Re: [PATCH v2] netfilter: Parse ICMPv6 redirects

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 13, 2017 at 2:44 PM, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote:
> On Mon, Mar 13, 2017 at 02:17:39PM +0100, Alin Năstac wrote:
>> Hi Pablo,
>>
>> On Mon, Mar 13, 2017 at 1:40 PM, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote:
>> > On Tue, Mar 07, 2017 at 11:00:43AM +0100, Alin Nastac wrote:
>> >> Extract IPv6 packet that triggered the sending of redirect message from
>> >> ICMPv6 Redirected Header option and check if conntrack table contain such
>> >> connection. Mark redirect packet as RELATED if a matching connection is found.
>> >
>> > I think we need a sysctl to enable this on demand, eg.
>> > 'nf_conntrack_icmpv6_accept_redirects'
>> >
>> > This is changing the default behaviour, my main concern here is that
>> > filtering policies not accepting redirects will now make it via
>> > RELATED.
>>
>> net/ipv4/netfilter/nf_conntrack_proto_icmp.c  give RELATED status to
>> all ICMP redirect messages that refer to valid conntracks. Why would
>> ICMPv6 redirect case be any different?
>
> That's very valid argument, but we have this asymmetry for long time
> ago, basically since the beginning. As I said, I have concerns on
> changing this default behaviour without an explicit knob. This
> behaviour change will go through inadvertently for many people.

People should not rely on buggy behaviour to keep them safe. Imagine
for instance there is a bug that prevents packets sent by HTTP servers
to match "-m conntrack --state ESTABLISHED" rules. Would you add a fix
that is operational only when an obscure procfs knob gets enabled?

Redirects are supposed to be sent to on-link hosts, so all we want in
fact is to allow these packets on INPUT. Would it be OK to restrict
RELATED status to redirects originated from link-local addresses? This
will be in line with RFC 4861 requirement that source address of
ICMPv6 redirects must be in link-local scope.

>> Would you implement a similar sysctl switch for ICMP redirect
>> RELATED state? And if you do, would you accept to enable these
>> switches by default?
>
> I don't think we shouldn't enable this by default. We have tried to be
> conservative on that side so far. Is it a problem there to enable this
> via sysctl.conf?

Nothing except that netfilter will still fail to find ICMPv6 redirects
as RELATED unless you know where to look. Those who want to allow
redirects will likely allow them explicitly rather than take the
trouble to find the switch in the procfs.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux