Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a configuration option to drop packets from an unexpected source address #77

Merged
merged 1 commit into from
Nov 8, 2024

Conversation

mlrsmith
Copy link
Contributor

@mlrsmith mlrsmith commented Nov 7, 2024

If an attacker has the socket id of an existing connection (either through sniffing traffic - the headers aren't encrypted - or guessing, since they're only 32 bit IDs), they can send packets that will be processed as being part of an existing connection.

This could be used to interfere with an existing connection, either adding corrupt data or causing the SRT connection to be terminated, for example.

So, add a configuration option to keep this behaviour (but default it to off because it can be unsafe). If this behaviour isn't wanted (the new default), packets from a different address are dropped.

@ioppermann ioppermann merged commit 6b7714e into datarhei:main Nov 8, 2024
5 checks passed
@ioppermann
Copy link
Member

Thanks a lot for this patch.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants