aboutsummaryrefslogtreecommitdiffstats
path: root/net/ipv4/tcp_input.c
diff options
context:
space:
mode:
authorEric Dumazet <edumazet@google.com>2015-05-04 00:34:46 -0400
committerDavid S. Miller <davem@davemloft.net>2015-05-05 16:02:34 -0400
commitcd8ae85299d54155702a56811b2e035e63064d3d (patch)
treeaaec550c619b58c87f2981190e2c04a454650ce7 /net/ipv4/tcp_input.c
parentfcba67c94abe83e0e69a65737000ccbb16a4fa03 (diff)
tcp: provide SYN headers for passive connections
This patch allows a server application to get the TCP SYN headers for its passive connections. This is useful if the server is doing fingerprinting of clients based on SYN packet contents. Two socket options are added: TCP_SAVE_SYN and TCP_SAVED_SYN. The first is used on a socket to enable saving the SYN headers for child connections. This can be set before or after the listen() call. The latter is used to retrieve the SYN headers for passive connections, if the parent listener has enabled TCP_SAVE_SYN. TCP_SAVED_SYN is read once, it frees the saved SYN headers. The data returned in TCP_SAVED_SYN are network (IPv4/IPv6) and TCP headers. Original patch was written by Tom Herbert, I changed it to not hold a full skb (and associated dst and conntracking reference). We have used such patch for about 3 years at Google. Signed-off-by: Eric Dumazet <edumazet@google.com> Acked-by: Neal Cardwell <ncardwell@google.com> Tested-by: Neal Cardwell <ncardwell@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4/tcp_input.c')
-rw-r--r--net/ipv4/tcp_input.c18
1 files changed, 18 insertions, 0 deletions
diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
index 09bdc4abfcbb..df2ca615cd0c 100644
--- a/net/ipv4/tcp_input.c
+++ b/net/ipv4/tcp_input.c
@@ -6060,6 +6060,23 @@ static bool tcp_syn_flood_action(struct sock *sk,
6060 return want_cookie; 6060 return want_cookie;
6061} 6061}
6062 6062
6063static void tcp_reqsk_record_syn(const struct sock *sk,
6064 struct request_sock *req,
6065 const struct sk_buff *skb)
6066{
6067 if (tcp_sk(sk)->save_syn) {
6068 u32 len = skb_network_header_len(skb) + tcp_hdrlen(skb);
6069 u32 *copy;
6070
6071 copy = kmalloc(len + sizeof(u32), GFP_ATOMIC);
6072 if (copy) {
6073 copy[0] = len;
6074 memcpy(&copy[1], skb_network_header(skb), len);
6075 req->saved_syn = copy;
6076 }
6077 }
6078}
6079
6063int tcp_conn_request(struct request_sock_ops *rsk_ops, 6080int tcp_conn_request(struct request_sock_ops *rsk_ops,
6064 const struct tcp_request_sock_ops *af_ops, 6081 const struct tcp_request_sock_ops *af_ops,
6065 struct sock *sk, struct sk_buff *skb) 6082 struct sock *sk, struct sk_buff *skb)
@@ -6192,6 +6209,7 @@ int tcp_conn_request(struct request_sock_ops *rsk_ops,
6192 tcp_rsk(req)->tfo_listener = false; 6209 tcp_rsk(req)->tfo_listener = false;
6193 af_ops->queue_hash_add(sk, req, TCP_TIMEOUT_INIT); 6210 af_ops->queue_hash_add(sk, req, TCP_TIMEOUT_INIT);
6194 } 6211 }
6212 tcp_reqsk_record_syn(sk, req, skb);
6195 6213
6196 return 0; 6214 return 0;
6197 6215