Has anyone implemented a solution using UDP jumbograms?

I recently learned about jumbograms (UDP packets> 65k - IPv6 only). Although I have no requirement to use them, I thought that I would dig and see how people were doing something smart.

I was surprised to find very few, besides the protocol of technical documentation.

So did anyone use them, and if so, how?

Are they less reliable than UDP because they are more?

What language / software / hardware did they support?

What was your experience like?

Greetings

+4
source share
1 answer

Linux includes support, as there is a vulnerability registered against it:

Systems Affected

Linux Linux Kernel: 2.6.21, Linux Linux Kernel: 2.6.20, Linux Linux Kernel: 2.6.2, Linux Kernel: 2.6.2 rc3, Linux Kernel: 2.6.2 rc2, Linux Kernel: 2.6.2 rc1, Linux Linux Kernel: 2.6.20.1, Linux Linux Kernel: 2.6.20.10, Linux Linux Kernel: 2.6.20.11, Linux Linux Kernel: 2.6.20.12, Linux Linux Kernel: 2.6.20.13, Linux Linux Kernel: 2.6.20.14, Linux Linux Kernel: 2.6.20.2, Linux Linux Kernel: 2.6. 20.3, Linux Linux Kernel: 2.6.20.4, Linux Linux Kernel: 2.6.20.5, Linux Linux Kernel: 2.6.20.8, Linux Linux Kernel: 2.6.20.9, Linux Linux Kernel: 2.6.21.1, Linux Kernel: 2.6.20 rc2, Linux Linux Kernel: 2.6.20.15, Linux Linux Kernel: 2.6.20.6, Linux Linux Kernel: 2.6.20.7, Linux Kernel: 2.6.21 git1, Linux Kernel: 2.6.21 git2, Linux Kernel: 2.6.21 git3, Linux Kernel : 2.6.21 git4, Linux Kernel: 2.6.21 git5, Linux Kernel: 2.6.21 git6, Linux Kernel: 2.6.21 git7

http://www.iss.net/security_center/reference/vuln/IPv6_Linux_Jumbogram_DoS.htm

Fragmented packets are inherently unreliable and DoS vulnerable, as resources must be reserved until the complete sequence is available to consumer applications.

Note. In IPv4, you can read individual fragments from the explorer; IPv6 only sets the IP stack for the full reconstructed payload.

+1
source

Source: https://habr.com/ru/post/1435098/


All Articles