summaryrefslogtreecommitdiff
path: root/drivers/net/wireguard/cookie.h
diff options
context:
space:
mode:
authorToke Høiland-Jørgensen <toke@redhat.com>2020-04-29 14:59:22 -0600
committerJason A. Donenfeld <Jason@zx2c4.com>2022-07-07 13:26:42 +0200
commitfcdaa8a9b39fa4001d05d81064acab27098241df (patch)
tree30630a70e64c5eac06364d7a2519311bb4e35e02 /drivers/net/wireguard/cookie.h
parent0610e4ebece429700d4a48efd71c0fa6172547f1 (diff)
downloadwireguard-linux-trimmed-fcdaa8a9b39fa4001d05d81064acab27098241df.tar.gz
wireguard-linux-trimmed-fcdaa8a9b39fa4001d05d81064acab27098241df.zip
wireguard: receive: use tunnel helpers for decapsulating ECN markings
commit e8c72696cd7e7bc6abd0be69ce2abea476685e37 upstream. WireGuard currently only propagates ECN markings on tunnel decap according to the old RFC3168 specification. However, the spec has since been updated in RFC6040 to recommend slightly different decapsulation semantics. This was implemented in the kernel as a set of common helpers for ECN decapsulation, so let's just switch over WireGuard to using those, so it can benefit from this enhancement and any future tweaks. We do not drop packets with invalid ECN marking combinations, because WireGuard is frequently used to work around broken ISPs, which could be doing that. Fixes: a8f1bc7bdea3 ("net: WireGuard secure network tunnel") Reported-by: Olivier Tilmans <olivier.tilmans@nokia-bell-labs.com> Cc: Dave Taht <dave.taht@gmail.com> Cc: Rodney W. Grimes <ietf@gndrsh.dnsmgr.net> Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Diffstat (limited to 'drivers/net/wireguard/cookie.h')
0 files changed, 0 insertions, 0 deletions