Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Jul 2020 16:10:44 -0400
From:      Mark Johnston <markj@freebsd.org>
To:        Doug Hardie <bc979@lafn.org>
Cc:        freebsd-net@freebsd.org, tuexen@freebsd.org
Subject:   Re: making SCTP loadable and removing it from GENERIC
Message-ID:  <20200709201044.GG8947@raichu>
In-Reply-To: <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info>
References:  <20200709151300.GC8947@raichu> <63F4446F-DECF-4DE8-99CA-EC8755A5D4A1@mail.sermon-archive.info>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jul 09, 2020 at 12:44:25PM -0700, Doug Hardie wrote:
> > On 9 July 2020, at 08:13, Mark Johnston <markj@freebsd.org> wrote:
> > 
> > Hi,
> > 
> > I spent some time working on making it possible to load the SCTP stack
> > as a kernel module, the same as we do today with IPSec.  There is one
> > patch remaining to be committed before that can be done in head.  One
> > caveat is that the module can't be unloaded, as some work is needed to
> > make this safe.  However, this obviously isn't a regression.
> > 
> > The work is based on the observations that:
> > 1) the in-kernel SCTP stack is not widely used (I know that the same
> >   code is used in some userland applications), and
> > 2) the SCTP stack is quite large, most FreeBSD kernel developers are
> >   unfamiliar with it, and bugs in it can easily lead to security holes.
> > 
> > Michael has done a lot of work to fix issues in the SCTP code,
> > particularly those found by syzkaller, but given that in-kernel SCTP has
> > few users (almost certainly fewer than IPSec), it seems reasonable to
> > require users to opt in to having an SCTP stack with a simple "kldload
> > sctp".  Thus, once the last patch is committed I would like to propose
> > removing "options SCTP" from GENERIC kernel configs in head, replacing
> > it with "options SCTP_SUPPORT" to enable sctp.ko to be loaded.
> > 
> > I am wondering if anyone has any objections to or concerns about this
> > proposal.  Any feedback is appreciated.
> 
> I have a number of systems using SCTP.  It is a key part of a distributed application.  As a user of SCTP, I have a slight objection to removing it from the kernel.  It would require me to remember when setting up a new system to enable that.  I am not likely to remember.

To be clear, with the proposed change SCTP can be loaded at boot by
adding a single line: sctp_load="YES" to /boot/loader.conf, or
kld_list="sctp" to /etc/rc.conf.  Also, the change will not be present
in a release until 13.0 or possibly 12.2, which provides plenty of time,
and the release notes will reflect the change.

I was really looking for objections pointing out that a dynamically
loaded SCTP stack would prevent or inhibit some workflow.  Relying on
being able to configure systems from memory rather than using a
checklist or some automated configuration management does not seem to be
a good reason for keeping SCTP in the kernel.

> What is going to happen if you run an application that uses SCTP and the module is not loaded?

An attempt to create an SCTP socket will fail with EPROTONOSUPPORT,
"Protocol not supported".

> What will remind me how to fix the issue?  I am not likely to remember about this 6 months from now.

Hopefully "protocol not supported" is a sufficiently descriptive error
message. 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20200709201044.GG8947>