Cloudflare pushes limits of Linux networking stack

Cloudflare engineers have encountered significant challenges in expanding their use of soft-unicast functionality within the Linux networking stack, driven by complex routing and anycast configurations for redundancy. Attempts to bypass limitations using advanced socket options ultimately led back to a simpler proxy solution. The experience highlights the difficulties in customizing Linux for high-scale networking demands.

Cloudflare's network infrastructure relies on intricate routing and configurations that test the boundaries of the Linux networking stack. As detailed in a recent blog post by engineer Chris Branch, the company sought to enhance soft-unicast capabilities, which align with their heavy use of anycast to distribute redundancy across external networks.

The core problem arose with the Netfilter connection tracking module, known as conntrack, and the Linux socket subsystem during packet rewriting processes. Soft-unicast requires multiple processes to recognize the same connection, but Linux's design prevented effective packet rewriting. Initially, the team implemented a local proxy to handle this, though it introduced performance overhead.

To address this, engineers explored abusing the TCP_REPAIR socket option, typically used for migrating virtual machine network connections. This allowed them to fully describe and 'repair' the socket connection state. They paired it with TCP Fast Open, using a TFO cookie to bypass the standard handshake. Despite these innovations, lingering issues persisted, with an early demux mechanism proposed as a partial fix.

In the end, the complexity proved too high. The team opted for the more straightforward local proxy approach, which terminates TCP connections and redirects traffic to a local socket. This decision underscores that fully escaping the Linux networking stack remains a formidable challenge, even for a company like Cloudflare at the forefront of internet infrastructure.

Awọn iroyin ti o ni ibatan

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Àwòrán tí AI ṣe

Linux CopyFail exploit threatens root access amid Ubuntu outage

Ti AI ṣe iroyin Àwòrán tí AI ṣe

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

Ti AI ṣe iroyin

Law enforcement agencies from the United States and Europe, supported by private partners, have taken down the SocksEscort cybercrime proxy network. This service, powered by the AVRecon malware infecting Linux-based devices, provided cybercriminals with access to compromised IP addresses. The operation resulted in the seizure of domains, servers, and cryptocurrency assets.

One week after the FCC banned sales of new foreign-made Wi-Fi routers over national security risks, new details emerge on implicated cyberattacks and growing criticism of the broad policy's effectiveness.

Ti AI ṣe iroyin

Researchers have used artificial intelligence to identify a significant performance boost in Linux's IO_uring subsystem. The discovery reveals a 50-80x improvement in efficiency. This finding highlights AI's role in optimizing open-source software.

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ