Re: [PATCH nf-next] netfilter: xt_socket: add XT_SOCKET_MATCHSOCKMARK flag and mark fields

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jun 15, 2015 at 01:39:03PM -0600, Harout Hedeshian wrote:
> 
> 
> > -----Original Message-----
> > From: Harout Hedeshian [mailto:harouth@xxxxxxxxxxxxxx]
> > Sent: Monday, June 15, 2015 11:42 AM
> > To: 'Pablo Neira Ayuso'
> > Cc: 'netfilter-devel@xxxxxxxxxxxxxxx'; 'Lorenzo Colitti'
> > Subject: RE: [PATCH nf-next] netfilter: xt_socket: add
> > XT_SOCKET_MATCHSOCKMARK flag and mark fields
> > 
> > 
> > 
> > > -----Original Message-----
> > > From: Pablo Neira Ayuso [mailto:pablo@xxxxxxxxxxxxx]
> > > Sent: Monday, June 15, 2015 10:23 AM
> > > To: Harout Hedeshian
> > > Cc: netfilter-devel@xxxxxxxxxxxxxxx; Lorenzo Colitti
> > > Subject: Re: [PATCH nf-next] netfilter: xt_socket: add
> > > XT_SOCKET_MATCHSOCKMARK flag and mark fields
> > >
> > > On Fri, Jun 12, 2015 at 04:39:55PM -0600, Harout Hedeshian wrote:
> > > > xt_socket is useful for matching sockets with IP_TRANSPARENT and
> > > > taking some action on the matching packets. However, it lacks the
> > > > ability to match only a small subset of transparent sockets.
> > > >
> > > > Suppose there are 2 applications, each with its own set of
> > > > transparent sockets. The first application wants all matching
> > > > packets dropped, while the second application wants them forwarded
> > somewhere else.
> > > >
> > > > Add the ability to match sockets based on the socket mark.
> > > >
> > > > Now the 2 hypothetical applications can differentiate their sockets
> > > > based on a mark value set with SO_MARK.
> > > >
> > > > iptables -t mangle -I PREROUTING -m socket --transparent --mark 10
> > > > -J
> > > > act1 iptables -t mangle -I PREROUTING -m socket --transparent --mark
> > > > 11 -J act2
> > >
> > > Wouldn't it be better to restore the sk_mark to skb->mark? I mean:
> > >
> > >         iptables -t mangle -I PREROUTING \
> > >                 -m socket --transparent --restore-skmark -j myskchain
> > >	
> > > Thus, you can use -m mark from the 'myskchain' without having to fetch
> > > and inspect the sk over and over again as it happens with this
> > > extension.
> > 
> > Yes, I think that can work. Let me try that out and I'll submit a new
> > patch.
> 
> Actually, on second thought, I'm not so sure. This socket lookup is
> happening as part of a match operation in xt_socket.c.
> From x_tables.h, I can see that match functions are not supposed to modify
> the skb:
> 
> struct xt_match{
> ...
> bool (*match)(const struct sk_buff *skb, struct xt_action_param *);
>
> In that case, would this even be valid?
> -m socket --transparent --restore-skmark
> 
> Keeping in mind --restore-skmark is happening as part of -m socket
> 
> I would think we would need a whole new target to handle something like
> this:
> iptables -t mangle -I PREROUTING -m socket --transparent --no-wildcard -j
> SOCKET --restore-skmark
> 
> Since the target invocation would be separate, we would need a second socket
> lookup? Seems perhaps a little overkill...

Yes, it's simply overkill to add a new target to add this.

So just cast it:

        struct sk_buff *pskb = (struct sk_buff *)skb;

iptables matches were originally design not to modify anything, but it
can lead us to situations like this. That's one of the reasons why we
have no distinction between matches and targets in nftables anymore.

Thanks.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux