Simon 'corecode' Schubert wrote:
> > Are you using NAT?
> 
> yep.
> 
> > The libalias incremental checksum calculation is incorrect;
> > it assumes that a two's complement network order underflow
> > will result in the same value as a one's complement host
> > order underflow.  This results in off-by-one errors.
> 
> so is this an optimisation issue or not? when compiling with -O it works
> again. furthermore i don't know if my bind uses the internal address or
> the external one for queries.

The short answer is "I don't know".

The longer answer is "It depends".

The problem is that there are certain optimizations that
are permissable, which could break associativity on the
carry.

The only way to tell would be to have a dump that included
wire/before NAT/after NAT/decode, and then see where it
blew up.

I made the assumption (perhaps invalid) that when you said
the checksum calculation was invalid that it was invalid
on check vs. being invalid on transmit.

That it's the incremental checksum calculation is a good
bet anyway, since the optimized machine dependent code
that's used in the standard path isn't going to change
much anyway.


> > There's also printing it out in tcp_input when you get a bad
> > checksum.  If you see a lot of "0xfffe", then you'll know it's
> > an off-by-one error.
> 
> yah, got lots of them, seen in tcpdump -vvvxXlei gif0 ;]
> 
> > If the problem is only on ACK packets... I can tell you that
> > the tcp_respond() code path is not really throughly exercised.
> 
> tho i've seen these problems recently on UDP DNS lookups, too. then i
> switched back to -O

Most likely it's the TTL update, then, near border
underflow cases.

I had a recent situation where I was doing sequence
adjustment, and by using the loopback for testing, I
ended up with the sequence number randomness causing the
problem about 45% of the time, because of the probability
of underflow being so much higher.

THe easy answer is that you need to ntohs((u_short)ip->ip_ttl)
before you add it, and then do the incremental update in
HTONS(ip->ip_seq); /* adjust */ HTONS(ip-ip_seq);.

The harder way would be to correct the carry for the
byte swapped order, but it's a real pain to do.

If you look at the code in RFC 1141, it shows how to do
this, but it's not exactly correct because of the problem
RFC 1624 points out.  Basically, you end up needing to do
the complemnatry math, instead of the complement of the
regular math.

Hope this helps.

-- Terry

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to