Cloudflare pushes limits of Linux networking stack

Cloudflare engineers have encountered significant challenges in expanding their use of soft-unicast functionality within the Linux networking stack, driven by complex routing and anycast configurations for redundancy. Attempts to bypass limitations using advanced socket options ultimately led back to a simpler proxy solution. The experience highlights the difficulties in customizing Linux for high-scale networking demands.

Cloudflare's network infrastructure relies on intricate routing and configurations that test the boundaries of the Linux networking stack. As detailed in a recent blog post by engineer Chris Branch, the company sought to enhance soft-unicast capabilities, which align with their heavy use of anycast to distribute redundancy across external networks.

The core problem arose with the Netfilter connection tracking module, known as conntrack, and the Linux socket subsystem during packet rewriting processes. Soft-unicast requires multiple processes to recognize the same connection, but Linux's design prevented effective packet rewriting. Initially, the team implemented a local proxy to handle this, though it introduced performance overhead.

To address this, engineers explored abusing the TCP_REPAIR socket option, typically used for migrating virtual machine network connections. This allowed them to fully describe and 'repair' the socket connection state. They paired it with TCP Fast Open, using a TFO cookie to bypass the standard handshake. Despite these innovations, lingering issues persisted, with an early demux mechanism proposed as a partial fix.

In the end, the complexity proved too high. The team opted for the more straightforward local proxy approach, which terminates TCP connections and redirects traffic to a local socket. This decision underscores that fully escaping the Linux networking stack remains a formidable challenge, even for a company like Cloudflare at the forefront of internet infrastructure.

Mga Kaugnay na Artikulo

Illustration of a Cloudflare outage affecting X and ChatGPT, showing a user facing an error screen amid global disruption.
Larawang ginawa ng AI

Cloudflare outage disrupts X and ChatGPT access

Iniulat ng AI Larawang ginawa ng AI

Cloudflare suffered a major outage on November 18, 2025, rendering millions of websites worldwide, including X and ChatGPT, inaccessible for about three hours. The company confirmed the issue stemmed from an old bug triggered by a routine configuration change, not a cyber attack. Cloudflare apologized for the global impact on customers.

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

Iniulat ng AI

Phoronix has reported on updated Linux patches aimed at managing out-of-memory behavior through BPF technology. These developments focus on improving how the Linux kernel handles memory shortages. The updates are part of ongoing efforts in open-source Linux advancements.

Microsoft has returned to developing 'Hornet', a security feature for eBPF programs on Linux. The project, highlighted by Phoronix, focuses on enhancing protections for these kernel-level programs.

Iniulat ng AI

Developers are exploring page cache sharing as a way to improve performance for EROFS containers. This technique appears to offer significant advantages in Linux environments. The findings come from Phoronix, a site focused on Linux hardware and software reviews.

Researchers have used artificial intelligence to identify a significant performance boost in Linux's IO_uring subsystem. The discovery reveals a 50-80x improvement in efficiency. This finding highlights AI's role in optimizing open-source software.

Iniulat ng AI

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan