RE: [PATCH nf-next] netfilter: xt_socket: add XT_SOCKET_MATCHSOCKMARK flag and mark fields

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: Harout Hedeshian [mailto:harouth@xxxxxxxxxxxxxx]
> Sent: Monday, June 15, 2015 11:42 AM
> To: 'Pablo Neira Ayuso'
> Cc: 'netfilter-devel@xxxxxxxxxxxxxxx'; 'Lorenzo Colitti'
> Subject: RE: [PATCH nf-next] netfilter: xt_socket: add
> XT_SOCKET_MATCHSOCKMARK flag and mark fields
> 
> 
> 
> > -----Original Message-----
> > From: Pablo Neira Ayuso [mailto:pablo@xxxxxxxxxxxxx]
> > Sent: Monday, June 15, 2015 10:23 AM
> > To: Harout Hedeshian
> > Cc: netfilter-devel@xxxxxxxxxxxxxxx; Lorenzo Colitti
> > Subject: Re: [PATCH nf-next] netfilter: xt_socket: add
> > XT_SOCKET_MATCHSOCKMARK flag and mark fields
> >
> > On Fri, Jun 12, 2015 at 04:39:55PM -0600, Harout Hedeshian wrote:
> > > xt_socket is useful for matching sockets with IP_TRANSPARENT and
> > > taking some action on the matching packets. However, it lacks the
> > > ability to match only a small subset of transparent sockets.
> > >
> > > Suppose there are 2 applications, each with its own set of
> > > transparent sockets. The first application wants all matching
> > > packets dropped, while the second application wants them forwarded
> somewhere else.
> > >
> > > Add the ability to match sockets based on the socket mark.
> > >
> > > Now the 2 hypothetical applications can differentiate their sockets
> > > based on a mark value set with SO_MARK.
> > >
> > > iptables -t mangle -I PREROUTING -m socket --transparent --mark 10
> > > -J
> > > act1 iptables -t mangle -I PREROUTING -m socket --transparent --mark
> > > 11 -J act2
> >
> > Wouldn't it be better to restore the sk_mark to skb->mark? I mean:
> >
> >         iptables -t mangle -I PREROUTING \
> >                 -m socket --transparent --restore-skmark -j myskchain
> >	
> > Thus, you can use -m mark from the 'myskchain' without having to fetch
> > and inspect the sk over and over again as it happens with this
> > extension.
> 
> Yes, I think that can work. Let me try that out and I'll submit a new
> patch.

Actually, on second thought, I'm not so sure. This socket lookup is
happening as part of a match operation in xt_socket.c.
>From x_tables.h, I can see that match functions are not supposed to modify
the skb:

struct xt_match{
...
bool (*match)(const struct sk_buff *skb, struct xt_action_param *);


In that case, would this even be valid?
-m socket --transparent --restore-skmark

Keeping in mind --restore-skmark is happening as part of -m socket

I would think we would need a whole new target to handle something like
this:
iptables -t mangle -I PREROUTING -m socket --transparent --no-wildcard -j
SOCKET --restore-skmark

Since the target invocation would be separate, we would need a second socket
lookup? Seems perhaps a little overkill...

Harout

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux