NFQUEUE usage and interaction with later chain rules

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



  I'm in the middle of trying to implement some firewall bans based on
GeoIP data.  It seemed that implementing an NFQUEUE userspace helper
to do the lookups and decision making was the most feasible solution,
but I have run into some issues.  I can probably work around them,
but it does make this setup more fragile than I'd like.

  So, I'd like to ensure I'm properly understanding some things.

  1. The only practical verdicts the userspace helper can return are
  ACCEPT or DROP.  Checking through some documentation, examples, and
  kernel code I've come across 'STOLEN', 'QUEUE' and 'REPEAT', but I
  cannot find any actual documentation on what these might achieve.

  2. There appears to be no way to have an NFQUEUE rule act in a manner
  where the userspace verdict can cause subsequent rules in the chain to
  be considered.

    I'd specifically like my userspace helper to be able to say 'DROP',
  but otherwise allow rule evaluation to continue in the chain, rather
  than blindly accepting all else.

    If I could cause rule evaluation to jump to another chain that would
  also be acceptable, simply placing rules that would normally be later
  in the current chain into that one.

As a result I'm going to have to very carefully consider the nature and
position of my iptables chain rules:

  1. Anything else that should cause a packet to be DROPPED must have its
  rules come before the NFQUEUE one, else the 'not DROP' decision from
  the helper will cause packets to be accepted that should not be.

  2. Any rules that would otherwise cause ACCEPT of a packet need to
  come after the NFQUEUE one, else they're going to negate the filtering
  it implements.

  3. Because once the NFQUEUE rule is matched no other rules will even
  be considered, I need to construct this rule so that it matches only
  packets that don't need to be considered by subsequent rules.

    In my case this would mean, e.g. only matching on specific port
  numbers and forgoing usually later rules that would affect such
  packets.

  Oh, also I found `--queue-bypass` to ensure it's not a "fail close" if
there's no userspace helper listening to the queue... but this literally
turns the rule into an ACCEPT, rather than passing evaluation to later
rules.  Presumably the 'fail open' socket option, to not cause all
packets to be dropped if the queue buffer is filled, has the same issue.
It's then blind ACCEPT rather than "let later rules look at the packet".

  Is any of my understanding in error?  Can I actually implement this
how I'd prefer, with later rules being evaulated upon some specific
verdict returned from userspace ?

P.S. The 'Mailing Lists' part of https://netfilter.org/ is out of date.
It still points to the old Majordomo pages on vger.kernel.org.
Attempting to subscribe there elicited a reply stating to use
https://subspace.kernel.org/vger.kernel.org.html instead.
-- 
- Athanasius (he/him) = Athanasius(at)miggy.org / https://miggy.org/
                  GPG/PGP Key: https://miggy.org/gpg-key
	   "And it's me who is my enemy. Me who beats me up.
Me who makes the monsters. Me who strips my confidence." Paula Cole - ME




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux