]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
netfilter: skip recording stale or retransmitted INIT
authorXin Long <lucien.xin@gmail.com>
Sun, 26 Apr 2026 14:46:40 +0000 (10:46 -0400)
committerJakub Kicinski <kuba@kernel.org>
Wed, 29 Apr 2026 00:52:19 +0000 (17:52 -0700)
An INIT whose init_tag matches the peer's vtag does not provide new state
information. It indicates either:

- a stale INIT (after INIT-ACK has already been seen on the same side), or
- a retransmitted INIT (after INIT has already been recorded on the same
  side).

In both cases, the INIT must not update ct->proto.sctp.init[] state, since
it does not advance the handshake tracking and may otherwise corrupt
INIT/INIT-ACK validation logic.

Allow INIT processing only when the conntrack entry is newly created
(SCTP_CONNTRACK_NONE), or when the init_tag differs from the stored peer
vtag.

Note it skips the check for the ct with old_state SCTP_CONNTRACK_NONE in
nf_conntrack_sctp_packet(), as it is just created in sctp_new() where it
set ct->proto.sctp.vtag[IP_CT_DIR_REPLY] = ih->init_tag.

Fixes: 9fb9cbb1082d ("[NETFILTER]: Add nf_conntrack subsystem.")
Signed-off-by: Xin Long <lucien.xin@gmail.com>
Reviewed-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
Acked-by: Florian Westphal <fw@strlen.de>
Link: https://patch.msgid.link/ee56c3e416452b2a40589a2a85245ac2ad5e9f4b.1777214801.git.lucien.xin@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
net/netfilter/nf_conntrack_proto_sctp.c

index 645d2c43ebf7af94b50ec9215cced174eb2d6891..7e10fa65cbdd311a2961dd34e2a8ca4cb7e2ba14 100644 (file)
@@ -466,9 +466,13 @@ int nf_conntrack_sctp_packet(struct nf_conn *ct,
                        if (!ih)
                                goto out_unlock;
 
-                       if (ct->proto.sctp.init[dir] && ct->proto.sctp.init[!dir])
-                               ct->proto.sctp.init[!dir] = 0;
-                       ct->proto.sctp.init[dir] = 1;
+                       /* Do not record INIT matching peer vtag (stale or retransmitted INIT). */
+                       if (old_state == SCTP_CONNTRACK_NONE ||
+                           ct->proto.sctp.vtag[!dir] != ih->init_tag) {
+                               if (ct->proto.sctp.init[dir] && ct->proto.sctp.init[!dir])
+                                       ct->proto.sctp.init[!dir] = 0;
+                               ct->proto.sctp.init[dir] = 1;
+                       }
 
                        pr_debug("Setting vtag %x for dir %d\n", ih->init_tag, !dir);
                        ct->proto.sctp.vtag[!dir] = ih->init_tag;