From: Jakub Kicinski <kuba@kernel.org>
To: Florian Westphal <fw@strlen.de>
Cc: Pablo Neira Ayuso <pablo@netfilter.org>,
Chris Clayton <chris2553@googlemail.com>,
"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
regressions@lists.linux.dev, netfilter-devel@vger.kernel.org,
coreteam@netfilter.org
Subject: Re: removing conntrack helper toggle to enable auto-assignment [was Re: b118509076b3 (probably) breaks my firewall]
Date: Mon, 19 Sep 2022 13:57:15 -0700 [thread overview]
Message-ID: <20220919135715.6057331d@kernel.org> (raw)
In-Reply-To: <20220919202310.GA3498@breakpoint.cc>
On Mon, 19 Sep 2022 22:23:10 +0200 Florian Westphal wrote:
> Jakub Kicinski <kuba@kernel.org> wrote:
> > On Sat, 10 Sep 2022 04:02:18 +0200 Pablo Neira Ayuso wrote:
> > > Disagreed, reverting and waiting for one more release cycle will just
> > > postpone the fact that users must adapt their policies, and that they
> > > rely on a configuration which is not secure.
> >
> > What are the chances the firewall actually needs the functionality?
>
> Unknown, there is no way to tell.
Chris, is your firewall based on some project or a loose bunch of
scripts you wrote?
I had little exposure to NF/conntrack in my career but I was guessing
for most users one of the two cases:
- the system is professionally (i.e. someone is paid) maintained,
so they should have noticed the warning and fixed in the last 10 yrs
- the system is a basic SOHO setup which is highly unlikely to see much
more than TLS or QUIC these days
IOW the intersection of complex traffic and lack of maintenance is
small.
> In old times, it was enough (not tested, just for illustration):
>
> iptables -A FORWARD -p tcp -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
>
> and load nf_conntrack_ftp (or whatever). Module will auto-snoop traffic
> on tcp port 21 for ftp commands, if it finds some, it auto-installs dynamic
> 'expectation entries', so when data connection comes it will hit RELATED rule
> above.
>
> This stopped working years ago, unless you did set the (now removed)
> knob back to 1.
>
> Assuming iptables, users would need to do something like
> iptables -t raw -A PREROUTING -p tcp --dport 21 -d $ftpaddr -j CT --helper "ftp"
>
> to tell that packets/connections on tcp:21 need to be examined for ftp commands.
Thanks for the explainer!
> > Perhaps we can add the file back but have it do nothing?
>
> I think its even worse, users would think that auto-assign is enabled.
Well, users should do the bare minimum of reading kernel logs :(
I think we should do _something_ because we broke so many things
in this release if we let this rot until its smell reaches Linus -
someone is getting yelled at...
Now, Linus is usually okay with breaking uAPI if there is no other
way of preventing a security issue. But (a) we break autoload of
all helpers and we only have security issue in one, and (b) not loading
the module doesn't necessarily mean removing the file (at least IMHO).
We have a bunch of dead files in proc already, although perhaps the
examples I can think of are tunables.
next prev parent reply other threads:[~2022-09-19 20:57 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-08 19:13 b118509076b3 (probably) breaks my firewall Chris Clayton
2022-09-08 19:19 ` Florian Westphal
2022-09-08 21:22 ` Chris Clayton
2022-09-08 21:48 ` Florian Westphal
2022-09-09 10:19 ` Pablo Neira Ayuso
2022-09-09 18:21 ` Chris Clayton
2022-09-09 18:31 ` Chris Clayton
2022-09-10 2:02 ` removing conntrack helper toggle to enable auto-assignment [was Re: b118509076b3 (probably) breaks my firewall] Pablo Neira Ayuso
2022-09-10 3:49 ` Willy Tarreau
2022-09-19 19:40 ` Jakub Kicinski
2022-09-19 20:23 ` Florian Westphal
2022-09-19 20:57 ` Jakub Kicinski [this message]
2022-09-19 21:27 ` Florian Westphal
2022-09-20 6:49 ` Chris Clayton
2022-09-20 9:01 ` Thorsten Leemhuis
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220919135715.6057331d@kernel.org \
--to=kuba@kernel.org \
--cc=chris2553@googlemail.com \
--cc=coreteam@netfilter.org \
--cc=fw@strlen.de \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=pablo@netfilter.org \
--cc=regressions@lists.linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).