aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSergey Kandaurov <pluknet@nginx.com>2020-09-08 13:35:50 +0300
committerSergey Kandaurov <pluknet@nginx.com>2020-09-08 13:35:50 +0300
commit786a74e34ec89d0e78b95f2524dff68bf6235923 (patch)
tree1d72e0975ebf68a118f68d216624df3e337ec048
parentd8360f912ac2eeb0103c2781d450b7735d7894ba (diff)
downloadnginx-786a74e34ec89d0e78b95f2524dff68bf6235923.tar.gz
nginx-786a74e34ec89d0e78b95f2524dff68bf6235923.zip
QUIC: removed check for packet size beyond MAX_UDP_PAYLOAD_SIZE.
The check tested the total size of a packet header and unprotected packet payload, which doesn't include the packet number length and expansion of the packet protection AEAD. If the packet was corrupted, it could cause false triggering of the condition due to unsigned type underflow leading to a connection error. Existing checks for the QUIC header and protected packet payload lengths should be enough.
-rw-r--r--src/event/ngx_event_quic_protection.c5
1 files changed, 0 insertions, 5 deletions
diff --git a/src/event/ngx_event_quic_protection.c b/src/event/ngx_event_quic_protection.c
index 7a4ebdaa7..0d205a160 100644
--- a/src/event/ngx_event_quic_protection.c
+++ b/src/event/ngx_event_quic_protection.c
@@ -1089,11 +1089,6 @@ ngx_quic_decrypt(ngx_quic_header_t *pkt, ngx_ssl_conn_t *ssl_conn,
#endif
pkt->payload.len = in.len - EVP_GCM_TLS_TAG_LEN;
-
- if (NGX_QUIC_MAX_UDP_PAYLOAD_SIZE - ad.len < pkt->payload.len) {
- return NGX_ERROR;
- }
-
pkt->payload.data = pkt->plaintext + ad.len;
rc = ngx_quic_tls_open(ciphers.c, secret, &pkt->payload,