Re: vmware changes result in nasty bridging mess

2000-08-08 Thread Vladimir N. Silyaev

On Tue, Aug 08, 2000 at 02:36:02PM +0900, Akinori -Aki- MUSHA wrote:
 At a quick glance, "start_bridge" doesn't seem to have chance to be 1,
 does it?  
It's depend. I'm pretty tired that discussian about bridging. So if people
want to use bridge let set start_bridge to 1, if not leave it in zero.
Also it's possible to setup that value at configuration stage, whatever.

 And, what's the difference among those three values of
 "bridge"?
To diagnostic current behaviour about bridging.
 
  +  bridge="_bridge_on"
Startup script configured do not touch bridging and at the time when 
script starting, bridging was enabled.

  + bridge="_bridge_off"
/.../ disabled.
 
  + bridge="_bridge"
Script configured to setup bridging and did successfully

When bridge == "" its means that kernel compiled without bridging support,
or outdated kernel.

--
Vladimir 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: vmware changes result in nasty bridging mess

2000-08-07 Thread Vladimir N. Silyaev

Ok, guys.
See in the attachment fix, you should apply it to prevent current behavior.

On Sun, Aug 06, 2000 at 07:14:59PM -0400, Robert Watson wrote:
 On Thu, 3 Aug 2000, Vladimir N. Silyaev wrote:
 
  Bridging on by default may
  have nasty side effects for multi-interface machines (especially security
  side effects). 
  It's several ways to work around about that:
  - compile kernel without bridging support.
  - remove bridge starting code vmware.sh file in rc.d directory.
  - create special bridge cluster with one real interface and with one emulated
 
 Actually, I was hoping that the vmware port wouldn't interfere with
 existing configurations on the box :-).  I compile in the BRIDGE code so
 that I can test/develop with it, not so that ethernet support on the
 notebook can be broken after I install the vmware port, or so that a port
 can arbitrarily turn on bridging of all attached ethernet devices.
 
  I haven't read the code (I admit) but I finding the
  current behavior both (a) irritating (messages) and (b) worrying
  (unpredicted bridging with potential side effects).
  I don't know I never seen such effect. Could you to do more testing
  about that.
 
 The behavior with the wi0 ethernet driver seems to be continuous printing
 of the output included in my previous message.
 
 With the ep0 driver, the results are actually much worse -- I'm unable to
 use networking at all while the bridging sysctl is enabled (the default).
 While the sysctl is enabled, dhclient fails for that interface, and any
 attempt to manually configure and use it results in a route not found.
 When I disable the sysctl, networking begins to work on the box.
 
 The following default-installed startup script is really, really scary: 
 
 sysctl net.link.ether.bridge_refresh  bridge="_bridge"
 kldload if_tap.ko
 echo -n /compat/linux/dev/vmnet1
 ifconfig vmnet1 $host_ip netmask $netmask
 if [ _$bridge != _ ]; then
 sysctl -w net.link.ether.bridge_refresh=1
 sysctl -w net.link.ether.bridge=1
 fi
 
 Un-announced, the vmware port enabled bridging between the ethernet
 interfaces on my notebook, generated voluminous output for wi0, and broke
 networking for ep0.  This is a security risk, in that it automatically
 enables bridging between previously un-connected LAN segments that may
 have different security properties.  This is against POLA in that it
 breaks functionality (networking), bridges packets unto unexpected
 segments (potentially breaking many other things, especially DHCP), etc.
 Previously, use of networking support would create a virtual network
 between the host and the guest OS, but not affect other networking
 functionality.
--
Vladimir 


Index: files/vmware.sh
===
RCS file: /home/vns/cvs/vmware/vmware/vmmon-only/freebsd/port/files/vmware.sh,v
retrieving revision 1.5
diff -u -r1.5 vmware.sh
--- files/vmware.sh 2000/07/31 00:54:37 1.5
+++ files/vmware.sh 2000/08/07 03:16:16
@@ -8,6 +8,7 @@
 networking=@@NETWORKING@@
 host_ip=@@HOST_IP@@
 netmask=@@NETMASK@@
+start_bridge=0
 
 [ -x $vmware_dir/bin/vmware ] || exit
 
@@ -19,17 +20,32 @@
 
 exec /dev/null
 
+if [ $networking -eq 1 ]; then
+   if sysctl net.link.ether.bridge_refresh; then
+   if sysctl net.link.ether.bridge|grep 1; then
+  bridge="_bridge_on"
+ start_bridge=0
+   else
+ if [ $start_bridge -eq 1 ]; then
+ bridge="_bridge"
+ else
+ bridge="_bridge_off"
+ fi
+   fi
+   fi
+fi
+
 case $1 in
 start)
 kldload ${vmware_dir}/lib/modules/vmmon_${suffix}.ko
 if [ $networking -eq 1 ]; then
-   sysctl net.link.ether.bridge_refresh  bridge="_bridge"
kldload if_tap.ko
echo -n @@LINUX_DIR@@/dev/vmnet1
ifconfig vmnet1 $host_ip netmask $netmask
+   sysctl net.link.ether.bridge
if [ _$bridge != _ ]; then
sysctl -w net.link.ether.bridge_refresh=1
-   sysctl -w net.link.ether.bridge=1
+   [ $start_bridge -eq 1 ]  sysctl -w net.link.ether.bridge=1
fi
 fi
 echo -n " VMware${bridge}" 2
@@ -40,7 +56,6 @@
 if [ $networking -eq 1 ]; then
ifconfig vmnet1 down
ifconfig vmnet1 delete $host_ip
-   sysctl net.link.ether.bridge_refresh  bridge="_bridge"
[ _$bridge != _ ]  sysctl -w net.link.ether.bridge_refresh=1
 fi
 ;;



Re: vmware changes result in nasty bridging mess

2000-08-07 Thread Akinori -Aki- MUSHA

At a quick glance, "start_bridge" doesn't seem to have chance to be 1,
does it?  And, what's the difference among those three values of
"bridge"?

 +  bridge="_bridge_on"

 + bridge="_bridge"

 + bridge="_bridge_off"

-- 
   /
  /__  __   
 / )  )  ) )  /
Akinori -Aki- MUSHA aka / (_ /  ( (__(  @ idaemons.org / FreeBSD.org

"We're only at home when we're on the run, on the wing, on the fly"


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: vmware changes result in nasty bridging mess

2000-08-06 Thread Robert Watson

On Thu, 3 Aug 2000, Vladimir N. Silyaev wrote:

 Bridging on by default may
 have nasty side effects for multi-interface machines (especially security
 side effects). 
 It's several ways to work around about that:
 - compile kernel without bridging support.
 - remove bridge starting code vmware.sh file in rc.d directory.
 - create special bridge cluster with one real interface and with one emulated

Actually, I was hoping that the vmware port wouldn't interfere with
existing configurations on the box :-).  I compile in the BRIDGE code so
that I can test/develop with it, not so that ethernet support on the
notebook can be broken after I install the vmware port, or so that a port
can arbitrarily turn on bridging of all attached ethernet devices.

 I haven't read the code (I admit) but I finding the
 current behavior both (a) irritating (messages) and (b) worrying
 (unpredicted bridging with potential side effects).
 I don't know I never seen such effect. Could you to do more testing
 about that.

The behavior with the wi0 ethernet driver seems to be continuous printing
of the output included in my previous message.

With the ep0 driver, the results are actually much worse -- I'm unable to
use networking at all while the bridging sysctl is enabled (the default).
While the sysctl is enabled, dhclient fails for that interface, and any
attempt to manually configure and use it results in a route not found.
When I disable the sysctl, networking begins to work on the box.

The following default-installed startup script is really, really scary: 

sysctl net.link.ether.bridge_refresh  bridge="_bridge"
kldload if_tap.ko
echo -n /compat/linux/dev/vmnet1
ifconfig vmnet1 $host_ip netmask $netmask
if [ _$bridge != _ ]; then
sysctl -w net.link.ether.bridge_refresh=1
sysctl -w net.link.ether.bridge=1
fi

Un-announced, the vmware port enabled bridging between the ethernet
interfaces on my notebook, generated voluminous output for wi0, and broke
networking for ep0.  This is a security risk, in that it automatically
enables bridging between previously un-connected LAN segments that may
have different security properties.  This is against POLA in that it
breaks functionality (networking), bridges packets unto unexpected
segments (potentially breaking many other things, especially DHCP), etc.
Previously, use of networking support would create a virtual network
between the host and the guest OS, but not affect other networking
functionality.

  Robert N M Watson 

[EMAIL PROTECTED]  http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Safeport Network Services



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: vmware changes result in nasty bridging mess

2000-08-06 Thread Kris Kennaway

On Sun, 6 Aug 2000, Robert Watson wrote:

 Un-announced, the vmware port enabled bridging between the ethernet
 interfaces on my notebook

This is bad - ethernet segments should not be bridged without explicit
user confirmation, because they are commonly separated precisely for
security reasons.

Someone please fix the port appropriately..thanks.

Kris
FreeBSD Security Officer Team

--
In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe [EMAIL PROTECTED]



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: vmware changes result in nasty bridging mess

2000-08-03 Thread Reinier Bezuidenhout

I'm using vmware2 in a different way ... I do not have bridging enabled
in the kernel.  I'm using the host method although I do not have
a "legal" subnet on the other side.

I've ment to contact the port maintainer so he can add this to the
Hints.FreeBSD file.

I've configured 10.1.1.1 for the vmnet device, and 10.1.1.2 in windows.
I use ipfw and natd to translate the info ... this works like a charm.

I'm using the latest port of vmware and I don't see those messages, 
probably because I do not have BRIDGING enabled in the kernel.

For thos interested .. here is the natd and ipfw rules.

natd -u -a my_legal_ip

ipfw a 3 divert natd all from 10.1.1.2 to any out via vr0
ipfw a 4 divert natd all from any to my_legal_ip in via vr0

I'm even accessing the NT servers :), browsing bla bla bla :)


Regards
Reinier


On 02-Aug-00 Robert Watson wrote:
 
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 bridge_in-- reading table
 ...
 
 The vmware2 port now seems to enable bridging by default, and generate a
 kernel message for every ethernet packet sent.  Bridging on by default may
 have nasty side effects for multi-interface machines (especially security
 side effects).  I haven't read the code (I admit) but I finding the
 current behavior both (a) irritating (messages) and (b) worrying
 (unpredicted bridging with potential side effects).
 
   Robert N M Watson 
 
 [EMAIL PROTECTED]  http://www.watson.org/~robert/
 PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
 TIS Labs at Network Associates, Safeport Network Services
 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-hackers" in the body of the message

###
# #
#  R.N. Bezuidenhout  NetSeq Firewall #
#  [EMAIL PROTECTED]   http://www.nanoteq.co.za#  
# #
###

--
Date: 03-Aug-00
Time: 09:04:34

This message was sent by XFMail
--


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: vmware changes result in nasty bridging mess

2000-08-03 Thread Robert Watson

On Thu, 3 Aug 2000, Reinier Bezuidenhout wrote:

 I'm using vmware2 in a different way ... I do not have bridging enabled
 in the kernel.  I'm using the host method although I do not have
 a "legal" subnet on the other side.

That was the configuration I was using also, until I upgraded my version
of -STABLE, and as a result had to upgrade my vmware port.  The results
thus far have been a little worrying, and I'd like to see them fixed
before too many people get hurt.

  Robert N M Watson 

[EMAIL PROTECTED]  http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Safeport Network Services



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: vmware changes result in nasty bridging mess

2000-08-03 Thread Vladimir N. Silyaev

In muc.lists.freebsd.hackers, you wrote:

bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
...

The vmware2 port now seems to enable bridging by default, and generate a
kernel message for every ethernet packet sent.  
FreeBSD bridge code doesn't have any vmware related modifications. Only
one modification what was impelmented, it's a special sysctl
net.link.ether.bridge_refresh, which provied support for loadable
ethernets drivers. The rest of bridging code didn't touched at all.

Bridging on by default may
have nasty side effects for multi-interface machines (especially security
side effects). 
It's several ways to work around about that:
- compile kernel without bridging support.
- remove bridge starting code vmware.sh file in rc.d directory.
- create special bridge cluster with one real interface and with one emulated

I haven't read the code (I admit) but I finding the
current behavior both (a) irritating (messages) and (b) worrying
(unpredicted bridging with potential side effects).
I don't know I never seen such effect. Could you to do more testing
about that.

--
Vladimir 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



vmware changes result in nasty bridging mess

2000-08-02 Thread Robert Watson


bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
bridge_in-- reading table
...

The vmware2 port now seems to enable bridging by default, and generate a
kernel message for every ethernet packet sent.  Bridging on by default may
have nasty side effects for multi-interface machines (especially security
side effects).  I haven't read the code (I admit) but I finding the
current behavior both (a) irritating (messages) and (b) worrying
(unpredicted bridging with potential side effects).

  Robert N M Watson 

[EMAIL PROTECTED]  http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Safeport Network Services



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message