diff options
| author | Jakub Kicinski <kuba@kernel.org> | 2025-09-11 19:05:59 -0700 |
|---|---|---|
| committer | Jakub Kicinski <kuba@kernel.org> | 2025-09-11 19:05:59 -0700 |
| commit | 999337afa51d9bd7941f6ace24923ba64690380f (patch) | |
| tree | 969fce1577d9063dd7d33d657677702afa7ff41f /rust/helpers/platform.c | |
| parent | bf2650d0599c999cf2fdffa721b00e25989918fb (diff) | |
| parent | 51e547e8c89c661f6fbede4a28b1d33b13625683 (diff) | |
Merge branch 'tcp-destroy-tcp-ao-tcp-md5-keys-in-sk_destruct'
Dmitry Safonov says:
====================
tcp: Destroy TCP-AO, TCP-MD5 keys in .sk_destruct()
On one side a minor/cosmetic issue, especially nowadays when
TCP-AO/TCP-MD5 signature verification failures aren't logged to dmesg.
Yet, I think worth addressing for two reasons:
- unsigned RST gets ignored by the peer and the connection is alive for
longer (keep-alive interval)
- netstat counters increase and trace events report that trusted BGP peer
is sending unsigned/incorrectly signed segments, which can ring alarm
on monitoring.
====================
Link: https://patch.msgid.link/20250909-b4-tcp-ao-md5-rst-finwait2-v5-0-9ffaaaf8b236@arista.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'rust/helpers/platform.c')
0 files changed, 0 insertions, 0 deletions
