mirror of
git://git.yoctoproject.org/linux-yocto.git
synced 2026-01-27 12:47:24 +01:00
sctp: Stop accepting md5 and sha1 for net.sctp.cookie_hmac_alg
The upgrade of the cookie authentication algorithm to HMAC-SHA256 kept some backwards compatibility for the net.sctp.cookie_hmac_alg sysctl by still accepting the values 'md5' and 'sha1'. Those algorithms are no longer actually used, but rather those values were just treated as requests to enable cookie authentication. As requested at https://lore.kernel.org/netdev/CADvbK_fmCRARc8VznH8cQa-QKaCOQZ6yFbF=1-VDK=zRqv_cXw@mail.gmail.com/ and https://lore.kernel.org/netdev/20250818084345.708ac796@kernel.org/ , go further and start rejecting 'md5' and 'sha1' completely. Signed-off-by: Eric Biggers <ebiggers@kernel.org> Link: https://patch.msgid.link/20250818205426.30222-6-ebiggers@kernel.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
This commit is contained in:
parent
2f3dd6ec90
commit
d5a253702a
|
|
@ -3511,9 +3511,6 @@ cookie_hmac_alg - STRING
|
|||
* sha256
|
||||
* none
|
||||
|
||||
md5 and sha1 are also accepted for backwards compatibility, but cause
|
||||
sha256 to be selected.
|
||||
|
||||
Default: sha256
|
||||
|
||||
rcvbuf_policy - INTEGER
|
||||
|
|
|
|||
|
|
@ -401,9 +401,7 @@ static int proc_sctp_do_hmac_alg(const struct ctl_table *ctl, int write,
|
|||
ret = proc_dostring(&tbl, 1, buffer, lenp, ppos);
|
||||
if (ret)
|
||||
return ret;
|
||||
if (!strcmp(tmp, "sha256") ||
|
||||
/* for backwards compatibility */
|
||||
!strcmp(tmp, "md5") || !strcmp(tmp, "sha1")) {
|
||||
if (!strcmp(tmp, "sha256")) {
|
||||
net->sctp.cookie_auth_enable = 1;
|
||||
return 0;
|
||||
}
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user