NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/52074: -current npf map directive broken
Hi Roy and all!
On 05/11/17 11:47, Roy Marples wrote:
Hi Frank On 10/05/2017 10:11, Frank Kardel wrote:
On 05/10/17 00:45, Robert Elz wrote:
Date: Sun, 07 May 2017 23:07:42 +0200 From: Frank Kardel
<kardel%netbsd.org@localhost> Message-ID: <590F8C9E.3040102%netbsd.org@localhost> | From
what I understand this code originally attempted to avoid sending |
from invalid/unusable local address (e. g. duplicate IP - error, |
tentative and detached should just be dropped). You also shouldn't
be able to send from an address you don't own (generally - a router
has to be able to forward, as distinct from originate, packets from
anywhere of course).
You are correct - in this case (52074) we are looking at both aspects
- the local machine and the router/NAT box. It is *not* about
originating packets from anywhere. It is about redirecting packets
for non local targets to a locally existing proxy.
I agree with Robert, we shouldn't be sending packets on the wire from
an address we don't own. But you're not sending on the wire are you?
See kre@'s comment. He described it.The local addres gets replaced with
the remote address we proxied for.
I think a check to satisfy us all would be to test for IP_FORWARDING
on the packet or IFF_LOOPBACK on the outgoing interface - if either
are true we can skip address validation.
The IFF_LOOPBACK property is of no use here. What counts is that the
redirect is to a local address to masquerade a remote address.
Any local address used for redirect would trigger the issue as the
packet filter puts back the original remote address and that's violating
the assumption
the we must use local addresses on locally generated packets.
Thoughts? Roy
I think the solution is much simpler (as I mentioned before).
If we actually take look at ip_output we see roughly following
processing steps:
1) insert ip options
2) create IP header unless forwarding or raw output
3) handle routing (choose output interface)
4) if no source address is set, use the interface address of the
outgoing interface
5) handle IPSEC
6) run packet filter
7) check whether we are sending from a valid local address (our
discussion point)
8) do xmit accounting
9) handle TSO offloading or packet not needing fragmentation and
output via interface -> done
10) handle checksum offloading/calculation
11) handle fragmentation output fragmented packets
12) finalize
During 1...5 the assumption/requirement that non IP_FORWARDING packets
must originate from local addresses holds.
Number 6 breaks this assumption in case of a redirected remote address
to a local address. There the test in 7 relies
on a requirement that cannot be guaranteed after packet filter NAT
operations.
Moving ia pickup and !IP_FORWARDING local address check from 7 to 5a
will achieve what we want (guard against from invalid local addresses). Also
IFA accounting would correctly measure bytes-sent at the right local
address involved in the redirect scenario.
I am currently running a check on local address violations before the
packet filter call. The invariant that 1..5 follow the local address
requirement holds so
far. Traffic processed is: normal connections, ipsec transport/NATT,
some multicast.
Can somebody verify that strategy as a correct solution?
NB: the current fix has the drawback of at least miscounting output
bytes and missing some local checks.
Frank
Home |
Main Index |
Thread Index |
Old Index