* [nft PATCH] src: check if the set name is too long
@ 2014-03-20 16:20 Giuseppe Longo
2014-03-21 7:24 ` Tomasz Bursztyka
0 siblings, 1 reply; 9+ messages in thread
From: Giuseppe Longo @ 2014-03-20 16:20 UTC (permalink / raw)
To: netfilter-devel; +Cc: Giuseppe Longo
checks if the name of set is larger than 15 chars
before to add it.
If so, the set is not added and an error message is printed.
I didn't figure out why, but another error message is printed, see below:
nft add set ip test thenameofthissetistoolooong { type ipv4_address\; }
<cmdline>:1:17-43: Error: set name is too long (> 16)
add set ip test thenameofthissetistoolooong { type ipv4_address; }
^^^^^^^^^^^^^^^^^^^^^^^^^^^
<cmdline>:1:66-66: Error: syntax error, unexpected '}'
add set ip test thenameofthissetistoolooong { type ipv4_address; }
Signed-off-by: Giuseppe Longo <giuseppelng@gmail.com>
---
src/parser.y | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/src/parser.y b/src/parser.y
index db6f493..17fbd5e 100644
--- a/src/parser.y
+++ b/src/parser.y
@@ -15,6 +15,7 @@
#include <inttypes.h>
#include <netinet/ip.h>
#include <netinet/if_ether.h>
+#include <net/if.h>
#include <linux/netfilter.h>
#include <linux/netfilter/nf_tables.h>
#include <linux/netfilter/nf_conntrack_tuple_common.h>
@@ -986,6 +987,11 @@ chain_identifier : identifier
set_spec : table_spec identifier
{
+ if (strlen($2) > IFNAMSIZ) {
+ erec_queue(error(&@2, "set name too long (> %d)", IFNAMSIZ),
+ state->msgs);
+ YYERROR;
+ }
$$ = $1;
$$.set = $2;
}
@@ -993,6 +999,12 @@ set_spec : table_spec identifier
set_identifier : identifier
{
+ if (strlen($1) > IFNAMSIZ) {
+ erec_queue(error(&@1, "set name too long (> %d", IFNAMSIZ),
+ state->msgs);
+ YYERROR;
+ }
+
memset(&$$, 0, sizeof($$));
$$.set = $1;
}
--
1.8.3.2
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [nft PATCH] src: check if the set name is too long
2014-03-20 16:20 [nft PATCH] src: check if the set name is too long Giuseppe Longo
@ 2014-03-21 7:24 ` Tomasz Bursztyka
2014-03-21 9:56 ` Pablo Neira Ayuso
[not found] ` <CAG7Tj4qscXJbuMU+vFo10jFmk1Reu2x+C9WMDaFQskN1t3UZ2w@mail.gmail.com>
0 siblings, 2 replies; 9+ messages in thread
From: Tomasz Bursztyka @ 2014-03-21 7:24 UTC (permalink / raw)
To: Giuseppe Longo, netfilter-devel
Hi Giuseppe,
> checks if the name of set is larger than 15 chars
You mean 16 characters
Btw, have you tested 16 chars length name: when listing the set back,
is such name cut to 15 chars?
That sounds to be an issue from kernel side, at least looking quickly,
I could not find any code shortening this in libmnl, libnftnl or nftables.
Tomasz
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [nft PATCH] src: check if the set name is too long
2014-03-21 7:24 ` Tomasz Bursztyka
@ 2014-03-21 9:56 ` Pablo Neira Ayuso
[not found] ` <CAG7Tj4qscXJbuMU+vFo10jFmk1Reu2x+C9WMDaFQskN1t3UZ2w@mail.gmail.com>
1 sibling, 0 replies; 9+ messages in thread
From: Pablo Neira Ayuso @ 2014-03-21 9:56 UTC (permalink / raw)
To: Tomasz Bursztyka; +Cc: Giuseppe Longo, netfilter-devel
On Fri, Mar 21, 2014 at 09:24:47AM +0200, Tomasz Bursztyka wrote:
> Hi Giuseppe,
>
> >checks if the name of set is larger than 15 chars
>
> You mean 16 characters
>
> Btw, have you tested 16 chars length name: when listing the set back,
> is such name cut to 15 chars?
>
> That sounds to be an issue from kernel side, at least looking quickly,
> I could not find any code shortening this in libmnl, libnftnl or nftables.
The kernel is indeed limiting the name length in nf_tables_newset, see
nla_strcpy there.
^ permalink raw reply [flat|nested] 9+ messages in thread
[parent not found: <CAG7Tj4qscXJbuMU+vFo10jFmk1Reu2x+C9WMDaFQskN1t3UZ2w@mail.gmail.com>]
* [nft PATCH] src: check if the set name is too long
@ 2014-03-21 17:39 Giuseppe Longo
2014-03-24 14:57 ` Pablo Neira Ayuso
0 siblings, 1 reply; 9+ messages in thread
From: Giuseppe Longo @ 2014-03-21 17:39 UTC (permalink / raw)
To: netfilter-devel; +Cc: Giuseppe Longo
checks if the name of set is larger than 16 chars
before to add it.
If so, the set is not added and an error message is printed.
I didn't figure out why, but another error message is printed, see below:
nft add set ip test thenameofthissetistoolooong { type ipv4_address\; }
<cmdline>:1:17-43: Error: set name is too long (> 16)
add set ip test thenameofthissetistoolooong { type ipv4_address; }
^^^^^^^^^^^^^^^^^^^^^^^^^^^
<cmdline>:1:66-66: Error: syntax error, unexpected '}'
add set ip test thenameofthissetistoolooong { type ipv4_address; }
Signed-off-by: Giuseppe Longo <giuseppelng@gmail.com>
---
src/parser.y | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/src/parser.y b/src/parser.y
index db6f493..17fbd5e 100644
--- a/src/parser.y
+++ b/src/parser.y
@@ -15,6 +15,7 @@
#include <inttypes.h>
#include <netinet/ip.h>
#include <netinet/if_ether.h>
+#include <net/if.h>
#include <linux/netfilter.h>
#include <linux/netfilter/nf_tables.h>
#include <linux/netfilter/nf_conntrack_tuple_common.h>
@@ -986,6 +987,11 @@ chain_identifier : identifier
set_spec : table_spec identifier
{
+ if (strlen($2) > IFNAMSIZ) {
+ erec_queue(error(&@2, "set name too long (> %d)", IFNAMSIZ),
+ state->msgs);
+ YYERROR;
+ }
$$ = $1;
$$.set = $2;
}
@@ -993,6 +999,12 @@ set_spec : table_spec identifier
set_identifier : identifier
{
+ if (strlen($1) > IFNAMSIZ) {
+ erec_queue(error(&@1, "set name too long (> %d", IFNAMSIZ),
+ state->msgs);
+ YYERROR;
+ }
+
memset(&$$, 0, sizeof($$));
$$.set = $1;
}
--
1.8.3.2
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [nft PATCH] src: check if the set name is too long
2014-03-21 17:39 Giuseppe Longo
@ 2014-03-24 14:57 ` Pablo Neira Ayuso
2014-03-25 7:37 ` Tomasz Bursztyka
0 siblings, 1 reply; 9+ messages in thread
From: Pablo Neira Ayuso @ 2014-03-24 14:57 UTC (permalink / raw)
To: Giuseppe Longo; +Cc: netfilter-devel
On Fri, Mar 21, 2014 at 06:39:00PM +0100, Giuseppe Longo wrote:
> checks if the name of set is larger than 16 chars
> before to add it.
> If so, the set is not added and an error message is printed.
>
> I didn't figure out why, but another error message is printed, see below:
>
> nft add set ip test thenameofthissetistoolooong { type ipv4_address\; }
> <cmdline>:1:17-43: Error: set name is too long (> 16)
> add set ip test thenameofthissetistoolooong { type ipv4_address; }
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^
> <cmdline>:1:66-66: Error: syntax error, unexpected '}'
> add set ip test thenameofthissetistoolooong { type ipv4_address; }
I sent you a patch, I think it's better if we fix this from
kernel-space.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [nft PATCH] src: check if the set name is too long
2014-03-24 14:57 ` Pablo Neira Ayuso
@ 2014-03-25 7:37 ` Tomasz Bursztyka
2014-03-25 8:41 ` Pablo Neira Ayuso
0 siblings, 1 reply; 9+ messages in thread
From: Tomasz Bursztyka @ 2014-03-25 7:37 UTC (permalink / raw)
To: Pablo Neira Ayuso, Giuseppe Longo; +Cc: netfilter-devel
Hi Pablo,
> I sent you a patch, I think it's better if we fix this from
> kernel-space.
I think it's also good if we check the length when parsing, as Giuseppe did.
Then it reduce the overhead: the error is detected way before we process
anything through netlink.
Of course here it should be IFNAMSIZ-1.
Giuseppe: could you resubmit your patch fixed ?
About the parsing error on unexpected '}' I believe it's another issue
the patch revealed somehow. (state->msgs issue?).
Tomasz
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [nft PATCH] src: check if the set name is too long
2014-03-25 7:37 ` Tomasz Bursztyka
@ 2014-03-25 8:41 ` Pablo Neira Ayuso
2014-03-25 8:47 ` Pablo Neira Ayuso
0 siblings, 1 reply; 9+ messages in thread
From: Pablo Neira Ayuso @ 2014-03-25 8:41 UTC (permalink / raw)
To: Tomasz Bursztyka; +Cc: Giuseppe Longo, netfilter-devel
On Tue, Mar 25, 2014 at 09:37:24AM +0200, Tomasz Bursztyka wrote:
> Hi Pablo,
>
> >I sent you a patch, I think it's better if we fix this from
> >kernel-space.
>
> I think it's also good if we check the length when parsing, as Giuseppe did.
> Then it reduce the overhead: the error is detected way before we
> process anything through netlink.
This is an error case, I don't think we should focus on reducing
overhead in those scenarios.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [nft PATCH] src: check if the set name is too long
2014-03-25 8:41 ` Pablo Neira Ayuso
@ 2014-03-25 8:47 ` Pablo Neira Ayuso
0 siblings, 0 replies; 9+ messages in thread
From: Pablo Neira Ayuso @ 2014-03-25 8:47 UTC (permalink / raw)
To: Tomasz Bursztyka; +Cc: Giuseppe Longo, netfilter-devel
On Tue, Mar 25, 2014 at 09:41:31AM +0100, Pablo Neira Ayuso wrote:
> On Tue, Mar 25, 2014 at 09:37:24AM +0200, Tomasz Bursztyka wrote:
> > Hi Pablo,
> >
> > >I sent you a patch, I think it's better if we fix this from
> > >kernel-space.
> >
> > I think it's also good if we check the length when parsing, as Giuseppe did.
> > Then it reduce the overhead: the error is detected way before we
> > process anything through netlink.
>
> This is an error case, I don't think we should focus on reducing
> overhead in those scenarios.
Just to extend this. I prefer this limit is also set in kernelspace so
in case we ever remove it, we won't have to wait until a new nft
userspace tool version is released.
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2014-03-25 8:47 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-03-20 16:20 [nft PATCH] src: check if the set name is too long Giuseppe Longo
2014-03-21 7:24 ` Tomasz Bursztyka
2014-03-21 9:56 ` Pablo Neira Ayuso
[not found] ` <CAG7Tj4qscXJbuMU+vFo10jFmk1Reu2x+C9WMDaFQskN1t3UZ2w@mail.gmail.com>
2014-03-21 10:43 ` Tomasz Bursztyka
-- strict thread matches above, loose matches on Subject: below --
2014-03-21 17:39 Giuseppe Longo
2014-03-24 14:57 ` Pablo Neira Ayuso
2014-03-25 7:37 ` Tomasz Bursztyka
2014-03-25 8:41 ` Pablo Neira Ayuso
2014-03-25 8:47 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).