[Bug 238796] ipfilter: failure to detect the same rules when arguments ordered differently

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Fri Jul 19 19:56:02 UTC 2019


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238796

--- Comment #29 from Cy Schubert <cy at FreeBSD.org> ---
I am only able to reproduce this problem when the on argument is moved ahead of
the reply-to.

root at ipftest:~ # echo "pass in quick reply-to tun0:10.1.1.1 on tun0 proto tcp
from any to 10.1.1.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
root at ipftest:~ # echo "pass in quick reply-to tun1:10.1.2.1 on tun1 proto tcp
from any to 10.1.2.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
root at ipftest:~ # echo "pass in quick reply-to tun0:10.1.1.1 on tun0 proto tcp
from any to 10.1.1.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
32:1:ioctl(add/insert rule): rule already exists
root at ipftest:~ # echo "pass in quick on tun0 reply-to tun0:10.1.1.1 proto tcp
from any to 10.1.1.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
root at ipftest:~ # echo "pass in quick on tun0 reply-to tun0:10.1.1.1 proto tcp
from any to 10.1.1.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
32:1:ioctl(add/insert rule): rule already exists
root at ipftest:~ # 
root at ipftest:~ # uname -a
FreeBSD ipftest 13.0-CURRENT FreeBSD 13.0-CURRENT r350103 GENERIC  amd64
root at ipftest:~ # 
root at ipftest:~ # kldstat
Id Refs Address                Size Name
 1    9 0xffffffff80200000  24ffe50 kernel
 2    1 0xffffffff82819000     2538 intpm.ko
 3    1 0xffffffff8281c000      a50 smbus.ko
 4    1 0xffffffff8281d000     2498 filemon.ko
 5    1 0xffffffff82820000    6baa0 ipl.ko
root at ipftest:~ # 
oot at ipftest:~ # ipfstat -Rion
# empty list for ipfilter(out)
@1 pass in quick on tun0 reply-to tun0:10.1.1.1 inet proto tcp from any to
10.1.1.11/32 port = 22 flags S/FSRPAU keep state
@2 pass in quick on tun1 reply-to tun1:10.1.2.1 inet proto tcp from any to
10.1.2.11/32 port = 22 flags S/FSRPAU keep state
@3 pass in quick on tun0 reply-to tun0:10.1.1.1 inet proto tcp from any to
10.1.1.11/32 port = 22 flags S/FSRPAU keep state
root at ipftest:~ # 
root at ipftest:~ # ipf -ZFa
root at ipftest:~ # echo "pass in quick reply-to tun0:10.1.1.1 on tun0 proto tcp
from any to 10.1.1.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
root at ipftest:~ # echo "pass in quick reply-to tun1:10.1.2.1 on tun1 proto tcp
from any to 10.1.2.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
root at ipftest:~ # echo "pass in quick reply-to tun0:10.1.1.1 on tun0 proto tcp
from any to 10.1.1.11 port = 22 flags S/FSRPAU keep state" | ipf -f -
32:1:ioctl(add/insert rule): rule already exists
root at ipftest:~ # 
root at ipftest:~ # ipfstat -Rion                                                 
# empty list for ipfilter(out)
@1 pass in quick on tun0 reply-to tun0:10.1.1.1 inet proto tcp from any to
10.1.1.11/32 port = 22 flags S/FSRPAU keep state
@2 pass in quick on tun1 reply-to tun1:10.1.2.1 inet proto tcp from any to
10.1.2.11/32 port = 22 flags S/FSRPAU keep state
root at ipftest:~ # 

As you can see it rejects the second attempt to load the same rule, however
rearranging the on argument (first example) adds a shadowed rule which it
should have rejected. This is probably because the additional interface names
appended to frentry_t are out of order, causing fr_ifnames to also be out of
order. I have yet to test this hypothesis (yet to decide whether to implement a
new SDT DTrace probe or simply expose ipf_rule_compare to allow FBT probes).

The tests above were using the image on ftp.freebsd.org in a virtualbox vm
which itself is running on 13.0-CURRENT.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the freebsd-net mailing list