* [RFC PATCH v2 0/1] netfilter: nat: restore default DNAT behavior
@ 2024-01-29 21:12 Kyle Swenson
2024-01-29 21:12 ` [RFC PATCH v2 1/1] " Kyle Swenson
0 siblings, 1 reply; 3+ messages in thread
From: Kyle Swenson @ 2024-01-29 21:12 UTC (permalink / raw)
To: netfilter-devel@vger.kernel.org; +Cc: Kyle Swenson, fw@strlen.de
Hello,
We have noticed what appears to be a regression from v4.4 in the DNAT port
selection logic in nf_nat_core.c. Specifically, we're expecting an iptables
command like
iptables -t nat -A PREROUTING -p tcp -d 10.0.0.2 -m tcp --dport 32000:32010
-j DNAT --to-destination 192.168.0.10:21000-21010
to DNAT traffic sent to 10.0.0.2:32000-32010 to 192.168.0.10:21000-21010. We
use the range on the LAN side to handle tuple collisions that might occur with
a single port specified via --to-destination.
The behavior we're seeing currently, however, is the behavior we'd expect if we
were passing --random to iptables (except without passing --random): the DNAT'd
port is random within the range.
Through my naive debugging, I've arrived at this RFC patch and have included it
mostly to illustrate the behavior our userspace is expecting with the above
iptables command. The hope is that I can be educated with what other
folks expect the behavior to be, or what I can change in our iptables
command to get the behavior we're expecting.
Thanks so much for your time,
Kyle
--
v1 -> v2:
- Restrict to NF_NAT_MANIP_DST so that we don't have predictable source
port conflict resolution, without changing the --range and --random
override behavior.
^ permalink raw reply [flat|nested] 3+ messages in thread
* [RFC PATCH v2 1/1] netfilter: nat: restore default DNAT behavior
2024-01-29 21:12 [RFC PATCH v2 0/1] netfilter: nat: restore default DNAT behavior Kyle Swenson
@ 2024-01-29 21:12 ` Kyle Swenson
2024-02-07 22:29 ` Pablo Neira Ayuso
0 siblings, 1 reply; 3+ messages in thread
From: Kyle Swenson @ 2024-01-29 21:12 UTC (permalink / raw)
To: netfilter-devel@vger.kernel.org; +Cc: Kyle Swenson, fw@strlen.de
When a DNAT rule is configured via iptables with different port ranges,
iptables -t nat -A PREROUTING -p tcp -d 10.0.0.2 -m tcp --dport 32000:32010
-j DNAT --to-destination 192.168.0.10:21000-21010
we seem to be DNATing to some random port on the LAN side. While this is
expected if --random is passed to the iptables command, it is not
expected without passing --random. The expected behavior (and the
observed behavior in v4.4) is the traffic will be DNAT'd to
192.168.0.10:21000 unless there is a tuple collision with that
destination. In that case, we expect the traffic to be instead DNAT'd
to 192.168.0.10:21001, so on so forth until the end of the range.
This patch is a naive attempt to restore the behavior seen in v4.4. I'm
hopeful folks will point out problems and regressions this could cause
elsewhere, since I've little experience in the net tree.
Signed-off-by: Kyle Swenson <kyle.swenson@est.tech>
---
net/netfilter/nf_nat_core.c | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/net/netfilter/nf_nat_core.c b/net/netfilter/nf_nat_core.c
index c3d7ecbc777c..016c816d91cb 100644
--- a/net/netfilter/nf_nat_core.c
+++ b/net/netfilter/nf_nat_core.c
@@ -549,12 +549,15 @@ static void nf_nat_l4proto_unique_tuple(struct nf_conntrack_tuple *tuple,
}
find_free_id:
if (range->flags & NF_NAT_RANGE_PROTO_OFFSET)
off = (ntohs(*keyptr) - ntohs(range->base_proto.all));
- else
+ else if ((range->flags & NF_NAT_RANGE_PROTO_RANDOM_ALL) ||
+ maniptype != NF_NAT_MANIP_DST)
off = get_random_u16();
+ else
+ off = 0;
attempts = range_size;
if (attempts > NF_NAT_MAX_ATTEMPTS)
attempts = NF_NAT_MAX_ATTEMPTS;
--
2.43.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [RFC PATCH v2 1/1] netfilter: nat: restore default DNAT behavior
2024-01-29 21:12 ` [RFC PATCH v2 1/1] " Kyle Swenson
@ 2024-02-07 22:29 ` Pablo Neira Ayuso
0 siblings, 0 replies; 3+ messages in thread
From: Pablo Neira Ayuso @ 2024-02-07 22:29 UTC (permalink / raw)
To: Kyle Swenson; +Cc: netfilter-devel@vger.kernel.org, fw@strlen.de
On Mon, Jan 29, 2024 at 09:12:54PM +0000, Kyle Swenson wrote:
> When a DNAT rule is configured via iptables with different port ranges,
>
> iptables -t nat -A PREROUTING -p tcp -d 10.0.0.2 -m tcp --dport 32000:32010
> -j DNAT --to-destination 192.168.0.10:21000-21010
>
> we seem to be DNATing to some random port on the LAN side. While this is
> expected if --random is passed to the iptables command, it is not
> expected without passing --random. The expected behavior (and the
> observed behavior in v4.4) is the traffic will be DNAT'd to
> 192.168.0.10:21000 unless there is a tuple collision with that
> destination. In that case, we expect the traffic to be instead DNAT'd
> to 192.168.0.10:21001, so on so forth until the end of the range.
>
> This patch is a naive attempt to restore the behavior seen in v4.4. I'm
> hopeful folks will point out problems and regressions this could cause
> elsewhere, since I've little experience in the net tree.
Would you post this without RFC tag and add provide a Fixes: tag.
Thanks.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2024-02-07 22:29 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-01-29 21:12 [RFC PATCH v2 0/1] netfilter: nat: restore default DNAT behavior Kyle Swenson
2024-01-29 21:12 ` [RFC PATCH v2 1/1] " Kyle Swenson
2024-02-07 22:29 ` Pablo Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).