1 #include <linux/kernel.h>
2 #include <linux/init.h>
3 #include <linux/cryptohash.h>
4 #include <linux/module.h>
5 #include <linux/cache.h>
6 #include <linux/random.h>
7 #include <linux/hrtimer.h>
8 #include <linux/ktime.h>
9 #include <linux/string.h>
10 #include <linux/net.h>
12 #include <net/secure_seq.h>
14 #if IS_ENABLED(CONFIG_IPV6) || IS_ENABLED(CONFIG_INET)
15 #define NET_SECRET_SIZE (MD5_MESSAGE_BYTES / 4)
17 static u32 net_secret
[NET_SECRET_SIZE
] ____cacheline_aligned
;
19 static __always_inline
void net_secret_init(void)
21 net_get_random_once(net_secret
, sizeof(net_secret
));
26 static u32
seq_scale(u32 seq
)
29 * As close as possible to RFC 793, which
30 * suggests using a 250 kHz clock.
31 * Further reading shows this assumes 2 Mb/s networks.
32 * For 10 Mb/s Ethernet, a 1 MHz clock is appropriate.
33 * For 10 Gb/s Ethernet, a 1 GHz clock should be ok, but
34 * we also need to limit the resolution so that the u32 seq
35 * overlaps less than one time per MSL (2 minutes).
36 * Choosing a clock of 64 ns period is OK. (period of 274 s)
38 return seq
+ (ktime_to_ns(ktime_get_real()) >> 6);
42 #if IS_ENABLED(CONFIG_IPV6)
43 __u32
secure_tcpv6_sequence_number(const __be32
*saddr
, const __be32
*daddr
,
44 __be16 sport
, __be16 dport
)
46 u32 secret
[MD5_MESSAGE_BYTES
/ 4];
47 u32 hash
[MD5_DIGEST_WORDS
];
51 memcpy(hash
, saddr
, 16);
52 for (i
= 0; i
< 4; i
++)
53 secret
[i
] = net_secret
[i
] + (__force u32
)daddr
[i
];
54 secret
[4] = net_secret
[4] +
55 (((__force u16
)sport
<< 16) + (__force u16
)dport
);
56 for (i
= 5; i
< MD5_MESSAGE_BYTES
/ 4; i
++)
57 secret
[i
] = net_secret
[i
];
59 md5_transform(hash
, secret
);
61 return seq_scale(hash
[0]);
63 EXPORT_SYMBOL(secure_tcpv6_sequence_number
);
65 u32
secure_ipv6_port_ephemeral(const __be32
*saddr
, const __be32
*daddr
,
68 u32 secret
[MD5_MESSAGE_BYTES
/ 4];
69 u32 hash
[MD5_DIGEST_WORDS
];
73 memcpy(hash
, saddr
, 16);
74 for (i
= 0; i
< 4; i
++)
75 secret
[i
] = net_secret
[i
] + (__force u32
) daddr
[i
];
76 secret
[4] = net_secret
[4] + (__force u32
)dport
;
77 for (i
= 5; i
< MD5_MESSAGE_BYTES
/ 4; i
++)
78 secret
[i
] = net_secret
[i
];
80 md5_transform(hash
, secret
);
84 EXPORT_SYMBOL(secure_ipv6_port_ephemeral
);
88 __u32
secure_ip_id(__be32 daddr
)
90 u32 hash
[MD5_DIGEST_WORDS
];
93 hash
[0] = (__force __u32
) daddr
;
94 hash
[1] = net_secret
[13];
95 hash
[2] = net_secret
[14];
96 hash
[3] = net_secret
[15];
98 md5_transform(hash
, net_secret
);
103 __u32
secure_ipv6_id(const __be32 daddr
[4])
108 memcpy(hash
, daddr
, 16);
109 md5_transform(hash
, net_secret
);
114 __u32
secure_tcp_sequence_number(__be32 saddr
, __be32 daddr
,
115 __be16 sport
, __be16 dport
)
117 u32 hash
[MD5_DIGEST_WORDS
];
120 hash
[0] = (__force u32
)saddr
;
121 hash
[1] = (__force u32
)daddr
;
122 hash
[2] = ((__force u16
)sport
<< 16) + (__force u16
)dport
;
123 hash
[3] = net_secret
[15];
125 md5_transform(hash
, net_secret
);
127 return seq_scale(hash
[0]);
130 u32
secure_ipv4_port_ephemeral(__be32 saddr
, __be32 daddr
, __be16 dport
)
132 u32 hash
[MD5_DIGEST_WORDS
];
135 hash
[0] = (__force u32
)saddr
;
136 hash
[1] = (__force u32
)daddr
;
137 hash
[2] = (__force u32
)dport
^ net_secret
[14];
138 hash
[3] = net_secret
[15];
140 md5_transform(hash
, net_secret
);
144 EXPORT_SYMBOL_GPL(secure_ipv4_port_ephemeral
);
147 #if IS_ENABLED(CONFIG_IP_DCCP)
148 u64
secure_dccp_sequence_number(__be32 saddr
, __be32 daddr
,
149 __be16 sport
, __be16 dport
)
151 u32 hash
[MD5_DIGEST_WORDS
];
155 hash
[0] = (__force u32
)saddr
;
156 hash
[1] = (__force u32
)daddr
;
157 hash
[2] = ((__force u16
)sport
<< 16) + (__force u16
)dport
;
158 hash
[3] = net_secret
[15];
160 md5_transform(hash
, net_secret
);
162 seq
= hash
[0] | (((u64
)hash
[1]) << 32);
163 seq
+= ktime_to_ns(ktime_get_real());
164 seq
&= (1ull << 48) - 1;
168 EXPORT_SYMBOL(secure_dccp_sequence_number
);
170 #if IS_ENABLED(CONFIG_IPV6)
171 u64
secure_dccpv6_sequence_number(__be32
*saddr
, __be32
*daddr
,
172 __be16 sport
, __be16 dport
)
174 u32 secret
[MD5_MESSAGE_BYTES
/ 4];
175 u32 hash
[MD5_DIGEST_WORDS
];
180 memcpy(hash
, saddr
, 16);
181 for (i
= 0; i
< 4; i
++)
182 secret
[i
] = net_secret
[i
] + daddr
[i
];
183 secret
[4] = net_secret
[4] +
184 (((__force u16
)sport
<< 16) + (__force u16
)dport
);
185 for (i
= 5; i
< MD5_MESSAGE_BYTES
/ 4; i
++)
186 secret
[i
] = net_secret
[i
];
188 md5_transform(hash
, secret
);
190 seq
= hash
[0] | (((u64
)hash
[1]) << 32);
191 seq
+= ktime_to_ns(ktime_get_real());
192 seq
&= (1ull << 48) - 1;
196 EXPORT_SYMBOL(secure_dccpv6_sequence_number
);