Linux Netfilter discussions
 help / color / mirror / Atom feed
* nftables destination ip rewrite - checksum recalculation
@ 2020-08-31 12:51 Greenberg, Paul
  2020-08-31 13:21 ` Florian Westphal
  0 siblings, 1 reply; 3+ messages in thread
From: Greenberg, Paul @ 2020-08-31 12:51 UTC (permalink / raw)
  To: netfilter@vger.kernel.org

Hi All,

I am running into the following issue while working on a port-mapping CNI plugin compatible with nftables.

My target OS is CentOS: 3.10.0-1127.19.1.el7.x86_64 with nftables v0.8 (Joe Btfsplk)

How do I force the recalculation of checksum on a packet where I modify destination IP address?

table ip raw {
    chain prerouting {
        type filter hook prerouting priority -300; policy accept;
        iifname != "cni-podman0" tcp dport http ip daddr set 10.88.0.114 tcp dport set http return 
    }
}
After rewriting the destination address, packets arrive to a container with checksum error below.

01:05:16.704789 ee:58:3f:4d:1f:23 > ea:56:b4:c6:4f:c7, ethertype IPv4 (0x0800), length 58: (tos 0x0, ttl 63, id 8844, offset 0, flags [none], proto TCP (6), length 44)
  10.0.2.2.54017 > 10.88.0.116.80: Flags [S], cksum 0xd776 (incorrect -> 0xd8b9), seq 2337032705, win 65535, options [mss 1460], length 0

The incorrect checksum causes the failure to make tcp handshake. That is SYN packets arrive, but container disregards and does not send SYN/ACK back because of the incorrect checksum.

The destination IP rewrite has NFT_PAYLOAD_L4CSUM_PSEUDOHDR flags.

https://github.com/greenpau/cni-plugins/blob/dnat/pkg/utils/dest_nat_rewrite.go#L130-L140

Best Regards,
Paul Greenberg

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: nftables destination ip rewrite - checksum recalculation
  2020-08-31 12:51 nftables destination ip rewrite - checksum recalculation Greenberg, Paul
@ 2020-08-31 13:21 ` Florian Westphal
  2020-08-31 13:46   ` Greenberg, Paul
  0 siblings, 1 reply; 3+ messages in thread
From: Florian Westphal @ 2020-08-31 13:21 UTC (permalink / raw)
  To: Greenberg, Paul; +Cc: netfilter@vger.kernel.org

Greenberg, Paul <greenbergp@HSS.EDU> wrote:
> Hi All,
> 
> I am running into the following issue while working on a port-mapping CNI plugin compatible with nftables.
> 
> My target OS is CentOS: 3.10.0-1127.19.1.el7.x86_64 with nftables v0.8 (Joe Btfsplk)
> 
> How do I force the recalculation of checksum on a packet where I modify destination IP address?

> table ip raw {
>     chain prerouting {
>         type filter hook prerouting priority -300; policy accept;
>         iifname != "cni-podman0" tcp dport http ip daddr set 10.88.0.114 tcp dport set http return 
>     }
> }
> After rewriting the destination address, packets arrive to a container with checksum error below.
> 
> 01:05:16.704789 ee:58:3f:4d:1f:23 > ea:56:b4:c6:4f:c7, ethertype IPv4 (0x0800), length 58: (tos 0x0, ttl 63, id 8844, offset 0, flags [none], proto TCP (6), length 44)
>   10.0.2.2.54017 > 10.88.0.116.80: Flags [S], cksum 0xd776 (incorrect -> 0xd8b9), seq 2337032705, win 65535, options [mss 1460], length 0
> 
> The incorrect checksum causes the failure to make tcp handshake. That is SYN packets arrive, but container disregards and does not send SYN/ACK back because of the incorrect checksum.
> 
> The destination IP rewrite has NFT_PAYLOAD_L4CSUM_PSEUDOHDR flags.

NFT_PAYLOAD_L4CSUM_PSEUDOHDR was added in Linux 4.10 and is not available in Centos7.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Re: nftables destination ip rewrite - checksum recalculation
  2020-08-31 13:21 ` Florian Westphal
@ 2020-08-31 13:46   ` Greenberg, Paul
  0 siblings, 0 replies; 3+ messages in thread
From: Greenberg, Paul @ 2020-08-31 13:46 UTC (permalink / raw)
  To: Florian Westphal; +Cc: netfilter@vger.kernel.org

Thank you, Florian!

Best Regards,
Paul Greenberg

From: Florian Westphal <fw@strlen.de>
Sent: Monday, August 31, 2020 9:21 AM
To: Greenberg, Paul <greenbergp@HSS.EDU>
Cc: netfilter@vger.kernel.org <netfilter@vger.kernel.org>
Subject: Re: nftables destination ip rewrite - checksum recalculation 

Greenberg, Paul <greenbergp@HSS.EDU> wrote:
> Hi All,
>
> I am running into the following issue while working on a port-mapping CNI plugin compatible with nftables.
>
> My target OS is CentOS: 3.10.0-1127.19.1.el7.x86_64 with nftables v0.8 (Joe Btfsplk)
>
> How do I force the recalculation of checksum on a packet where I modify destination IP address?

> table ip raw {
>     chain prerouting {
>         type filter hook prerouting priority -300; policy accept;
>         iifname != "cni-podman0" tcp dport http ip daddr set 10.88.0.114 tcp dport set http return
>     }
> }
> After rewriting the destination address, packets arrive to a container with checksum error below.
>
> 01:05:16.704789 ee:58:3f:4d:1f:23 > ea:56:b4:c6:4f:c7, ethertype IPv4 (0x0800), length 58: (tos 0x0, ttl 63, id 8844, offset 0, flags [none], proto TCP (6), length 44)
>   10.0.2.2.54017 > 10.88.0.116.80: Flags [S], cksum 0xd776 (incorrect -> 0xd8b9), seq 2337032705, win 65535, options [mss 1460], length 0
>
> The incorrect checksum causes the failure to make tcp handshake. That is SYN packets arrive, but container disregards and does not send SYN/ACK back because of the incorrect checksum.
>
> The destination IP rewrite has NFT_PAYLOAD_L4CSUM_PSEUDOHDR flags.

NFT_PAYLOAD_L4CSUM_PSEUDOHDR was added in Linux 4.10 and is not available in Centos7.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-08-31 13:46 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-08-31 12:51 nftables destination ip rewrite - checksum recalculation Greenberg, Paul
2020-08-31 13:21 ` Florian Westphal
2020-08-31 13:46   ` Greenberg, Paul

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox