Date: Wed, 15 Dec 2004 13:53:50 +0100 From: Andre Oppermann <andre@freebsd.org> To: Gleb Smirnoff <glebius@freebsd.org> Cc: freebsd-net@freebsd.org Subject: Re: per-interface packet filters Message-ID: <41C033DE.B3DE1F26@freebsd.org> References: <20041213124051.GB32719@cell.sick.ru> <200412131743.36722.max@love2party.net> <20041213104200.A62152@xorpc.icir.org> <20041214085123.GB42820@cell.sick.ru> <1103017203.1060.25.camel@localhost> <41BEE281.607DD0A8@freebsd.org> <1103035345.1060.55.camel@localhost> <41BF008D.AD79C9B@freebsd.org> <20041215081810.GA53509@cell.sick.ru> <41C0170F.95449D19@freebsd.org> <20041215115709.GK54307@cell.sick.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
Gleb Smirnoff wrote: > > On Wed, Dec 15, 2004 at 11:50:55AM +0100, Andre Oppermann wrote: > A> First you change the way pfil_hooks is used in a multiprotocol incompatible > A> way. Lets have a look at ip_input(): > A> > A> pfil_run_hooks(&inet_pfil_hook, &m, m->m_pkthdr.rcvif, PFIL_IN, NULL); > A> ^^^^^^^^^^^^^^ > A> > A> PFIL_HOOKS is a generic API with clear semantics. You can't just replace > A> this inet_pfil_hook with an interface specific one. That would be INET > A> only and you'd have to do the same for IPv6, IPX and whatever other protocols > A> may come. > A> > A> Secondly the stuct ifnet would have to be extended with a pfil_head pointer > A> for every protocol family in the system. This would be non-dynamic and > A> would require a recompile of all drivers etc. when a protocol is added or > A> removed. Struct ifnet is not a dynamic structure. > > Yes, it needs to be extended. An alternative is handling a table of > interfaces vs chains inside firewalls. We are speaking a lot of design, > which of above designs is better? Is it going to be easy to edit all these Handling it inside firewalls is the correct design. > tables when an interface is destroyed? No. Would it be possible to know Yes, you can subscribe to the routing socket where such information of interface arrivals, departures and changes are announced. The same way routing daemons get their information. Maybe this can be extended to provide a generic call-back handler interface to avoid duplication of the parsing code for each firewall. > which chains/filters are used on interface via ifconfig? No. Would it be Which chains/filters are used on an interface is firewall package specific anyway. IPFW, PF and IPF have different semantics and syntax for this. With Sam's recent modularization changes to ifconfig it would be possible to have a module doing that via ifconfig for each of these. > possible to avoid entering firewall functions when processing interfaces > without ACLs? No. It would go into the pfil_hook chain and the firewall code would just issue a return (0). One function call. Please remember that there can be other things besides firewalls residing in a PFIL_HOOKS chain. You can implement IPSEC via a pfil hook module. These may want to run independently of your firewall passing all traffic. > So, we are changing design in strange direction, because we don't want > struct ifnet to grow? No, I'm *designing* kernel functionality compared to bolt-on hacking it. > In Juniper|Cisco world, the fact that ACLs are attached in configuration > of interfaces, but not firewalls, gives a strong suspection that they have > it in their analog of struct ifnet. So what? Are we Cisco or Juniper? Do you jump out of the window on 13th floor if your pop idol does? No, you think first. I'm not saying what Cisco|Juniper do is bad, but neither am I saying it's the one and only truth in networking. There may be better or more clever approaches. Much of what they do is based on legacy requirements especially on Cisco. We have to look at the high-level goal first, not the specific implementation of someone else. > A> Thirdly have the modules that are hooked into the pfil_hooks no idea that > A> they have to register multiple times with multiple chains and so on. This > A> means that all firewall packages in FreeBSD need to be adjusted to deal > A> with these changes, often in a non-trivial way, to continue to function. > > I'd like to avoid autohooking here. I'd prefer to have a userland utility > which allows sysadmin to hook chain X from packet filter Y to interface > fxp0 direction IN, protocol IPv4. This is firewall package specific anyway. > Now we have autohooking to preserve compatibility with pre-pfil firewalls. > > A> And we lose the compatibility with NetBSD where the PFIL_HOOKS API comes > A> from. > > Why? We just have more places where filters can be hooked. No. Modules using PFIL_HOOKS would have to be written especially for FreeBSD to deal with your new behaviour. You can't just take a module written for NetBSD and compile it on FreeBSD and vice versa. The goal of the common PFIL_HOOKS API was to make especially that possible. > A> I hope you understand now that you change the PFIL_HOOKS API not in the > A> binary or structure way but in use and semantics. > > Yes. Let's call it smth different to word API. No. > A> So please put the PFIL_HOOKS discussion to a rest now as it simply won't > A> happen. There are perfect alternatives to change IPFW to fit your needs > A> within IPFW itself and with the information supplied by the PFIL_HOOKS API. > > Ok, "simply won't happen", is the words I was awaiting for. Good. PFIL_HOOKS case closed now? -- Andre
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?41C033DE.B3DE1F26>