From: Stefano Brivio <sbrivio@redhat.com>
To: Jozsef Kadlecsik <kadlec@netfilter.org>
Cc: netfilter-devel@vger.kernel.org, Mithil Mhatre <mmhatre@redhat.com>
Subject: Re: [PATCH] ipset: Update byte and packet counters regardless of whether they match
Date: Tue, 3 Mar 2020 23:16:46 +0100 [thread overview]
Message-ID: <20200303231646.472e982e@elisabeth> (raw)
In-Reply-To: <alpine.DEB.2.20.2003031020330.3731@blackhole.kfki.hu>
Hi József,
On Tue, 3 Mar 2020 10:36:53 +0100 (CET)
Jozsef Kadlecsik <kadlec@netfilter.org> wrote:
> Hi Stefano,
>
> On Fri, 28 Feb 2020, Stefano Brivio wrote:
>
> > On Thu, 27 Feb 2020 21:37:10 +0100 (CET)
> > Jozsef Kadlecsik <kadlec@netfilter.org> wrote:
> >
> > > On Tue, 25 Feb 2020, Stefano Brivio wrote:
> > >
> > > > On Tue, 25 Feb 2020 21:37:45 +0100 (CET)
> > > > Jozsef Kadlecsik <kadlec@netfilter.org> wrote:
> > > >
> > > > > On Tue, 25 Feb 2020, Stefano Brivio wrote:
> > > > >
> > > > > > > The logic could be changed in the user rules from
> > > > > > >
> > > > > > > iptables -I INPUT -m set --match-set c src --bytes-gt 800 -j DROP
> > > > > > >
> > > > > > > to
> > > > > > >
> > > > > > > iptables -I INPUT -m set --match-set c src --bytes-lt 800 -j ACCEPT
> > > > > > > [ otherwise DROP ]
> > > > > > >
> > > > > > > but of course it might be not so simple, depending on how the rules are
> > > > > > > built up.
> > > > > >
> > > > > > Yes, it would work, unless the user actually wants to check with the
> > > > > > same counter how many bytes are sent "in excess".
> > > > >
> > > > > You mean the counters are still updated whenever the element is matched in
> > > > > the set and then one could check how many bytes were sent over the
> > > > > threshold just by listing the set elements.
> > > >
> > > > Yes, exactly -- note that it was possible (and, I think, used) before.
> > >
> > > I'm still not really convinced about such a feature. Why is it useful to
> > > know how many bytes would be sent over the "limit"?
> >
> > This is useful in case one wants different treatments for packets
> > according to a number of thresholds in different rules. For example,
> >
> > iptables -I INPUT -m set --match-set c src --bytes-lt 100 -j noise
> > iptables -I noise -m set --match-set c src --bytes-lt 20000 -j download
> >
> > and you want to log packets from chains 'noise' and 'download' with
> > different prefixes.
>
> What do you think about this patch?
Thanks, I think it gives a way to avoid the issue.
I'm still not convinced that keeping this disabled by default is the
best way to go (mostly because we had a kernel change affecting
semantics that were exported to userspace for a long time), but if
there's a need for the opposite of this option, introducing it as a
negation becomes linguistically awkward. :)
And anyway, it's surely better than not having this possibility at all.
Let me know if you want me to review (or try to draft) man page
changes. Just a few comments inline:
> diff --git a/kernel/include/uapi/linux/netfilter/ipset/ip_set.h b/kernel/include/uapi/linux/netfilter/ipset/ip_set.h
> index 7545af4..6881329 100644
> --- a/kernel/include/uapi/linux/netfilter/ipset/ip_set.h
> +++ b/kernel/include/uapi/linux/netfilter/ipset/ip_set.h
> @@ -186,6 +186,9 @@ enum ipset_cmd_flags {
> IPSET_FLAG_MAP_SKBPRIO = (1 << IPSET_FLAG_BIT_MAP_SKBPRIO),
> IPSET_FLAG_BIT_MAP_SKBQUEUE = 10,
> IPSET_FLAG_MAP_SKBQUEUE = (1 << IPSET_FLAG_BIT_MAP_SKBQUEUE),
> + IPSET_FLAG_BIT_UPDATE_COUNTERS_FIRST = 11,
> + IPSET_FLAG_UPDATE_COUNTERS_FIRST =
> + (1 << IPSET_FLAG_BIT_UPDATE_COUNTERS_FIRST),
> IPSET_FLAG_CMD_MAX = 15,
> };
>
> diff --git a/kernel/net/netfilter/ipset/ip_set_core.c b/kernel/net/netfilter/ipset/ip_set_core.c
> index 1df6536..423d0de 100644
> --- a/kernel/net/netfilter/ipset/ip_set_core.c
> +++ b/kernel/net/netfilter/ipset/ip_set_core.c
> @@ -622,10 +622,9 @@ ip_set_add_packets(u64 packets, struct ip_set_counter *counter)
>
> static void
> ip_set_update_counter(struct ip_set_counter *counter,
> - const struct ip_set_ext *ext, u32 flags)
> + const struct ip_set_ext *ext)
> {
> - if (ext->packets != ULLONG_MAX &&
> - !(flags & IPSET_FLAG_SKIP_COUNTER_UPDATE)) {
> + if (ext->packets != ULLONG_MAX) {
This means that UPDATE_COUNTERS_FIRST wins over SKIP_COUNTER_UPDATE. Is
that intended? Intuitively, I would say that "skip" is more imperative
than "do it *first*". Anyway, I guess they will be mutually exclusive.
> ip_set_add_bytes(ext->bytes, counter);
> ip_set_add_packets(ext->packets, counter);
> }
> @@ -649,13 +648,19 @@ ip_set_match_extensions(struct ip_set *set, const struct ip_set_ext *ext,
> if (SET_WITH_COUNTER(set)) {
> struct ip_set_counter *counter = ext_counter(data, set);
>
> + if (flags & IPSET_FLAG_UPDATE_COUNTERS_FIRST)
> + ip_set_update_counter(counter, ext);
> +
> if (flags & IPSET_FLAG_MATCH_COUNTERS &&
> !(ip_set_match_counter(ip_set_get_packets(counter),
> mext->packets, mext->packets_op) &&
> ip_set_match_counter(ip_set_get_bytes(counter),
> mext->bytes, mext->bytes_op)))
> return false;
> - ip_set_update_counter(counter, ext, flags);
> +
> + if (!(flags & (IPSET_FLAG_UPDATE_COUNTERS_FIRST|
Nit: whitespace before |.
> + IPSET_FLAG_SKIP_COUNTER_UPDATE)))
> + ip_set_update_counter(counter, ext);
> }
> if (SET_WITH_SKBINFO(set))
> ip_set_get_skbinfo(ext_skbinfo(data, set),
>
> Then the rules above would look like
>
> ... -m set ... --update-counters-first --bytes-lt 100 -j noise
> ... -m set ... --update-counters-first --bytes-ge 100 -j download
Sorry for the typo in my previous example, I really meant:
iptables -I INPUT -m set --match-set c src --bytes-gt 100 -j noise
iptables -I noise -m set --match-set c src --bytes-gt 20000 -j download
that is, "noise" is more than "a single connection attempt", and
"download" is even more. But I think your example is equivalent for
this purpose.
> > > > What I meant is really the case where "--update-counters" (or
> > > > "--force-update-counters") and "! --update-counters" are both
> > > > absent: I don't see any particular advantage in the current
> > > > behaviour for that case.
> > >
> > > The counters are used just for statistical purposes: reflect the
> > > packets/bytes which were let through, i.e. matched the whole "rule".
> > > In that case updating the counters before the counter value matching
> > > is evaluated gives false results.
> >
> > Well, but for that, iptables/x_tables counters are available and (as far
> > as I know) typically used.
>
> With "rules" I meant at ipset level (match element + packet/byte counters
> as specified), i.e. counters for statistical purposes per set elements
> level.
Ah, I see now, thanks for explaining.
--
Stefano
next prev parent reply other threads:[~2020-03-03 22:16 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-02-24 17:52 [PATCH] ipset: Update byte and packet counters regardless of whether they match Stefano Brivio
2020-02-25 8:07 ` Jozsef Kadlecsik
2020-02-25 8:40 ` Stefano Brivio
2020-02-25 9:16 ` Jozsef Kadlecsik
2020-02-25 12:22 ` Stefano Brivio
2020-02-25 20:37 ` Jozsef Kadlecsik
2020-02-25 20:53 ` Stefano Brivio
2020-02-27 20:37 ` Jozsef Kadlecsik
2020-02-28 11:40 ` Stefano Brivio
2020-02-28 12:28 ` Stefano Brivio
2020-03-03 9:36 ` Jozsef Kadlecsik
2020-03-03 22:16 ` Stefano Brivio [this message]
2020-03-09 10:07 ` Jozsef Kadlecsik
2020-04-08 16:09 ` Phil Sutter
2020-04-08 19:59 ` Jozsef Kadlecsik
2020-04-08 20:20 ` Stefano Brivio
2020-04-08 21:40 ` Jozsef Kadlecsik
2020-04-09 9:16 ` Phil Sutter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200303231646.472e982e@elisabeth \
--to=sbrivio@redhat.com \
--cc=kadlec@netfilter.org \
--cc=mmhatre@redhat.com \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).