-
Notifications
You must be signed in to change notification settings - Fork 294
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User id and group id integration in NPF #45
Changes from all commits
05ee5df
d38d3b8
305a3f8
54516c4
29b7ac3
8018fb7
b4225e8
b71ac11
6ddc377
541d8db
1a53ebf
c689702
03dba58
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -118,6 +118,9 @@ struct npf_rule { | |
LIST_ENTRY(npf_rule) r_aentry; | ||
nvlist_t * r_info; | ||
size_t r_info_len; | ||
|
||
rid_t uid; | ||
rid_t gid; | ||
}; | ||
|
||
#define SKIPTO_ADJ_FLAG (1U << 31) | ||
|
@@ -655,6 +658,9 @@ npf_rule_alloc(npf_t *npf, const nvlist_t *rule) | |
} | ||
memcpy(rl->r_key, key, len); | ||
} | ||
|
||
/* init uid/gids to none */ | ||
rl->gid.op = rl->uid.op = NPF_OP_NONE; | ||
return rl; | ||
} | ||
|
||
|
@@ -716,6 +722,43 @@ npf_rule_setcode(npf_rule_t *rl, const int type, void *code, size_t size) | |
rl->r_jcode = npf_bpf_compile(code, size); | ||
} | ||
|
||
/* again, use a single rule getid function both uid and gids */ | ||
static rid_t | ||
npf_rule_getrid(const nvlist_t *req, const char *name) | ||
{ | ||
size_t nitems; | ||
rid_t id; | ||
const uint64_t *rid = nvlist_get_number_array(req, name, &nitems); | ||
KASSERT(nitems == 3); | ||
|
||
id.id[0] = (uint32_t)rid[0]; | ||
id.id[1] = (uint32_t)rid[1]; | ||
id.op = (uint8_t)rid[2]; | ||
|
||
return id; | ||
} | ||
|
||
static void | ||
npf_rule_setrid(const nvlist_t *req, rid_t* rid, const char *name) | ||
{ | ||
rid_t id; | ||
|
||
id = npf_rule_getrid(req, name); | ||
memcpy(rid, &id, sizeof(*rid)); | ||
} | ||
|
||
void | ||
npf_rule_setuid(const nvlist_t *req, npf_rule_t *rl, const char *name) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. and these two are overkill too. Just do it directly. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I don't think It will be possible to do it directly here means I would have to call it in npf_ctl.c where it extracts the nvpair. I would have to pass There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Also, don't |
||
{ | ||
npf_rule_setrid(req, &rl->uid, name); | ||
} | ||
|
||
void | ||
npf_rule_setgid(const nvlist_t *req, npf_rule_t *rl, const char *name) | ||
{ | ||
npf_rule_setrid(req, &rl->gid, name); | ||
} | ||
|
||
/* | ||
* npf_rule_setrproc: assign a rule procedure and hold a reference on it. | ||
*/ | ||
|
@@ -754,6 +797,7 @@ npf_rule_free(npf_rule_t *rl) | |
if (rl->r_info) { | ||
kmem_free(rl->r_info, rl->r_info_len); | ||
} | ||
|
||
kmem_free(rl, sizeof(npf_rule_t)); | ||
} | ||
|
||
|
@@ -929,6 +973,102 @@ npf_ruleset_inspect(npf_cache_t *npc, const npf_ruleset_t *rlset, | |
return final_rl; | ||
} | ||
|
||
/* | ||
* just exchange the flag attributes for pass/block for the diff protocols. | ||
* for passing, we set the STATEFULNESS for TCP connection establishment | ||
* if ret == 0, it is for a pass to be changed to block | ||
* non-zero ret indicates a block to pass | ||
* when we change to block, we assume the default RST rerturn for TCP | ||
* when we change to pass, we ensure no bit field for RST for tcp and ICMP for udp | ||
* finally change the ret condition too | ||
*/ | ||
int | ||
npf_rule_reverse(npf_cache_t *npc, npf_match_info_t *mi, int ret) | ||
{ | ||
|
||
KASSERT(npf_iscached(npc, NPC_LAYER4)); | ||
switch(npc->npc_proto) { | ||
case IPPROTO_TCP: | ||
if (ret == 0) /* switch pass to block */ { | ||
mi->mi_retfl &= !(NPF_RULE_PASS | NPF_RULE_STATEFUL | | ||
NPF_RULE_GSTATEFUL); | ||
mi->mi_retfl |= NPF_RULE_RETRST; | ||
} | ||
else /* block to pass */ { | ||
mi->mi_retfl &= !(NPF_RULE_RETRST); | ||
mi->mi_retfl |= (NPF_RULE_PASS | NPF_RULE_STATEFUL | | ||
NPF_RULE_GSTATEFUL); | ||
} | ||
break; | ||
case IPPROTO_UDP: | ||
if (ret == 0) /* pass to block */ { | ||
mi->mi_retfl &= !(NPF_RULE_PASS); | ||
mi->mi_retfl |= NPF_RULE_RETICMP; | ||
} | ||
else /* block to pass */ { | ||
mi->mi_retfl &= !(NPF_RULE_RETICMP); | ||
mi->mi_retfl |= NPF_RULE_PASS; | ||
} | ||
break; | ||
} | ||
|
||
return (ret == 0) ? ENETUNREACH : 0; | ||
} | ||
|
||
/* only perform uid/gid checks when set */ | ||
int | ||
npf_uid_gid_match(npf_rule_t *rl, npf_cache_t *npc, int dir) | ||
{ | ||
int matched; | ||
if (rl->uid.op == NPF_OP_NONE && rl->gid.op == NPF_OP_NONE) | ||
return -1; | ||
|
||
matched = 0; | ||
if (rl->uid.op == NPF_OP_NONE) | ||
matched |= npf_rule_match_user(rl, npc, dir); | ||
if (rl->gid.op == NPF_OP_NONE) | ||
matched |= npf_rule_match_usrgrp(rl, npc, dir); | ||
|
||
return matched; | ||
} | ||
|
||
/* | ||
* lookup process sockets and match rule ids to socket user id | ||
* if socket id doesn't match any of rule ids, reverse action | ||
*/ | ||
int | ||
npf_rule_match_user(npf_rule_t *rl, npf_cache_t *npc, int dir) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. these two can be merged too, by passing the function npf_socket_lookup_uid/gid as a parameter. |
||
{ | ||
int error; | ||
uid_t sk_uid; | ||
|
||
KASSERT(npf_iscached(npc, NPC_IP46)); | ||
KASSERT(npf_iscached(npc, NPC_LAYER4)); | ||
|
||
error = npf_socket_lookup_uid(npc, dir, &sk_uid); | ||
if (error == -1) { | ||
return ENOTCONN; | ||
} | ||
|
||
return npf_match_rid(rl->uid, sk_uid); | ||
} | ||
|
||
int | ||
npf_rule_match_grp(npf_rule_t *rl, npf_cache_t *npc, int dir) | ||
{ | ||
uid_t sk_gid; | ||
int error; | ||
|
||
KASSERT(npf_iscached(npc, NPC_IP46)); /* assert layer3 cache info*/ | ||
KASSERT(npf_iscached(npc, NPC_LAYER4)); /* assert layer4 cache info */ | ||
|
||
error = npf_socket_lookup_gid(npc, dir, &sk_gid); | ||
if (error == -1) | ||
return ENOTCONN; | ||
|
||
return npf_match_rid(rl->gid, sk_gid); | ||
} | ||
|
||
/* | ||
* npf_rule_conclude: return decision and the flags for conclusion. | ||
* | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why all this machinery? get rid of npf_rule_getrid and put all of it in npf_rule_setrid and operate on the pointer directly.