On Fri, Jul 27, 2018 at 04:15:29PM +0200, Máté Eckl wrote:
> On Mon, Jul 23, 2018 at 09:28:27AM +0200, Máté Eckl wrote:
> > On Fri, Jul 20, 2018 at 03:28:31PM +0200, Pablo Neira Ayuso wrote:
> > > Hi Mate,
> > > 
> > > A few comestic on the _init path, and one concern of probably missing
> > > sanity check, also from the _init path see below.
> > > 
> > > On Fri, Jul 20, 2018 at 09:34:14AM +0200, Máté Eckl wrote:
> 
> [...]
> 
> > > > +static int nft_tproxy_init(const struct nft_ctx *ctx,
> > > > +                          const struct nft_expr *expr,
> > > > +                          const struct nlattr * const tb[])
> > > > +{
> > > > +       struct nft_tproxy *priv = nft_expr_priv(expr);
> > > > +       unsigned int alen = 0;
> > > > +       int err;
> > > 
> > > Probably check here:
> > > 
> > >         if (!tb[NFTA_TPROXY_FAMILY])
> > >                 return -EINVAL;
> > > 
> > >         family = ...;
> > > 
> > > So we can reuse the switch() below...
> > > 
> > > > +
> > > > +       switch (ctx->family) {
> > > > +       case NFPROTO_IPV4:
> > > > +#if IS_ENABLED(CONFIG_NF_TABLES_IPV6)
> > > > +       case NFPROTO_IPV6:
> > > > +#endif
> > > > +       case NFPROTO_INET:
> > > 
> > > I think you have to update this to NFPROTO_UNSPEC.
> > 
> > No because this is the ctx->family, not the priv->family. This has to be 
> > done so
> > that a tproxy statement cannot be added to a netdev (or arp, etc.) table.
> > 
> > > 
> > > > +               break;
> > > > +       default:
> > > > +               return -EOPNOTSUPP;
> > > > +       }
> > > > +
> > > > +       if (!tb[NFTA_TPROXY_FAMILY] ||
> > > > +           (!tb[NFTA_TPROXY_REG_ADDR] && !tb[NFTA_TPROXY_REG_PORT]))
> > > > +               return -EINVAL;
> > > > +
> > > > +       priv->family = ntohl(nla_get_be32(tb[NFTA_TPROXY_FAMILY]));
> > > > +       switch (ctx->family) {
> > > 
> > > To do what we're doing this in this switch() ...
> > > 
> > > > +       case NFPROTO_IPV4:
> > > > +               if (priv->family != NFPROTO_IPV4)
> > > > +                       return -EINVAL;
> > > > +               break;
> > > > +       case NFPROTO_IPV6:
> > > > +               if (priv->family != NFPROTO_IPV6)
> > > > +                       return -EINVAL;
> > > > +               break;
> > > > +       }
> > > > +
> > > > +       /* Address is specified but the rule family is not set 
> > > > accordingly */
> > > > +       if (priv->family == NFPROTO_UNSPEC && tb[NFTA_TPROXY_REG_ADDR])
> > > > +               return -EINVAL;
> > > 
> > > With the change I'm proposing above, you can do all these attribute
> > > sanity checks at the very beginning of the function.
> > 
> > I see your point. See later.
> > 
> > > 
> > > > +
> > > > +       switch (priv->family) {
> > > > +       case NFPROTO_IPV4:
> > > 
> > > I'm missing a check like:
> > > 
> > >         if (priv->family != NFPROTO_UNSPEC &&
> > >             ctx->family != priv->family)
> > >                 return -EINVAL;
> > > 
> > > somewhere.
> > 
> > This switch basically does the same in a reverse logic, doesn't it?
> > 
> >     switch (ctx->family) {
> >     case NFPROTO_IPV4:
> >             if (priv->family != NFPROTO_IPV4)
> >                     return -EINVAL;
> >             break;
> >     case NFPROTO_IPV6:
> >             if (priv->family != NFPROTO_IPV6)
> >                     return -EINVAL;
> >             break;
> >     }
> > 
> > > 
> > > So we don't allow crazy things like, priv->family == NFPROTO_IPV6 from
> > > ctx->family == NFPROTO_IPV4... I may be wrong but I think it's still
> > > possible with this code.
> > 
> > The switch above rejects this with -EINVAL.
> > 
> > How about this:
> > 
> >     static int nft_tproxy_init(const struct nft_ctx *ctx,
> >                                const struct nft_expr *expr,
> >                                const struct nlattr * const tb[])
> >     {
> >             struct nft_tproxy *priv = nft_expr_priv(expr);
> >             unsigned int alen = 0;
> >             int err;
> > 
> >             if (!tb[NFTA_TPROXY_FAMILY] ||
> >                 (!tb[NFTA_TPROXY_REG_ADDR] && !tb[NFTA_TPROXY_REG_PORT]))
> >             return -EINVAL;
> > 
> >             priv->family = ntohl(nla_get_be32(tb[NFTA_TPROXY_FAMILY]));
> > 
> >             switch (ctx->family) {
> >             case NFPROTO_IPV4:
> >                     if (priv->family != NFPROTO_IPV4)
> >                             return -EINVAL;
> >                     break;
> >     #if IS_ENABLED(CONFIG_NF_TABLES_IPV6)
> >             case NFPROTO_IPV6:
> >                     if (priv->family != NFPROTO_IPV6)
> >                             return -EINVAL;
> >                     break;
> >     #endif
> >             case NFPROTO_INET:
> >                     break;
> >             default:
> >                     return -EOPNOTSUPP;
> >             }
> > 
> >             /* Address is specified but the rule family is not set 
> > accordingly */
> >             if (priv->family == NFPROTO_UNSPEC && tb[NFTA_TPROXY_REG_ADDR])
> >                     return -EINVAL;
> >     [...]
> > 
> > I think this addressess all of your concerns.
> 
> What do you think? If you are satisfied, I'll send in a new version.

Go ahead send a new version if you need to, otherwise I'll take this
v4. Let me know, thanks.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to