commit 539e52cb2474a606d16fa01a5c63c6edfaefc5f5
Author: Matthew Dillon <dil...@apollo.backplane.com>
Date:   Sun Feb 23 23:05:42 2020 -0800

    jail - add jail.defaults.allow_listen_override
    
    * Add jail.defaults.allow_listen_override (also per-jail settable).
      This feature is disabled by default.
    
      When enabled, this feature allows both wildcard and non-wildcard listen
      sockets in the jail to override wildcard listen sockets on the host.
      These sockets will be masked by the jail's IP list, meaning that a
      wildcard socket in the jail effectively covers just the jail's IP list.
    
      Non-wildcard listen sockets on the host are not overriden.
    
      Use of this feature allows the host to operate normally, without having
      to make its services jail-friendly.  Only those services which bind to
      specific IPs that might conflict with the jail IPs will need modification,
      and only if the jail needs to have that service as well.
    
    * In order to use the feature safely each jail should be given its
      own unique IPs for both localhost and its externally routable IP.
      For example:
    
      jail -u root / tr3990xJ 127.0.0.2,10.0.0.139 /bin/csh
    
      ifconfig can be used on the host to create multiple 127.0.0.X aliases
      on lo0 and to assign additional routable IPs to the machine for use
      in its jails.  For example:
    
      ifconfig lo0 inet 127.0.0.2  alias
      ifconfig lo0 inet 127.0.0.3  alias
      ifconfig lo0 inet6 ::2 alias
      ifconfig lo0 inet6 ::3 alias
      ifconfig em0 inet 10.0.0.139 netmask 255.255.0.0 alias
      ifconfig em0 inet 10.0.0.140 netmask 255.255.0.0 alias
      ...
    
    * Within a jail, use of localhost (127.0.0.1 or ::1) will automatically
      be converted to the jail's localhost IP (such as 127.0.0.2).  Also,
      accept(), getsockname(), and getpeername() will translate the jail's
      localhost IP back to 127.0.0.1 or ::1.  Most services within the
      jail can thus use localhost without being the wiser.
    
    * Listen address/port pairs within a jail can now be overloaded with the
      same address/port pairs on the host, or overloaded verses other jails
      without generating an error.  However, accessibility to these ports is
      governed by the 'jail.deafults.allow_listen_override' sysctl setting
      for the jail (or the jail-specific version of the same sysctl).
    
      Any jail-to-jail overloading of identical address/port pairs is allowed,
      but operationally undefined.  Only one jail will receive connections.
    
      It is best to supply each jail with its own unique local and routable
      IPs.
    
    * IPV6 is now fully supported using the same mechanisms.  You can supply
      a mix of IPV4 and IPV6 addresses in the jail command if desired.  The
      overloading feature works the same.

Summary of changes:
 sys/kern/kern_jail.c     |  73 ++++++++++-
 sys/kern/uipc_syscalls.c |  12 +-
 sys/net/if.c             |   3 +-
 sys/netinet/in_pcb.c     | 320 +++++++++++++++++++++++++++++++++++------------
 sys/netinet/in_pcb.h     |   2 +-
 sys/netinet6/in6_pcb.c   | 137 ++++++++++++--------
 sys/sys/jail.h           |   2 +
 usr.sbin/jail/jail.8     | 144 ++++++++++++---------
 8 files changed, 497 insertions(+), 196 deletions(-)

http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/539e52cb2474a606d16fa01a5c63c6edfaefc5f5


-- 
DragonFly BSD source repository

Reply via email to