mirror of
https://gitee.com/bianbu-linux/linux-6.6
synced 2025-04-24 14:07:52 -04:00
tls: rx: add counter for NoPad violations
As discussed with Maxim add a counter for true NoPad violations. This should help deployments catch unexpected padded records vs just control records which always need re-encryption. https: //lore.kernel.org/all/b111828e6ac34baad9f4e783127eba8344ac252d.camel@nvidia.com/ Signed-off-by: Jakub Kicinski <kuba@kernel.org>
This commit is contained in:
parent
1090c1ea22
commit
bb56cea9ab
4 changed files with 8 additions and 0 deletions
|
@ -282,3 +282,7 @@ TLS implementation exposes the following per-namespace statistics
|
||||||
number of RX records which had to be re-decrypted due to
|
number of RX records which had to be re-decrypted due to
|
||||||
``TLS_RX_EXPECT_NO_PAD`` mis-prediction. Note that this counter will
|
``TLS_RX_EXPECT_NO_PAD`` mis-prediction. Note that this counter will
|
||||||
also increment for non-data records.
|
also increment for non-data records.
|
||||||
|
|
||||||
|
- ``TlsRxNoPadViolation`` -
|
||||||
|
number of data RX records which had to be re-decrypted due to
|
||||||
|
``TLS_RX_EXPECT_NO_PAD`` mis-prediction.
|
||||||
|
|
|
@ -345,6 +345,7 @@ enum
|
||||||
LINUX_MIB_TLSDECRYPTERROR, /* TlsDecryptError */
|
LINUX_MIB_TLSDECRYPTERROR, /* TlsDecryptError */
|
||||||
LINUX_MIB_TLSRXDEVICERESYNC, /* TlsRxDeviceResync */
|
LINUX_MIB_TLSRXDEVICERESYNC, /* TlsRxDeviceResync */
|
||||||
LINUX_MIB_TLSDECRYPTRETRY, /* TlsDecryptRetry */
|
LINUX_MIB_TLSDECRYPTRETRY, /* TlsDecryptRetry */
|
||||||
|
LINUX_MIB_TLSRXNOPADVIOL, /* TlsRxNoPadViolation */
|
||||||
__LINUX_MIB_TLSMAX
|
__LINUX_MIB_TLSMAX
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -21,6 +21,7 @@ static const struct snmp_mib tls_mib_list[] = {
|
||||||
SNMP_MIB_ITEM("TlsDecryptError", LINUX_MIB_TLSDECRYPTERROR),
|
SNMP_MIB_ITEM("TlsDecryptError", LINUX_MIB_TLSDECRYPTERROR),
|
||||||
SNMP_MIB_ITEM("TlsRxDeviceResync", LINUX_MIB_TLSRXDEVICERESYNC),
|
SNMP_MIB_ITEM("TlsRxDeviceResync", LINUX_MIB_TLSRXDEVICERESYNC),
|
||||||
SNMP_MIB_ITEM("TlsDecryptRetry", LINUX_MIB_TLSDECRYPTRETRY),
|
SNMP_MIB_ITEM("TlsDecryptRetry", LINUX_MIB_TLSDECRYPTRETRY),
|
||||||
|
SNMP_MIB_ITEM("TlsRxNoPadViolation", LINUX_MIB_TLSRXNOPADVIOL),
|
||||||
SNMP_MIB_SENTINEL
|
SNMP_MIB_SENTINEL
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -1596,6 +1596,8 @@ static int decrypt_skb_update(struct sock *sk, struct sk_buff *skb,
|
||||||
if (unlikely(darg->zc && prot->version == TLS_1_3_VERSION &&
|
if (unlikely(darg->zc && prot->version == TLS_1_3_VERSION &&
|
||||||
darg->tail != TLS_RECORD_TYPE_DATA)) {
|
darg->tail != TLS_RECORD_TYPE_DATA)) {
|
||||||
darg->zc = false;
|
darg->zc = false;
|
||||||
|
if (!darg->tail)
|
||||||
|
TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXNOPADVIOL);
|
||||||
TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSDECRYPTRETRY);
|
TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSDECRYPTRETRY);
|
||||||
return decrypt_skb_update(sk, skb, dest, darg);
|
return decrypt_skb_update(sk, skb, dest, darg);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue