1 #include <linux/kernel.h>
2 #include <linux/init.h>
3 #include <linux/cryptohash.h>
4 #include <linux/module.h>
5 #include <linux/cache.h>
6 #include <linux/random.h>
7 #include <linux/hrtimer.h>
8 #include <linux/ktime.h>
9 #include <linux/string.h>
11 #include <net/secure_seq.h>
13 static u32 net_secret
[MD5_MESSAGE_BYTES
/ 4] ____cacheline_aligned
;
15 static int __init
net_secret_init(void)
17 get_random_bytes(net_secret
, sizeof(net_secret
));
20 late_initcall(net_secret_init
);
23 static u32
seq_scale(u32 seq
)
26 * As close as possible to RFC 793, which
27 * suggests using a 250 kHz clock.
28 * Further reading shows this assumes 2 Mb/s networks.
29 * For 10 Mb/s Ethernet, a 1 MHz clock is appropriate.
30 * For 10 Gb/s Ethernet, a 1 GHz clock should be ok, but
31 * we also need to limit the resolution so that the u32 seq
32 * overlaps less than one time per MSL (2 minutes).
33 * Choosing a clock of 64 ns period is OK. (period of 274 s)
35 return seq
+ (ktime_to_ns(ktime_get_real()) >> 6);
39 #if IS_ENABLED(CONFIG_IPV6)
40 __u32
secure_tcpv6_sequence_number(const __be32
*saddr
, const __be32
*daddr
,
41 __be16 sport
, __be16 dport
)
43 u32 secret
[MD5_MESSAGE_BYTES
/ 4];
44 u32 hash
[MD5_DIGEST_WORDS
];
47 memcpy(hash
, saddr
, 16);
48 for (i
= 0; i
< 4; i
++)
49 secret
[i
] = net_secret
[i
] + (__force u32
)daddr
[i
];
50 secret
[4] = net_secret
[4] +
51 (((__force u16
)sport
<< 16) + (__force u16
)dport
);
52 for (i
= 5; i
< MD5_MESSAGE_BYTES
/ 4; i
++)
53 secret
[i
] = net_secret
[i
];
55 md5_transform(hash
, secret
);
57 return seq_scale(hash
[0]);
59 EXPORT_SYMBOL(secure_tcpv6_sequence_number
);
61 u32
secure_ipv6_port_ephemeral(const __be32
*saddr
, const __be32
*daddr
,
64 u32 secret
[MD5_MESSAGE_BYTES
/ 4];
65 u32 hash
[MD5_DIGEST_WORDS
];
68 memcpy(hash
, saddr
, 16);
69 for (i
= 0; i
< 4; i
++)
70 secret
[i
] = net_secret
[i
] + (__force u32
) daddr
[i
];
71 secret
[4] = net_secret
[4] + (__force u32
)dport
;
72 for (i
= 5; i
< MD5_MESSAGE_BYTES
/ 4; i
++)
73 secret
[i
] = net_secret
[i
];
75 md5_transform(hash
, secret
);
79 EXPORT_SYMBOL(secure_ipv6_port_ephemeral
);
83 __u32
secure_ip_id(__be32 daddr
)
85 u32 hash
[MD5_DIGEST_WORDS
];
87 hash
[0] = (__force __u32
) daddr
;
88 hash
[1] = net_secret
[13];
89 hash
[2] = net_secret
[14];
90 hash
[3] = net_secret
[15];
92 md5_transform(hash
, net_secret
);
97 __u32
secure_ipv6_id(const __be32 daddr
[4])
101 memcpy(hash
, daddr
, 16);
102 md5_transform(hash
, net_secret
);
107 __u32
secure_tcp_sequence_number(__be32 saddr
, __be32 daddr
,
108 __be16 sport
, __be16 dport
)
110 u32 hash
[MD5_DIGEST_WORDS
];
112 hash
[0] = (__force u32
)saddr
;
113 hash
[1] = (__force u32
)daddr
;
114 hash
[2] = ((__force u16
)sport
<< 16) + (__force u16
)dport
;
115 hash
[3] = net_secret
[15];
117 md5_transform(hash
, net_secret
);
119 return seq_scale(hash
[0]);
122 u32
secure_ipv4_port_ephemeral(__be32 saddr
, __be32 daddr
, __be16 dport
)
124 u32 hash
[MD5_DIGEST_WORDS
];
126 hash
[0] = (__force u32
)saddr
;
127 hash
[1] = (__force u32
)daddr
;
128 hash
[2] = (__force u32
)dport
^ net_secret
[14];
129 hash
[3] = net_secret
[15];
131 md5_transform(hash
, net_secret
);
135 EXPORT_SYMBOL_GPL(secure_ipv4_port_ephemeral
);
138 #if IS_ENABLED(CONFIG_IP_DCCP)
139 u64
secure_dccp_sequence_number(__be32 saddr
, __be32 daddr
,
140 __be16 sport
, __be16 dport
)
142 u32 hash
[MD5_DIGEST_WORDS
];
145 hash
[0] = (__force u32
)saddr
;
146 hash
[1] = (__force u32
)daddr
;
147 hash
[2] = ((__force u16
)sport
<< 16) + (__force u16
)dport
;
148 hash
[3] = net_secret
[15];
150 md5_transform(hash
, net_secret
);
152 seq
= hash
[0] | (((u64
)hash
[1]) << 32);
153 seq
+= ktime_to_ns(ktime_get_real());
154 seq
&= (1ull << 48) - 1;
158 EXPORT_SYMBOL(secure_dccp_sequence_number
);
160 #if IS_ENABLED(CONFIG_IPV6)
161 u64
secure_dccpv6_sequence_number(__be32
*saddr
, __be32
*daddr
,
162 __be16 sport
, __be16 dport
)
164 u32 secret
[MD5_MESSAGE_BYTES
/ 4];
165 u32 hash
[MD5_DIGEST_WORDS
];
169 memcpy(hash
, saddr
, 16);
170 for (i
= 0; i
< 4; i
++)
171 secret
[i
] = net_secret
[i
] + daddr
[i
];
172 secret
[4] = net_secret
[4] +
173 (((__force u16
)sport
<< 16) + (__force u16
)dport
);
174 for (i
= 5; i
< MD5_MESSAGE_BYTES
/ 4; i
++)
175 secret
[i
] = net_secret
[i
];
177 md5_transform(hash
, secret
);
179 seq
= hash
[0] | (((u64
)hash
[1]) << 32);
180 seq
+= ktime_to_ns(ktime_get_real());
181 seq
&= (1ull << 48) - 1;
185 EXPORT_SYMBOL(secure_dccpv6_sequence_number
);