mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-22 17:39:53 +03:00
Addressing the UDP reflection amplification attack: https://github.com/SoftEtherVPN/SoftEtherVPN/issues/1001
This commit is contained in:
parent
46d8da6744
commit
4d42f450b2
@ -821,7 +821,7 @@ void OvsProcessRecvControlPacket(OPENVPN_SERVER *s, OPENVPN_SESSION *se, OPENVPN
|
||||
|
||||
case OPENVPN_P_CONTROL_HARD_RESET_CLIENT_V2:
|
||||
// New connection (hard reset)
|
||||
OvsSendControlPacket(c, OPENVPN_P_CONTROL_HARD_RESET_SERVER_V2, NULL, 0);
|
||||
OvsSendControlPacketEx(c, OPENVPN_P_CONTROL_HARD_RESET_SERVER_V2, NULL, 0, true);
|
||||
|
||||
c->Status = OPENVPN_CHANNEL_STATUS_TLS_WAIT_CLIENT_KEY;
|
||||
break;
|
||||
@ -1552,6 +1552,10 @@ void OvsSendControlPacketWithAutoSplit(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *
|
||||
|
||||
// Send the control packet
|
||||
void OvsSendControlPacket(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *data, UINT data_size)
|
||||
{
|
||||
OvsSendControlPacketEx(c, opcode, data, data_size, false);
|
||||
}
|
||||
void OvsSendControlPacketEx(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *data, UINT data_size, bool no_resend)
|
||||
{
|
||||
OPENVPN_CONTROL_PACKET *p;
|
||||
// Validate arguments
|
||||
@ -1562,6 +1566,8 @@ void OvsSendControlPacket(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *data, UINT da
|
||||
|
||||
p = ZeroMalloc(sizeof(OPENVPN_CONTROL_PACKET));
|
||||
|
||||
p->NoResend = no_resend;
|
||||
|
||||
p->OpCode = opcode;
|
||||
p->PacketId = c->NextSendPacketId++;
|
||||
|
||||
@ -2558,9 +2564,13 @@ void OvsRecvPacket(OPENVPN_SERVER *s, LIST *recv_packet_list)
|
||||
OPENVPN_CONTROL_PACKET *cp = LIST_DATA(c->SendControlPacketList, k);
|
||||
|
||||
if (cp->NextSendTime <= s->Now)
|
||||
{
|
||||
if (cp->NoResend == false || cp->NumSent == 0) // To address the UDP reflection amplification attack: https://github.com/SoftEtherVPN/SoftEtherVPN/issues/1001
|
||||
{
|
||||
OPENVPN_PACKET *p;
|
||||
|
||||
cp->NumSent++;
|
||||
|
||||
num = OvsGetAckReplyList(c, acks);
|
||||
|
||||
p = OvsNewControlPacket(cp->OpCode, j, se->ServerSessionId, num, acks,
|
||||
@ -2575,6 +2585,7 @@ void OvsRecvPacket(OPENVPN_SERVER *s, LIST *recv_packet_list)
|
||||
AddInterrupt(s->Interrupt, cp->NextSendTime);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// If the response with an ACK-only packet is required, respond such that
|
||||
num = OvsGetAckReplyList(c, acks);
|
||||
|
@ -108,6 +108,8 @@ struct OPENVPN_CONTROL_PACKET
|
||||
UINT DataSize; // Data size
|
||||
UCHAR *Data; // Data body
|
||||
UINT64 NextSendTime; // Scheduled next transmission time
|
||||
bool NoResend; // Disable re-sending
|
||||
UINT NumSent; // How many times we have sent this packet
|
||||
};
|
||||
|
||||
// OpenVPN packet
|
||||
@ -260,6 +262,7 @@ void OvsSendPacketRawNow(OPENVPN_SERVER *s, OPENVPN_SESSION *se, void *data, UIN
|
||||
|
||||
void OvsProcessRecvControlPacket(OPENVPN_SERVER *s, OPENVPN_SESSION *se, OPENVPN_CHANNEL *c, OPENVPN_PACKET *p);
|
||||
void OvsSendControlPacket(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *data, UINT data_size);
|
||||
void OvsSendControlPacketEx(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *data, UINT data_size, bool no_resend);
|
||||
void OvsSendControlPacketWithAutoSplit(OPENVPN_CHANNEL *c, UCHAR opcode, UCHAR *data, UINT data_size);
|
||||
void OvsFreeControlPacket(OPENVPN_CONTROL_PACKET *p);
|
||||
void OvsDeleteFromSendingControlPacketList(OPENVPN_CHANNEL *c, UINT num_acks, UINT *acks);
|
||||
|
Loading…
Reference in New Issue
Block a user