netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] NAT and requests to unrouted targets
@ 2007-03-15  8:03 Martin Schiller
  2007-03-15  8:51 ` Patrick McHardy
  0 siblings, 1 reply; 7+ messages in thread
From: Martin Schiller @ 2007-03-15  8:03 UTC (permalink / raw)
  To: netdev

[-- Attachment #1: Type: text/plain, Size: 277 bytes --]


This patch changes the behaivor of the iptables nat module to the style
before release 2.6.16 so it is possible again to use the "ping -I <iface>
<target>" command to send icmp requests to a target for which no route
exists.

Signed-off-by: Martin Schiller <mschiller@tdt.de>

[-- Attachment #2: iptables_nat_unrouted_ping.patch --]
[-- Type: application/octet-stream, Size: 811 bytes --]

diff -uNpr linux-2.6.19.org/net/ipv4/netfilter/ip_nat_standalone.c linux-2.6.19/net/ipv4/netfilter/ip_nat_standalone.c
--- linux-2.6.19.org/net/ipv4/netfilter/ip_nat_standalone.c	2006-11-29 22:57:37.000000000 +0100
+++ linux-2.6.19/net/ipv4/netfilter/ip_nat_standalone.c	2007-03-15 08:25:11.000000000 +0100
@@ -191,11 +191,13 @@ ip_nat_in(unsigned int hooknum,
           int (*okfn)(struct sk_buff *))
 {
 	unsigned int ret;
+	__be32 saddr = (*pskb)->nh.iph->saddr;
 	__be32 daddr = (*pskb)->nh.iph->daddr;
 
 	ret = ip_nat_fn(hooknum, pskb, in, out, okfn);
 	if (ret != NF_DROP && ret != NF_STOLEN
-	    && daddr != (*pskb)->nh.iph->daddr) {
+	    && ((*pskb)->nh.iph->saddr != saddr
+	        || (*pskb)->nh.iph->daddr != daddr)) {
 		dst_release((*pskb)->dst);
 		(*pskb)->dst = NULL;
 	}

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] NAT and requests to unrouted targets
  2007-03-15  8:03 [PATCH] NAT and requests to unrouted targets Martin Schiller
@ 2007-03-15  8:51 ` Patrick McHardy
  2007-03-15 14:54   ` Martin Schiller
  0 siblings, 1 reply; 7+ messages in thread
From: Patrick McHardy @ 2007-03-15  8:51 UTC (permalink / raw)
  To: Martin Schiller; +Cc: netdev, Netfilter Development Mailinglist

Martin Schiller wrote:
> This patch changes the behaivor of the iptables nat module to the style
> before release 2.6.16 so it is possible again to use the "ping -I <iface>
> <target>" command to send icmp requests to a target for which no route
> exists.

Please attach patches inline and send netfilter related patches to
netfilter-devel@lists.netfilter.org.

Quoted for reference:

diff -uNpr linux-2.6.19.org/net/ipv4/netfilter/ip_nat_standalone.c
linux-2.6.19/net/ipv4/netfilter/ip_nat_standalone.c
--- linux-2.6.19.org/net/ipv4/netfilter/ip_nat_standalone.c
2006-11-29 22:57:37.000000000 +0100
+++ linux-2.6.19/net/ipv4/netfilter/ip_nat_standalone.c 2007-03-15
08:25:11.000000000 +0100
@@ -191,11 +191,13 @@ ip_nat_in(unsigned int hooknum,
           int (*okfn)(struct sk_buff *))
 {
        unsigned int ret;
+       __be32 saddr = (*pskb)->nh.iph->saddr;
        __be32 daddr = (*pskb)->nh.iph->daddr;

        ret = ip_nat_fn(hooknum, pskb, in, out, okfn);
        if (ret != NF_DROP && ret != NF_STOLEN
-           && daddr != (*pskb)->nh.iph->daddr) {
+           && ((*pskb)->nh.iph->saddr != saddr
+               || (*pskb)->nh.iph->daddr != daddr)) {
                dst_release((*pskb)->dst);
                (*pskb)->dst = NULL;
        }

I don't see how this would change anything, the PRE_ROUTING hook
doesn't change the source address, so the comparison is unnecessary,
additionally the dst_release is only needed for loopback because
packets received from a real interface don't have a route attached
at this time.


^ permalink raw reply	[flat|nested] 7+ messages in thread

* RE: [PATCH] NAT and requests to unrouted targets
  2007-03-15  8:51 ` Patrick McHardy
@ 2007-03-15 14:54   ` Martin Schiller
  2007-03-16  4:13     ` Patrick McHardy
  2007-03-19 16:02     ` Patrick McHardy
  0 siblings, 2 replies; 7+ messages in thread
From: Martin Schiller @ 2007-03-15 14:54 UTC (permalink / raw)
  To: 'Patrick McHardy'
  Cc: netdev, 'Netfilter Development Mailinglist'

On Thursday, March 15, 2007 9:51 AM, Patrick McHardy wrote:

> diff -uNpr linux-2.6.19.org/net/ipv4/netfilter/ip_nat_standalone.c
> linux-2.6.19/net/ipv4/netfilter/ip_nat_standalone.c
> --- linux-2.6.19.org/net/ipv4/netfilter/ip_nat_standalone.c
> 2006-11-29 22:57:37.000000000 +0100
> +++ linux-2.6.19/net/ipv4/netfilter/ip_nat_standalone.c 2007-03-15
> 08:25:11.000000000 +0100
> @@ -191,11 +191,13 @@ ip_nat_in(unsigned int hooknum,
>            int (*okfn)(struct sk_buff *))  {
>         unsigned int ret;
> +       __be32 saddr = (*pskb)->nh.iph->saddr;
>         __be32 daddr = (*pskb)->nh.iph->daddr;
> 
>         ret = ip_nat_fn(hooknum, pskb, in, out, okfn);
>         if (ret != NF_DROP && ret != NF_STOLEN
> -           && daddr != (*pskb)->nh.iph->daddr) {
> +           && ((*pskb)->nh.iph->saddr != saddr
> +               || (*pskb)->nh.iph->daddr != daddr)) {
>                 dst_release((*pskb)->dst);
>                 (*pskb)->dst = NULL;
>         }
> 
> I don't see how this would change anything, the PRE_ROUTING hook
> doesn't change the source address, so the comparison is unnecessary,
> additionally the dst_release is only needed for loopback because
> packets received from a real interface don't have a route attached at
> this time.    

Sorry, you are right. This wouldn't change anything.
I've tested so much to find the responsible peace of code for my problem, so
i messed up some things here.

Well, the really responsible code is the following:

------------------------------------------------------------------------
static unsigned int
ip_nat_local_fn(unsigned int hooknum,
		struct sk_buff **pskb,
		const struct net_device *in,
		const struct net_device *out,
		int (*okfn)(struct sk_buff *))
{
	struct ip_conntrack *ct;
	enum ip_conntrack_info ctinfo;
	unsigned int ret;

	/* root is playing with raw sockets. */
	if ((*pskb)->len < sizeof(struct iphdr)
	    || (*pskb)->nh.iph->ihl * 4 < sizeof(struct iphdr))
		return NF_ACCEPT;

	ret = ip_nat_fn(hooknum, pskb, in, out, okfn);
	if (ret != NF_DROP && ret != NF_STOLEN
	    && (ct = ip_conntrack_get(*pskb, &ctinfo)) != NULL) {
		enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);

		if (ct->tuplehash[dir].tuple.dst.ip !=
		    ct->tuplehash[!dir].tuple.src.ip
#ifdef CONFIG_XFRM
		    || ct->tuplehash[dir].tuple.dst.u.all !=
		       ct->tuplehash[!dir].tuple.src.u.all
#endif
		    )
			if (ip_route_me_harder(pskb, RTN_UNSPEC))
				ret = NF_DROP;
	}
	return ret;
}
----------------------------------------------------------------------------

To be more exactly, it's the examination of
"ct->tuplehash[dir].tuple.dst.u.all != ct->tuplehash[!dir].tuple.src.u.all"
which is only be done if XFRM is configured. Since I don't need this anyway,
I deactivated XFRM now and my "ping -I" is working now. 

Regards, Martin



^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] NAT and requests to unrouted targets
  2007-03-15 14:54   ` Martin Schiller
@ 2007-03-16  4:13     ` Patrick McHardy
  2007-03-19 16:02     ` Patrick McHardy
  1 sibling, 0 replies; 7+ messages in thread
From: Patrick McHardy @ 2007-03-16  4:13 UTC (permalink / raw)
  To: Martin Schiller; +Cc: netdev, 'Netfilter Development Mailinglist'

Martin Schiller wrote:
> Well, the really responsible code is the following:
> 
> ------------------------------------------------------------------------
> static unsigned int
> ip_nat_local_fn(unsigned int hooknum,
> 		struct sk_buff **pskb,
> 		const struct net_device *in,
> 		const struct net_device *out,
> 		int (*okfn)(struct sk_buff *))
> {
> 	struct ip_conntrack *ct;
> 	enum ip_conntrack_info ctinfo;
> 	unsigned int ret;
> 
> 	/* root is playing with raw sockets. */
> 	if ((*pskb)->len < sizeof(struct iphdr)
> 	    || (*pskb)->nh.iph->ihl * 4 < sizeof(struct iphdr))
> 		return NF_ACCEPT;
> 
> 	ret = ip_nat_fn(hooknum, pskb, in, out, okfn);
> 	if (ret != NF_DROP && ret != NF_STOLEN
> 	    && (ct = ip_conntrack_get(*pskb, &ctinfo)) != NULL) {
> 		enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
> 
> 		if (ct->tuplehash[dir].tuple.dst.ip !=
> 		    ct->tuplehash[!dir].tuple.src.ip
> #ifdef CONFIG_XFRM
> 		    || ct->tuplehash[dir].tuple.dst.u.all !=
> 		       ct->tuplehash[!dir].tuple.src.u.all
> #endif
> 		    )
> 			if (ip_route_me_harder(pskb, RTN_UNSPEC))
> 				ret = NF_DROP;
> 	}
> 	return ret;
> }
> ----------------------------------------------------------------------------
> 
> To be more exactly, it's the examination of
> "ct->tuplehash[dir].tuple.dst.u.all != ct->tuplehash[!dir].tuple.src.u.all"
> which is only be done if XFRM is configured. Since I don't need this anyway,
> I deactivated XFRM now and my "ping -I" is working now. 


You're right, that doesn't really work for ICMP since the tuples are
asymetric even without NAT. I didn't expect the unnecessary call to
ip_route_me_harder to have any side-effects. I'll look into fixing
this properly.


^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] NAT and requests to unrouted targets
  2007-03-15 14:54   ` Martin Schiller
  2007-03-16  4:13     ` Patrick McHardy
@ 2007-03-19 16:02     ` Patrick McHardy
  2007-03-20 11:56       ` Martin Schiller
  1 sibling, 1 reply; 7+ messages in thread
From: Patrick McHardy @ 2007-03-19 16:02 UTC (permalink / raw)
  To: Martin Schiller; +Cc: netdev, 'Netfilter Development Mailinglist'

[-- Attachment #1: Type: text/plain, Size: 369 bytes --]

Martin Schiller wrote:
> To be more exactly, it's the examination of
> "ct->tuplehash[dir].tuple.dst.u.all != ct->tuplehash[!dir].tuple.src.u.all"
> which is only be done if XFRM is configured. Since I don't need this anyway,
> I deactivated XFRM now and my "ping -I" is working now. 


Could you try this patch (against current -git) with CONFIG_XFRM
enabled please?


[-- Attachment #2: x --]
[-- Type: text/plain, Size: 1705 bytes --]

diff --git a/net/ipv4/netfilter/ip_nat_standalone.c b/net/ipv4/netfilter/ip_nat_standalone.c
index adf25f9..6bcfdf6 100644
--- a/net/ipv4/netfilter/ip_nat_standalone.c
+++ b/net/ipv4/netfilter/ip_nat_standalone.c
@@ -253,14 +253,17 @@ ip_nat_local_fn(unsigned int hooknum,
 		enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
 
 		if (ct->tuplehash[dir].tuple.dst.ip !=
-		    ct->tuplehash[!dir].tuple.src.ip
-#ifdef CONFIG_XFRM
-		    || ct->tuplehash[dir].tuple.dst.u.all !=
-		       ct->tuplehash[!dir].tuple.src.u.all
-#endif
-		    )
+		    ct->tuplehash[!dir].tuple.src.ip) {
 			if (ip_route_me_harder(pskb, RTN_UNSPEC))
 				ret = NF_DROP;
+		}
+#ifdef CONFIG_XFRM
+		else if (ct->tuplehash[dir].tuple.dst.u.all !=
+			 ct->tuplehash[!dir].tuple.src.u.all)
+			if (ip_xfrm_me_harder(pskb))
+				ret = NF_DROP;
+#endif
+
 	}
 	return ret;
 }
diff --git a/net/ipv4/netfilter/nf_nat_standalone.c b/net/ipv4/netfilter/nf_nat_standalone.c
index e4d3ef1..15aa3db 100644
--- a/net/ipv4/netfilter/nf_nat_standalone.c
+++ b/net/ipv4/netfilter/nf_nat_standalone.c
@@ -245,14 +245,16 @@ nf_nat_local_fn(unsigned int hooknum,
 		enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
 
 		if (ct->tuplehash[dir].tuple.dst.u3.ip !=
-		    ct->tuplehash[!dir].tuple.src.u3.ip
-#ifdef CONFIG_XFRM
-		    || ct->tuplehash[dir].tuple.dst.u.all !=
-		       ct->tuplehash[!dir].tuple.src.u.all
-#endif
-		    )
+		    ct->tuplehash[!dir].tuple.src.u3.ip) {
 			if (ip_route_me_harder(pskb, RTN_UNSPEC))
 				ret = NF_DROP;
+		}
+#ifdef CONFIG_XFRM
+		else if (ct->tuplehash[dir].tuple.dst.u.all !=
+			 ct->tuplehash[!dir].tuple.src.u.all)
+			if (ip_xfrm_me_harder(pskb))
+				ret = NF_DROP;
+#endif
 	}
 	return ret;
 }

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* RE: [PATCH] NAT and requests to unrouted targets
  2007-03-19 16:02     ` Patrick McHardy
@ 2007-03-20 11:56       ` Martin Schiller
  2007-03-20 12:34         ` Patrick McHardy
  0 siblings, 1 reply; 7+ messages in thread
From: Martin Schiller @ 2007-03-20 11:56 UTC (permalink / raw)
  To: 'Patrick McHardy'
  Cc: netdev, 'Netfilter Development Mailinglist'

On Monday, March 19, 2007 5:02 PM, Patrick McHardy wrote:

> Martin Schiller wrote:
>> To be more exactly, it's the examination of
>> "ct->tuplehash[dir].tuple.dst.u.all !=
>> ct->tuplehash[!dir].tuple.src.u.all" which is only be done if XFRM
>> is configured. Since I don't need this anyway, I deactivated XFRM
>> now and my "ping -I" is working now. 
> 
> 
> Could you try this patch (against current -git) with CONFIG_XFRM
> enabled please? 

I've tried it and the ping is still working now with enabled CONFIG_XFRM.

Thanks for the patch.

Regards,
Martin



^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] NAT and requests to unrouted targets
  2007-03-20 11:56       ` Martin Schiller
@ 2007-03-20 12:34         ` Patrick McHardy
  0 siblings, 0 replies; 7+ messages in thread
From: Patrick McHardy @ 2007-03-20 12:34 UTC (permalink / raw)
  To: Martin Schiller; +Cc: netdev, 'Netfilter Development Mailinglist'

Martin Schiller wrote:
> On Monday, March 19, 2007 5:02 PM, Patrick McHardy wrote:
> 
>>Could you try this patch (against current -git) with CONFIG_XFRM
>>enabled please? 
> 
> 
> I've tried it and the ping is still working now with enabled CONFIG_XFRM.
> 
> Thanks for the patch.


Thanks for testing, I'll push it upstream soon.

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2007-03-20 12:34 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-03-15  8:03 [PATCH] NAT and requests to unrouted targets Martin Schiller
2007-03-15  8:51 ` Patrick McHardy
2007-03-15 14:54   ` Martin Schiller
2007-03-16  4:13     ` Patrick McHardy
2007-03-19 16:02     ` Patrick McHardy
2007-03-20 11:56       ` Martin Schiller
2007-03-20 12:34         ` Patrick McHardy

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).