Bug ID 510650: BIG-IP MPTCP Checksum calculation might be incorrect.

Last Modified: Jul 03, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP All(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.4, 14.1.0.5, 14.1.0.6

Opened: Mar 04, 2015
Severity: 3-Major

Symptoms

RFC 6824 specifies that a data sequence mapping also contains a checksum of the data that this mapping covers, if use of checksums has been negotiated at the MP_CAPABLE exchange. However, the BIG-IP implementation only calculates a checksum for a mapping of a single packet.

Impact

The MPTCP checksum may be computed incorrectly and may cause connection failures if MPTCP checksums have been negotiated.

Conditions

MPTCP checksum enabled by either client or the BIG-IP system.

Workaround

There is no workaround available if the client cannot disable checksums and sends a checksum covering a DSS mapping larger than a single packet.

Fix Information

None

Behavior Change