All of lore.kernel.org
 help / color / mirror / Atom feed
From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Harout Hedeshian <harouth@codeaurora.org>
Cc: netfilter-devel@vger.kernel.org, 'Lorenzo Colitti' <lorenzo@google.com>
Subject: Re: [PATCH nf-next] netfilter: xt_socket: add XT_SOCKET_MATCHSOCKMARK flag and mark fields
Date: Mon, 15 Jun 2015 22:57:52 +0200	[thread overview]
Message-ID: <20150615205752.GA3184@salvia> (raw)
In-Reply-To: <005801d0a7a2$f0304460$d090cd20$@codeaurora.org>

On Mon, Jun 15, 2015 at 01:39:03PM -0600, Harout Hedeshian wrote:
> 
> 
> > -----Original Message-----
> > From: Harout Hedeshian [mailto:harouth@codeaurora.org]
> > Sent: Monday, June 15, 2015 11:42 AM
> > To: 'Pablo Neira Ayuso'
> > Cc: 'netfilter-devel@vger.kernel.org'; 'Lorenzo Colitti'
> > Subject: RE: [PATCH nf-next] netfilter: xt_socket: add
> > XT_SOCKET_MATCHSOCKMARK flag and mark fields
> > 
> > 
> > 
> > > -----Original Message-----
> > > From: Pablo Neira Ayuso [mailto:pablo@netfilter.org]
> > > Sent: Monday, June 15, 2015 10:23 AM
> > > To: Harout Hedeshian
> > > Cc: netfilter-devel@vger.kernel.org; Lorenzo Colitti
> > > Subject: Re: [PATCH nf-next] netfilter: xt_socket: add
> > > XT_SOCKET_MATCHSOCKMARK flag and mark fields
> > >
> > > On Fri, Jun 12, 2015 at 04:39:55PM -0600, Harout Hedeshian wrote:
> > > > xt_socket is useful for matching sockets with IP_TRANSPARENT and
> > > > taking some action on the matching packets. However, it lacks the
> > > > ability to match only a small subset of transparent sockets.
> > > >
> > > > Suppose there are 2 applications, each with its own set of
> > > > transparent sockets. The first application wants all matching
> > > > packets dropped, while the second application wants them forwarded
> > somewhere else.
> > > >
> > > > Add the ability to match sockets based on the socket mark.
> > > >
> > > > Now the 2 hypothetical applications can differentiate their sockets
> > > > based on a mark value set with SO_MARK.
> > > >
> > > > iptables -t mangle -I PREROUTING -m socket --transparent --mark 10
> > > > -J
> > > > act1 iptables -t mangle -I PREROUTING -m socket --transparent --mark
> > > > 11 -J act2
> > >
> > > Wouldn't it be better to restore the sk_mark to skb->mark? I mean:
> > >
> > >         iptables -t mangle -I PREROUTING \
> > >                 -m socket --transparent --restore-skmark -j myskchain
> > >	
> > > Thus, you can use -m mark from the 'myskchain' without having to fetch
> > > and inspect the sk over and over again as it happens with this
> > > extension.
> > 
> > Yes, I think that can work. Let me try that out and I'll submit a new
> > patch.
> 
> Actually, on second thought, I'm not so sure. This socket lookup is
> happening as part of a match operation in xt_socket.c.
> From x_tables.h, I can see that match functions are not supposed to modify
> the skb:
> 
> struct xt_match{
> ...
> bool (*match)(const struct sk_buff *skb, struct xt_action_param *);
>
> In that case, would this even be valid?
> -m socket --transparent --restore-skmark
> 
> Keeping in mind --restore-skmark is happening as part of -m socket
> 
> I would think we would need a whole new target to handle something like
> this:
> iptables -t mangle -I PREROUTING -m socket --transparent --no-wildcard -j
> SOCKET --restore-skmark
> 
> Since the target invocation would be separate, we would need a second socket
> lookup? Seems perhaps a little overkill...

Yes, it's simply overkill to add a new target to add this.

So just cast it:

        struct sk_buff *pskb = (struct sk_buff *)skb;

iptables matches were originally design not to modify anything, but it
can lead us to situations like this. That's one of the reasons why we
have no distinction between matches and targets in nftables anymore.

Thanks.

  reply	other threads:[~2015-06-15 20:52 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-06-12 22:39 [PATCH nf-next] netfilter: xt_socket: add XT_SOCKET_MATCHSOCKMARK flag and mark fields Harout Hedeshian
2015-06-15 16:22 ` Pablo Neira Ayuso
2015-06-15 17:41   ` Harout Hedeshian
2015-06-15 19:39   ` Harout Hedeshian
2015-06-15 20:57     ` Pablo Neira Ayuso [this message]
2015-06-16  0:45       ` Harout Hedeshian

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150615205752.GA3184@salvia \
    --to=pablo@netfilter.org \
    --cc=harouth@codeaurora.org \
    --cc=lorenzo@google.com \
    --cc=netfilter-devel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.