Re: [PATCH nf-next 0/3] netfilter: nf_tables: reject loads from uninitialized registers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, May 05, 2023 at 04:51:13PM +0200, Florian Westphal wrote:
> Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote:
> > On Fri, May 05, 2023 at 01:16:53PM +0200, Florian Westphal wrote:
> > > Keep a per-rule bitmask that tracks registers that have seen a store,
> > > then reject loads when the accessed registers haven't been flagged.
> > > 
> > > This changes uabi contract, because we previously allowed this.
> > > Neither nftables nor iptables-nft create such rules.
> > > 
> > > In case there is breakage, we could insert an 'store 0 to x'
> > > immediate expression into the ruleset automatically, but this
> > > isn't done here.
> > > 
> > > Let me know if you think the "refuse" approach is too risky.
> > 
> > Might the NFT_BREAK case defeat this approach? Sequence is:
> > 
> > 1) expression that writes on register hits NFT_BREAK (nothing is written)
> > 2) expression that read from register, it reads uninitialized data.
> >
> > From ruleset load step, we cannot know if the write fails, because it
> > is subject to NFT_BREAK.
> 
> Yes, but its irrelevant: If 1) issues NFT_BREAK, 2) won't execute.

And register tracking is done per rule, given context is per rule too,
good.

I wonder if it is worth to move the bitmask away from nft_ctx, given
this structure is stored in the struct nft_trans, hence increasing the
size of this object which is not required at a later state, maybe
there is a need for a new container structure that store data useful
for the initial preparation step of the commit protocol.



[Index of Archives]     [Netfitler Users]     [Berkeley Packet Filter]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux