From: Florian Westphal <fw@strlen.de>
To: nusiddiq@redhat.com
Cc: dev@openvswitch.org, netdev@vger.kernel.org, davem@davemloft.net,
Aaron Conole <aconole@redhat.com>,
Pravin B Shelar <pshelar@ovn.org>
Subject: Re: [PATCH net-next] net: openvswitch: Add support to lookup invalid packet in ct action.
Date: Tue, 6 Oct 2020 13:16:06 +0200 [thread overview]
Message-ID: <20201006111606.GA18203@breakpoint.cc> (raw)
In-Reply-To: <20201006083355.121018-1-nusiddiq@redhat.com>
nusiddiq@redhat.com <nusiddiq@redhat.com> wrote:
> From: Numan Siddique <nusiddiq@redhat.com>
>
> For a tcp packet which is part of an existing committed connection,
> nf_conntrack_in() will return err and set skb->_nfct to NULL if it is
> out of tcp window. ct action for this packet will set the ct_state
> to +inv which is as expected.
This is because from conntrack p.o.v., such TCP packet is NOT part of
the existing connection.
For example, because it is considered part of a previous incarnation
of the same connection.
> But a controller cannot add an OVS flow as
>
> table=21,priority=100,ct_state=+inv, actions=drop
>
> to drop such packets. That is because when ct action is executed on other
> packets which are not part of existing committed connections, ct_state
> can be set to invalid. Few such cases are:
> - ICMP reply packets.
Can you elaborate? Echo reply should not be invalid. Conntrack should
mark it as established (unless such echo reply came out of the blue).
> - TCP SYN/ACK packets during connection establishment.
SYN/ACK should also be established state.
INVALID should only be matched for packets that were never seen
by conntrack, or that are deemed out of date / corrupted.
> To distinguish between an invalid packet part of committed connection
> and others, this patch introduces as a new ct attribute
> OVS_CT_ATTR_LOOKUP_INV. If this is set in the ct action (without commit),
> it tries to find the ct entry and if present, sets the ct_state to
> +inv,+trk and also sets the mark and labels associated with the
> connection.
>
> With this, a controller can add flows like
>
> ....
> ....
> table=20,ip, action=ct(table=21, lookup_invalid)
> table=21,priority=100,ct_state=+inv+trk,ct_label=0x2/0x2 actions=drop
> table=21,ip, actions=resubmit(,22)
> ....
> ....
What exactly is the feature/problem that needs to be solved?
I suspect this would help me to provide better feedback than the
semi-random comments below .... :-)
My only problem with how conntrack does things ATM is that the ruleset
cannot distinguish:
1. packet was not even seen by conntrack
2. packet matches existing connection, but is "bad", for example:
- contradicting tcp flags
- out of window
- invalid checksum
There are a few sysctls to modify default behaviour, e.g. relax window
checks, or ignore/skip checksum validation.
The other problem i see (solveable for sure by yet-another-sysctl but i
see that as last-resort) is usual compatibility problem:
ct state invalid drop
ct mark gt 0 accept
If standard netfilter conntrack were to set skb->_nfct e.g. even if
state is invalid, we could still make the above work via some internal
flag.
But if you reverse it, you get different behaviour:
ct mark gt 0 accept
ct state invalid drop
First rule might now accept out-of-window packet even when "be_liberal"
sysctl is off.
next prev parent reply other threads:[~2020-10-06 11:16 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-10-06 8:33 [PATCH net-next] net: openvswitch: Add support to lookup invalid packet in ct action nusiddiq
2020-10-06 11:16 ` Florian Westphal [this message]
2020-10-06 12:19 ` Numan Siddique
2020-10-06 13:22 ` Numan Siddique
2020-10-06 18:52 ` Florian Westphal
2020-10-06 20:02 ` Numan Siddique
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20201006111606.GA18203@breakpoint.cc \
--to=fw@strlen.de \
--cc=aconole@redhat.com \
--cc=davem@davemloft.net \
--cc=dev@openvswitch.org \
--cc=netdev@vger.kernel.org \
--cc=nusiddiq@redhat.com \
--cc=pshelar@ovn.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).