From: Phil Sutter <phil@nwl.cc>
To: Florian Westphal <fw@strlen.de>
Cc: Pablo Neira Ayuso <pablo@netfilter.org>, netfilter-devel@vger.kernel.org
Subject: Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
Date: Thu, 11 May 2017 10:27:46 +0200 [thread overview]
Message-ID: <20170511082746.GA20805@orbyte.nwl.cc> (raw)
In-Reply-To: <20170511065927.GI16263@breakpoint.cc>
On Thu, May 11, 2017 at 08:59:27AM +0200, Florian Westphal wrote:
> Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> > What is the usecase for this? Please don't tell me the obvious the
> > answer: I just want to know what process has modified what.
> >
> > If the point is to know if someone else, not myself as a process, has
> > modified the ruleset, that is very easy to know with the netlink
> > infrastructure.
>
> Yes, thats in fact more important than 'know what process has modified
> what', although I think it would be nice from a debug-point of view,
> i.e.
>
> $self adds a rule
> something else adds a rule at same time
>
> How can $self learn/know the handle assigned by kernel?
>
> The larger picture is to start thinking in direction of libnft,
> i.e. get the groundwork going so we don't have to tell 3rd party tools
> like firewalld to parse nft text output.
Which is a rather pointless argument regarding the monitor changes -
neither parsing 'nft monitor' nor 'nft -a list ruleset' output is a
particularly good option. Assuming that there will be at least optional
NLM_F_ECHO in libnftables[1], programs will receive the handles for the
rules they add, probably even along with the full rule depending on the
yet to define API.
> Ideally, I'd like to see a mechanism where the 3rd party tool can:
> 1. queue an arbitrary amount of updates (add/delete of rules, set
> elements etc.)
> 2. learn the unique handles assigned to these rules
> so that it can identifiy/remove each one of these rules.
>
> Thomas Woerner suggested a way where userspace can assign unique handles
> instead of the kernel but I don't like it because i found no way how the
> kernel could enforce that such user-handles are unique without walking
> all rules of a table for every transaction.
>
> But currently its impossible to delete a rule again without parsing
> 'nft -a list table'. 'delete-by-name' is good of course, but, has
> the same problems we have with iptables. I like that we have unique
> handles that would allow to 1:1 map every rule to a uniqeue identifier.
My point with all this is that delete-by-name simply doesn't exist yet,
and given the obstacles it will face I guess it will take a little while
until it's there. My synchronous handle output patch and these 'nft
monitor' enhancements will provide an alternative at least until
delete-by-name is there and actually usable. Also I don't know of a
single point why not both ways should be made available - it only
increases acceptance in users, which is a good thing per se.
> But right now its more of a guessing game as the inserting program
> doesn't see the handle(s) synchronously, just via monitor.
This is only reliable if a project uses libnftnl directly and hence
knows it's own portid.
Cheers, Phil
[1] I prefer the longer name just because it's more different to
libnftnl than just 'libnft'.
next prev parent reply other threads:[~2017-05-11 8:27 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-05-10 10:55 [nft PATCH RFC] monitor: Support printing processes which caused the event Phil Sutter
2017-05-10 11:27 ` Florian Westphal
2017-05-10 11:38 ` Pablo Neira Ayuso
2017-05-10 11:57 ` Florian Westphal
2017-05-10 14:39 ` Phil Sutter
2017-05-10 14:54 ` Florian Westphal
2017-05-10 15:11 ` Phil Sutter
2017-05-10 17:59 ` Florian Westphal
2017-05-11 6:41 ` Pablo Neira Ayuso
2017-05-11 6:59 ` Florian Westphal
2017-05-11 8:27 ` Phil Sutter [this message]
2017-05-11 9:58 ` Pablo Neira Ayuso
2017-05-11 9:59 ` Pablo Neira Ayuso
2017-05-10 11:34 ` Pablo Neira Ayuso
2017-05-10 12:52 ` Arturo Borrero Gonzalez
2017-05-10 14:02 ` Phil Sutter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170511082746.GA20805@orbyte.nwl.cc \
--to=phil@nwl.cc \
--cc=fw@strlen.de \
--cc=netfilter-devel@vger.kernel.org \
--cc=pablo@netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).