined), daddr), |
70 | &ts_secret); | |
71 | } | |
84b114b9 | 72 | EXPORT_SYMBOL(secure_tcpv6_ts_off); |
28ee1b74 | 73 | |
84b114b9 ED |
74 | u32 secure_tcpv6_seq(const __be32 *saddr, const __be32 *daddr, |
75 | __be16 sport, __be16 dport) | |
6e5714ea | 76 | { |
7cd23e53 JD |
77 | const struct { |
78 | struct in6_addr saddr; | |
79 | struct in6_addr daddr; | |
80 | __be16 sport; | |
81 | __be16 dport; | |
82 | } __aligned(SIPHASH_ALIGNMENT) combined = { | |
83 | .saddr = *(struct in6_addr *)saddr, | |
84 | .daddr = *(struct in6_addr *)daddr, | |
85 | .sport = sport, | |
86 | .dport = dport | |
87 | }; | |
84b114b9 ED |
88 | u32 hash; |
89 | ||
9a3bab6b | 90 | net_secret_init(); |
7cd23e53 JD |
91 | hash = siphash(&combined, offsetofend(typeof(combined), dport), |
92 | &net_secret); | |
7cd23e53 | 93 | return seq_scale(hash); |
6e5714ea | 94 | } |
84b114b9 | 95 | EXPORT_SYMBOL(secure_tcpv6_seq); |
6e5714ea DM |
96 | |
97 | u32 secure_ipv6_port_ephemeral(const __be32 *saddr, const __be32 *daddr, | |
98 | __be16 dport) | |
99 | { | |
7cd23e53 JD |
100 | const struct { |
101 | struct in6_addr saddr; | |
102 | struct in6_addr daddr; | |
103 | __be16 dport; | |
104 | } __aligned(SIPHASH_ALIGNMENT) combined = { | |
105 | .saddr = *(struct in6_addr *)saddr, | |
106 | .daddr = *(struct in6_addr *)daddr, | |
107 | .dport = dport | |
108 | }; | |
9a3bab6b | 109 | net_secret_init(); |
7cd23e53 JD |
110 | return siphash(&combined, offsetofend(typeof(combined), dport), |
111 | &net_secret); | |
6e5714ea | 112 | } |
58a317f1 | 113 | EXPORT_SYMBOL(secure_ipv6_port_ephemeral); |
6e5714ea DM |
114 | #endif |
115 | ||
116 | #ifdef CONFIG_INET | |
5d2ed052 | 117 | u32 secure_tcp_ts_off(const struct net *net, __be32 saddr, __be32 daddr) |
28ee1b74 | 118 | { |
5d2ed052 | 119 | if (net->ipv4.sysctl_tcp_timestamps != 1) |
28ee1b74 FW |
120 | return 0; |
121 | ||
84b114b9 | 122 | ts_secret_init(); |
28ee1b74 FW |
123 | return siphash_2u32((__force u32)saddr, (__force u32)daddr, |
124 | &ts_secret); | |
125 | } | |
6e5714ea | 126 | |
a30aad50 | 127 | /* secure_tcp_seq_and_tsoff(a, b, 0, d) == secure_ipv4_port_ephemeral(a, b, d), |
7cd23e53 JD |
128 | * but fortunately, `sport' cannot be 0 in any circumstances. If this changes, |
129 | * it would be easy enough to have the former function use siphash_4u32, passing | |
130 | * the arguments as separate u32. | |
131 | */ | |
84b114b9 ED |
132 | u32 secure_tcp_seq(__be32 saddr, __be32 daddr, |
133 | __be16 sport, __be16 dport) | |
6e5714ea | 134 | { |
84b114b9 ED |
135 | u32 hash; |
136 | ||
9a3bab6b | 137 | net_secret_init(); |
7cd23e53 JD |
138 | hash = siphash_3u32((__force u32)saddr, (__force u32)daddr, |
139 | (__force u32)sport << 16 | (__force u32)dport, | |
140 | &net_secret); | |
7cd23e53 | 141 | return seq_scale(hash); |
6e5714ea | 142 | } |
07f3355d | 143 | EXPORT_SYMBOL_GPL(secure_tcp_seq); |
6e5714ea DM |
144 | |
145 | u32 secure_ipv4_port_ephemeral(__be32 saddr, __be32 daddr, __be16 dport) | |
146 | { | |
9a3bab6b | 147 | net_secret_init(); |
7cd23e53 JD |
148 | return siphash_3u32((__force u32)saddr, (__force u32)daddr, |
149 | (__force u16)dport, &net_secret); | |
6e5714ea DM |
150 | } |
151 | EXPORT_SYMBOL_GPL(secure_ipv4_port_ephemeral); | |
152 | #endif | |
153 | ||
a3bf7ae9 | 154 | #if IS_ENABLED(CONFIG_IP_DCCP) |
6e5714ea DM |
155 | u64 secure_dccp_sequence_number(__be32 saddr, __be32 daddr, |
156 | __be16 sport, __be16 dport) | |
157 | { | |
6e5714ea | 158 | u64 seq; |
9a3bab6b | 159 | net_secret_init(); |
c1ce1560 ED |
160 | seq = siphash_3u32((__force u32)saddr, (__force u32)daddr, |
161 | (__force u32)sport << 16 | (__force u32)dport, | |
162 | &net_secret); | |
d2de875c | 163 | seq += ktime_get_real_ns(); |
6e5714ea | 164 | seq &= (1ull << 48) - 1; |
6e5714ea DM |
165 | return seq; |
166 | } | |
167 | EXPORT_SYMBOL(secure_dccp_sequence_number); | |
168 | ||
dfd56b8b | 169 | #if IS_ENABLED(CONFIG_IPV6) |
6e5714ea DM |
170 | u64 secure_dccpv6_sequence_number(__be32 *saddr, __be32 *daddr, |
171 | __be16 sport, __be16 dport) | |
172 | { | |
7cd23e53 JD |
173 | const struct { |
174 | struct in6_addr saddr; | |
175 | struct in6_addr daddr; | |
176 | __be16 sport; | |
177 | __be16 dport; | |
178 | } __aligned(SIPHASH_ALIGNMENT) combined = { | |
179 | .saddr = *(struct in6_addr *)saddr, | |
180 | .daddr = *(struct in6_addr *)daddr, | |
181 | .sport = sport, | |
182 | .dport = dport | |
183 | }; | |
6e5714ea | 184 | u64 seq; |
9a3bab6b | 185 | net_secret_init(); |
7cd23e53 JD |
186 | seq = siphash(&combined, offsetofend(typeof(combined), dport), |
187 | &net_secret); | |
d2de875c | 188 | seq += ktime_get_real_ns(); |
6e5714ea | 189 | seq &= (1ull << 48) - 1; |
6e5714ea DM |
190 | return seq; |
191 | } | |
192 | EXPORT_SYMBOL(secure_dccpv6_sequence_number); | |
193 | #endif | |
194 | #endif |