From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Florian Westphal <fw@strlen.de>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: [PATCH nf] netfilter: nat: remove incorrect debug assert
Date: Tue, 21 Feb 2017 16:54:35 +0100 [thread overview]
Message-ID: <20170221155435.GA5392@salvia> (raw)
In-Reply-To: <20170221144019.GD9708@breakpoint.cc>
On Tue, Feb 21, 2017 at 03:40:19PM +0100, Florian Westphal wrote:
> Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> > On Wed, Feb 08, 2017 at 11:14:29PM +0100, Florian Westphal wrote:
> > > The comment is incorrect, this function does see fragments when
> > > IP_NODEFRAG is used. Remove the wrong assertion.
> > >
> > > As conntrack doesn't track fragments skb->nfct will be null
> > > and no nat is performed.
> >
> > With IP_NODEFRAG, ipv4_conntrack_defrag() will just accept the packet.
> >
> > So the first fragment will get into nf_conntrack_in(), and I think, if
> > enough information is there in place, it will get a ct object.
>
> ipv4_get_l4proto():
> if (iph->frag_off & htons(IP_OFFSET))
> return -NF_ACCEPT;
>
> so yes, you are right, first packet will be tracked in this case.
With NAT in place, this also means the first packet of a flow gets
mangled, while follow up don't.
Probably change that spot above to use ip_is_fragment()?
> > up fragments with offset != 0 which doesn't contain headers will
> > definitely not get a ct object.
> >
> > Shouldn't handle case this by attaching a template conntrack?
> > Currently this IP_NODEFRAG case is going through as invalid traffic.
> >
> > My impression is that we're handling this case in a sloppy way, am I
> > missing anything?
>
> What would you do instead?
>
> We currently have a suboptimal handling of such cases, but I don't see
> how we can change it without (possibly) breaking existing setups.
AFAIK, only IP_NODEFRAG locally generated packets would get affected.
I wonder how this option is used (network testing?). I cannot come up
with any reasonable stateful ruleset that may work with this. With a
stateful ruleset in place, the first packet will go through and follow
up would be INVALID. There are tons of rulesets outthere simply
logging and dropping invalid ones.
Look, the first packet create an entry in SYN_SENT state, that just
expires later on.
> I also don't see how alternative handling is 'better'.
We could just handle all the packets in a flow in the same way, so
they all go through INVALID.
next prev parent reply other threads:[~2017-02-21 15:54 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-08 22:14 [PATCH nf] netfilter: nat: remove incorrect debug assert Florian Westphal
2017-02-21 14:09 ` Pablo Neira Ayuso
2017-02-21 14:40 ` Florian Westphal
2017-02-21 15:54 ` Pablo Neira Ayuso [this message]
2017-03-03 11:55 ` Pablo Neira Ayuso
2017-03-03 12:44 ` Florian Westphal
2017-03-03 12:47 ` Pablo Neira Ayuso
2017-03-03 19:40 ` Jozsef Kadlecsik
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170221155435.GA5392@salvia \
--to=pablo@netfilter.org \
--cc=fw@strlen.de \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).