netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Whither xt_SYSRQ?
@ 2010-05-11 14:32 John Haxby
  2010-05-11 17:06 ` Patrick McHardy
  0 siblings, 1 reply; 4+ messages in thread
From: John Haxby @ 2010-05-11 14:32 UTC (permalink / raw)
  To: netfilter-devel


The earlier discussions about whether to include xt_SYSRQ in mainline 
seem to have petered out with no clear consensus.  As I recall, there 
were two suggestions as an alternative: use k(g)dboe and use a dedicated 
standalone module.

The former suggestion, kdboe, doesn't seem to fly because it's not in 
the kernel and also (unless I'm mistaken) provides little or no 
concession to security.  It's great for development but in the case 
where xt_SYSRQ can be used in a production environment, it doesn't seem 
to work.  Providing the environment for the debugger to work in is also 
likely to involve installing a lot on a production machine that wouldn't 
normally be there.  (xt_SYSRQ is nice and light and would sit nicely 
alongside, for example, netconsole.)

The standalone module is troublesome.  If I was starting from scratch 
with that I'd be putting in filters and whatnot that match those 
provides by xtables anyway.  If everything apart from the actual 
function (sysrq) and password control is duplicated by xtables then 
you'd have to ask "why isn't this part of xtables?".

I know xt_SYSRQ is used by quite a few people and it is seen as 
generally useful, so what needs to be done to get this into the mainline 
kernel?  Once it's there it stands a good chance of being backported to 
some of the production kernels (RHEL6, I'm looking at you) but without 
having some upstream commitment that seems a distant dream.

if xt_SYSRQ isn't acceptable, what is?  (Bearing in mind that I believe 
that whatever it is needs to be acceptable to a production environment.)

jch

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Whither xt_SYSRQ?
  2010-05-11 14:32 Whither xt_SYSRQ? John Haxby
@ 2010-05-11 17:06 ` Patrick McHardy
  2010-05-14  9:14   ` John Haxby
  0 siblings, 1 reply; 4+ messages in thread
From: Patrick McHardy @ 2010-05-11 17:06 UTC (permalink / raw)
  To: John Haxby; +Cc: netfilter-devel, Netfilter Core Team

John Haxby wrote:
> 
> The earlier discussions about whether to include xt_SYSRQ in mainline
> seem to have petered out with no clear consensus.  As I recall, there
> were two suggestions as an alternative: use k(g)dboe and use a dedicated
> standalone module.
> 
> The former suggestion, kdboe, doesn't seem to fly because it's not in
> the kernel and also (unless I'm mistaken) provides little or no
> concession to security.  It's great for development but in the case
> where xt_SYSRQ can be used in a production environment, it doesn't seem
> to work.  Providing the environment for the debugger to work in is also
> likely to involve installing a lot on a production machine that wouldn't
> normally be there.  (xt_SYSRQ is nice and light and would sit nicely
> alongside, for example, netconsole.)
> 
> The standalone module is troublesome.  If I was starting from scratch
> with that I'd be putting in filters and whatnot that match those
> provides by xtables anyway.  If everything apart from the actual
> function (sysrq) and password control is duplicated by xtables then
> you'd have to ask "why isn't this part of xtables?".

The main point for putting it in a stand-alone module is that it
is providing a network service. You could still use netfilter to
filter packets of course. I don't see where the big trouble is,
instead of using netfilter for receiving packets, you open up
a socket. That's basically it.

> I know xt_SYSRQ is used by quite a few people and it is seen as
> generally useful, so what needs to be done to get this into the mainline
> kernel?  Once it's there it stands a good chance of being backported to
> some of the production kernels (RHEL6, I'm looking at you) but without
> having some upstream commitment that seems a distant dream.
> 
> if xt_SYSRQ isn't acceptable, what is?  (Bearing in mind that I believe
> that whatever it is needs to be acceptable to a production environment.)

Lets see what other netfilter developers think, I'm easy to convince :)
One thing I'd like to see in any case however is review of the crypto
parts by the crypto people.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Whither xt_SYSRQ?
  2010-05-11 17:06 ` Patrick McHardy
@ 2010-05-14  9:14   ` John Haxby
  2010-05-14 10:23     ` Patrick McHardy
  0 siblings, 1 reply; 4+ messages in thread
From: John Haxby @ 2010-05-14  9:14 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: netfilter-devel, Netfilter Core Team

On 11/05/10 18:06, Patrick McHardy wrote:
> John Haxby wrote:
>    
>> The standalone module is troublesome.  If I was starting from scratch
>> with that I'd be putting in filters and whatnot that match those
>> provides by xtables anyway.  If everything apart from the actual
>> function (sysrq) and password control is duplicated by xtables then
>> you'd have to ask "why isn't this part of xtables?".
>>      
> The main point for putting it in a stand-alone module is that it
> is providing a network service. You could still use netfilter to
> filter packets of course. I don't see where the big trouble is,
> instead of using netfilter for receiving packets, you open up
> a socket. That's basically it.
>
>    
>

/me slaps forehead

Sometimes the obvious just fails to make it through.  Yes, that makes a 
good deal of sense, I'll see how it pans out.  I'm currently wondering 
what happens when a machine is locked up whether or not I can get the 
service scheduled (one way or another) -- the netfilter stuff seems to 
be pretty robust in the face of machines locking up quite hard.


> Lets see what other netfilter developers think, I'm easy to convince:)
> One thing I'd like to see in any case however is review of the crypto
> parts by the crypto people.
>    

I'd like to see that as well.  I _think_ I've got the crypto stuff right 
but I do know that self-review for anything security related is 
basically worthless.  (As Bruce Schneier said, paraphrased slightly: any 
fool can produce a security solution that they can't crack.)

jch

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: Whither xt_SYSRQ?
  2010-05-14  9:14   ` John Haxby
@ 2010-05-14 10:23     ` Patrick McHardy
  0 siblings, 0 replies; 4+ messages in thread
From: Patrick McHardy @ 2010-05-14 10:23 UTC (permalink / raw)
  To: John Haxby; +Cc: netfilter-devel, Netfilter Core Team

John Haxby wrote:
> On 11/05/10 18:06, Patrick McHardy wrote:
>> John Haxby wrote:
>>   
>>> The standalone module is troublesome.  If I was starting from scratch
>>> with that I'd be putting in filters and whatnot that match those
>>> provides by xtables anyway.  If everything apart from the actual
>>> function (sysrq) and password control is duplicated by xtables then
>>> you'd have to ask "why isn't this part of xtables?".
>>>      
>> The main point for putting it in a stand-alone module is that it
>> is providing a network service. You could still use netfilter to
>> filter packets of course. I don't see where the big trouble is,
>> instead of using netfilter for receiving packets, you open up
>> a socket. That's basically it.
>>
>>   
> 
> /me slaps forehead
> 
> Sometimes the obvious just fails to make it through.  Yes, that makes a
> good deal of sense, I'll see how it pans out.  I'm currently wondering
> what happens when a machine is locked up whether or not I can get the
> service scheduled (one way or another) -- the netfilter stuff seems to
> be pretty robust in the face of machines locking up quite hard.

Netfilter receive processing runs in BH context. Its a bit of a hack,
but you could run your code in the same context by using a UDP socket
and marking it as encapsulation socket, see udp_queue_rcv_skb().

>> Lets see what other netfilter developers think, I'm easy to convince:)
>> One thing I'd like to see in any case however is review of the crypto
>> parts by the crypto people.
>>    
> 
> I'd like to see that as well.  I _think_ I've got the crypto stuff right
> but I do know that self-review for anything security related is
> basically worthless.  (As Bruce Schneier said, paraphrased slightly: any
> fool can produce a security solution that they can't crack.)

I'd suggest to copy the linux-crypto list on the next submission and
ask for review.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2010-05-14 10:23 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-05-11 14:32 Whither xt_SYSRQ? John Haxby
2010-05-11 17:06 ` Patrick McHardy
2010-05-14  9:14   ` John Haxby
2010-05-14 10:23     ` Patrick McHardy

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).