blob: 7b6b1d2c3d10913ef1ce35c3b67dd76d195273e5 [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +01002/*
3 * Copyright (C) 2016 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
4 */
5
David S. Miller6e5714e2011-08-03 20:50:44 -07006#include <linux/kernel.h>
7#include <linux/init.h>
8#include <linux/cryptohash.h>
9#include <linux/module.h>
10#include <linux/cache.h>
11#include <linux/random.h>
12#include <linux/hrtimer.h>
13#include <linux/ktime.h>
14#include <linux/string.h>
Hannes Frederic Sowae34c9a62013-10-19 21:48:59 +020015#include <linux/net.h>
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010016#include <linux/siphash.h>
David S. Miller6e5714e2011-08-03 20:50:44 -070017#include <net/secure_seq.h>
18
Fabio Estevamcb03db92013-10-05 17:56:59 -030019#if IS_ENABLED(CONFIG_IPV6) || IS_ENABLED(CONFIG_INET)
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010020#include <linux/in6.h>
Florian Westphal25429d72016-12-01 11:32:07 +010021#include <net/tcp.h>
David S. Miller6e5714e2011-08-03 20:50:44 -070022
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010023static siphash_key_t net_secret __read_mostly;
Florian Westphal28ee1b72017-03-24 19:42:37 +010024static siphash_key_t ts_secret __read_mostly;
Eric Dumazet9a3bab62013-09-24 06:19:57 -070025
Hannes Frederic Sowa34d92d52013-10-23 08:44:50 +020026static __always_inline void net_secret_init(void)
David S. Miller6e5714e2011-08-03 20:50:44 -070027{
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010028 net_get_random_once(&net_secret, sizeof(net_secret));
David S. Miller6e5714e2011-08-03 20:50:44 -070029}
Eric Dumazet84b114b2017-05-05 06:56:54 -070030
31static __always_inline void ts_secret_init(void)
32{
33 net_get_random_once(&ts_secret, sizeof(ts_secret));
34}
Fabio Estevamcb03db92013-10-05 17:56:59 -030035#endif
David S. Miller6e5714e2011-08-03 20:50:44 -070036
Stephen Boyd681090902011-12-06 08:04:40 +000037#ifdef CONFIG_INET
David S. Miller6e5714e2011-08-03 20:50:44 -070038static u32 seq_scale(u32 seq)
39{
40 /*
41 * As close as possible to RFC 793, which
42 * suggests using a 250 kHz clock.
43 * Further reading shows this assumes 2 Mb/s networks.
44 * For 10 Mb/s Ethernet, a 1 MHz clock is appropriate.
45 * For 10 Gb/s Ethernet, a 1 GHz clock should be ok, but
46 * we also need to limit the resolution so that the u32 seq
47 * overlaps less than one time per MSL (2 minutes).
48 * Choosing a clock of 64 ns period is OK. (period of 274 s)
49 */
Eric Dumazetd2de8752014-08-22 18:32:09 -070050 return seq + (ktime_get_real_ns() >> 6);
David S. Miller6e5714e2011-08-03 20:50:44 -070051}
Stephen Boyd681090902011-12-06 08:04:40 +000052#endif
David S. Miller6e5714e2011-08-03 20:50:44 -070053
Eric Dumazetdfd56b82011-12-10 09:48:31 +000054#if IS_ENABLED(CONFIG_IPV6)
Eric Dumazet5d2ed052017-06-07 10:34:39 -070055u32 secure_tcpv6_ts_off(const struct net *net,
56 const __be32 *saddr, const __be32 *daddr)
Florian Westphal28ee1b72017-03-24 19:42:37 +010057{
58 const struct {
59 struct in6_addr saddr;
60 struct in6_addr daddr;
61 } __aligned(SIPHASH_ALIGNMENT) combined = {
62 .saddr = *(struct in6_addr *)saddr,
63 .daddr = *(struct in6_addr *)daddr,
64 };
65
Eric Dumazet5d2ed052017-06-07 10:34:39 -070066 if (net->ipv4.sysctl_tcp_timestamps != 1)
Florian Westphal28ee1b72017-03-24 19:42:37 +010067 return 0;
68
Eric Dumazet84b114b2017-05-05 06:56:54 -070069 ts_secret_init();
Florian Westphal28ee1b72017-03-24 19:42:37 +010070 return siphash(&combined, offsetofend(typeof(combined), daddr),
71 &ts_secret);
72}
Eric Dumazet84b114b2017-05-05 06:56:54 -070073EXPORT_SYMBOL(secure_tcpv6_ts_off);
Florian Westphal28ee1b72017-03-24 19:42:37 +010074
Eric Dumazet84b114b2017-05-05 06:56:54 -070075u32 secure_tcpv6_seq(const __be32 *saddr, const __be32 *daddr,
76 __be16 sport, __be16 dport)
David S. Miller6e5714e2011-08-03 20:50:44 -070077{
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010078 const struct {
79 struct in6_addr saddr;
80 struct in6_addr daddr;
81 __be16 sport;
82 __be16 dport;
83 } __aligned(SIPHASH_ALIGNMENT) combined = {
84 .saddr = *(struct in6_addr *)saddr,
85 .daddr = *(struct in6_addr *)daddr,
86 .sport = sport,
87 .dport = dport
88 };
Eric Dumazet84b114b2017-05-05 06:56:54 -070089 u32 hash;
90
Eric Dumazet9a3bab62013-09-24 06:19:57 -070091 net_secret_init();
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010092 hash = siphash(&combined, offsetofend(typeof(combined), dport),
93 &net_secret);
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +010094 return seq_scale(hash);
David S. Miller6e5714e2011-08-03 20:50:44 -070095}
Eric Dumazet84b114b2017-05-05 06:56:54 -070096EXPORT_SYMBOL(secure_tcpv6_seq);
David S. Miller6e5714e2011-08-03 20:50:44 -070097
98u32 secure_ipv6_port_ephemeral(const __be32 *saddr, const __be32 *daddr,
99 __be16 dport)
100{
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100101 const struct {
102 struct in6_addr saddr;
103 struct in6_addr daddr;
104 __be16 dport;
105 } __aligned(SIPHASH_ALIGNMENT) combined = {
106 .saddr = *(struct in6_addr *)saddr,
107 .daddr = *(struct in6_addr *)daddr,
108 .dport = dport
109 };
Eric Dumazet9a3bab62013-09-24 06:19:57 -0700110 net_secret_init();
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100111 return siphash(&combined, offsetofend(typeof(combined), dport),
112 &net_secret);
David S. Miller6e5714e2011-08-03 20:50:44 -0700113}
Patrick McHardy58a317f2012-08-26 19:14:12 +0200114EXPORT_SYMBOL(secure_ipv6_port_ephemeral);
David S. Miller6e5714e2011-08-03 20:50:44 -0700115#endif
116
117#ifdef CONFIG_INET
Eric Dumazet5d2ed052017-06-07 10:34:39 -0700118u32 secure_tcp_ts_off(const struct net *net, __be32 saddr, __be32 daddr)
Florian Westphal28ee1b72017-03-24 19:42:37 +0100119{
Eric Dumazet5d2ed052017-06-07 10:34:39 -0700120 if (net->ipv4.sysctl_tcp_timestamps != 1)
Florian Westphal28ee1b72017-03-24 19:42:37 +0100121 return 0;
122
Eric Dumazet84b114b2017-05-05 06:56:54 -0700123 ts_secret_init();
Florian Westphal28ee1b72017-03-24 19:42:37 +0100124 return siphash_2u32((__force u32)saddr, (__force u32)daddr,
125 &ts_secret);
126}
David S. Miller6e5714e2011-08-03 20:50:44 -0700127
Alexey Kodaneva30aad52017-03-09 13:53:55 +0300128/* secure_tcp_seq_and_tsoff(a, b, 0, d) == secure_ipv4_port_ephemeral(a, b, d),
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100129 * but fortunately, `sport' cannot be 0 in any circumstances. If this changes,
130 * it would be easy enough to have the former function use siphash_4u32, passing
131 * the arguments as separate u32.
132 */
Eric Dumazet84b114b2017-05-05 06:56:54 -0700133u32 secure_tcp_seq(__be32 saddr, __be32 daddr,
134 __be16 sport, __be16 dport)
David S. Miller6e5714e2011-08-03 20:50:44 -0700135{
Eric Dumazet84b114b2017-05-05 06:56:54 -0700136 u32 hash;
137
Eric Dumazet9a3bab62013-09-24 06:19:57 -0700138 net_secret_init();
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100139 hash = siphash_3u32((__force u32)saddr, (__force u32)daddr,
140 (__force u32)sport << 16 | (__force u32)dport,
141 &net_secret);
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100142 return seq_scale(hash);
David S. Miller6e5714e2011-08-03 20:50:44 -0700143}
Arnd Bergmann07f33552018-07-09 10:34:43 +0200144EXPORT_SYMBOL_GPL(secure_tcp_seq);
David S. Miller6e5714e2011-08-03 20:50:44 -0700145
146u32 secure_ipv4_port_ephemeral(__be32 saddr, __be32 daddr, __be16 dport)
147{
Eric Dumazet9a3bab62013-09-24 06:19:57 -0700148 net_secret_init();
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100149 return siphash_3u32((__force u32)saddr, (__force u32)daddr,
150 (__force u16)dport, &net_secret);
David S. Miller6e5714e2011-08-03 20:50:44 -0700151}
152EXPORT_SYMBOL_GPL(secure_ipv4_port_ephemeral);
153#endif
154
Igor Maravića3bf7ae2011-12-12 02:58:22 +0000155#if IS_ENABLED(CONFIG_IP_DCCP)
David S. Miller6e5714e2011-08-03 20:50:44 -0700156u64 secure_dccp_sequence_number(__be32 saddr, __be32 daddr,
157 __be16 sport, __be16 dport)
158{
David S. Miller6e5714e2011-08-03 20:50:44 -0700159 u64 seq;
Eric Dumazet9a3bab62013-09-24 06:19:57 -0700160 net_secret_init();
Eric Dumazetc1ce1562017-01-11 18:10:37 -0800161 seq = siphash_3u32((__force u32)saddr, (__force u32)daddr,
162 (__force u32)sport << 16 | (__force u32)dport,
163 &net_secret);
Eric Dumazetd2de8752014-08-22 18:32:09 -0700164 seq += ktime_get_real_ns();
David S. Miller6e5714e2011-08-03 20:50:44 -0700165 seq &= (1ull << 48) - 1;
David S. Miller6e5714e2011-08-03 20:50:44 -0700166 return seq;
167}
168EXPORT_SYMBOL(secure_dccp_sequence_number);
169
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000170#if IS_ENABLED(CONFIG_IPV6)
David S. Miller6e5714e2011-08-03 20:50:44 -0700171u64 secure_dccpv6_sequence_number(__be32 *saddr, __be32 *daddr,
172 __be16 sport, __be16 dport)
173{
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100174 const struct {
175 struct in6_addr saddr;
176 struct in6_addr daddr;
177 __be16 sport;
178 __be16 dport;
179 } __aligned(SIPHASH_ALIGNMENT) combined = {
180 .saddr = *(struct in6_addr *)saddr,
181 .daddr = *(struct in6_addr *)daddr,
182 .sport = sport,
183 .dport = dport
184 };
David S. Miller6e5714e2011-08-03 20:50:44 -0700185 u64 seq;
Eric Dumazet9a3bab62013-09-24 06:19:57 -0700186 net_secret_init();
Jason A. Donenfeld7cd23e52017-01-08 13:54:02 +0100187 seq = siphash(&combined, offsetofend(typeof(combined), dport),
188 &net_secret);
Eric Dumazetd2de8752014-08-22 18:32:09 -0700189 seq += ktime_get_real_ns();
David S. Miller6e5714e2011-08-03 20:50:44 -0700190 seq &= (1ull << 48) - 1;
David S. Miller6e5714e2011-08-03 20:50:44 -0700191 return seq;
192}
193EXPORT_SYMBOL(secure_dccpv6_sequence_number);
194#endif
195#endif