diff mbox

[ebtables-compat-experimental5] iptables: xtables-eb: adjust policy in user-defined chains

Message ID 20141117123622.11349.43033.stgit@nfdev.cica.es
State Changes Requested
Delegated to: Pablo Neira
Headers show

Commit Message

Arturo Borrero Nov. 17, 2014, 12:36 p.m. UTC
The ebtables-compat tool doesn't support default policy in custom chains.
RETURN is the default policy in this case, and is mandatory (this is the
behaviour of nf_tables).

While at it, fix the error message when trying to change the default policy to
RETURN in builtin chains to match the original ebtables message.

Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
---
 iptables/nft-bridge.c |    7 ++++++-
 iptables/xtables-eb.c |   19 ++++++++++++-------
 2 files changed, 18 insertions(+), 8 deletions(-)


--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Comments

Pablo Neira Ayuso Nov. 18, 2014, 6:43 p.m. UTC | #1
On Mon, Nov 17, 2014 at 01:36:23PM +0100, Arturo Borrero Gonzalez wrote:
> The ebtables-compat tool doesn't support default policy in custom chains.
> RETURN is the default policy in this case, and is mandatory (this is the
> behaviour of nf_tables).
> 
> While at it, fix the error message when trying to change the default policy to
> RETURN in builtin chains to match the original ebtables message.
> 
> Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
> ---
>  iptables/nft-bridge.c |    7 ++++++-
>  iptables/xtables-eb.c |   19 ++++++++++++-------
>  2 files changed, 18 insertions(+), 8 deletions(-)
> 
> diff --git a/iptables/nft-bridge.c b/iptables/nft-bridge.c
> index b5aec00..dc26bfd 100644
> --- a/iptables/nft-bridge.c
> +++ b/iptables/nft-bridge.c
> @@ -356,7 +356,12 @@ static void nft_bridge_print_header(unsigned int format, const char *chain,
>  				    const struct xt_counters *counters,
>  				    bool basechain, uint32_t refs)
>  {
> -	printf("Bridge chain: %s, entries: %u, policy: %s\n", chain, refs, pol);
> +	if (basechain)
> +		printf("Bridge chain: %s, entries: %u, policy: %s\n",
> +		       chain, refs, pol);
> +	else
> +		printf("Bridge chain: %s, entries: %u, policy: RETURN\n",
> +		       chain, refs);
>  }

I'd suggest:

        printf("Bridge chain: %s, entries: %u, policy: %s\n",
               chain, refs, basechain ? pol : "RETURN");

>  static void nft_bridge_print_firewall(struct nft_rule *r, unsigned int num,
> diff --git a/iptables/xtables-eb.c b/iptables/xtables-eb.c
> index 917bca2..bf9f264 100644
> --- a/iptables/xtables-eb.c
> +++ b/iptables/xtables-eb.c
> @@ -615,11 +615,10 @@ int do_commandeb(struct nft_handle *h, int argc, char *argv[], char **table)
>  		case 'N': /* Make a user defined chain */
>  		case 'E': /* Rename chain */
>  		case 'X': /* Delete chain */
> -			/* We allow -N chainname -P policy */

Better extend this comment:

                        /* We allow -N chainname -P policy */
                        /* XXX: Not in ebtables-compat */

>  			if (command == 'N' && c == 'P') {
> -				command = c;
> -				optind--; /* No table specified */
> -				goto handle_P;
> +				xtables_error(PARAMETER_PROBLEM,
> +					      "The default policy in user-defined"
> +					      " chains is RETURN (mandatory)");
>  			}

I'd really prefer to avoid changes in the ebtables parser. Could you
perform this checking from later on, when validating the
configuration.

        if (strcmp(chain, "INPUT") != 0 &&
            strcmp(chain, "FORWARD") != 0 &&
            ...                           &&
            strcmp(policy, "RETURN") != 0)
                xtables_error("...);

>  			if (OPT_COMMANDS)
>  				xtables_error(PARAMETER_PROBLEM,
> @@ -663,7 +662,6 @@ int do_commandeb(struct nft_handle *h, int argc, char *argv[], char **table)
>  					optind++;
>  				}
>  			} else if (c == 'P') {
> -handle_P:
>  				if (optind >= argc)
>  					xtables_error(PARAMETER_PROBLEM,
>  						      "No policy specified");
> @@ -1146,9 +1144,16 @@ check_extension: */
>  	cs.fw.ethproto = htons(cs.fw.ethproto);
>  
>  	if (command == 'P') {
> -		if (selected_chain < NF_BR_NUMHOOKS && strcmp(policy, "RETURN")==0)
> +		if (selected_chain < 0) {
>  			xtables_error(PARAMETER_PROBLEM,
> -				      "Policy RETURN only allowed for user defined chains");
> +				      "Default policy in user-defined chains "
> +				      "is mandatory RETURN");
> +		}
> +		if (strcmp(policy, "RETURN") == 0) {
> +			xtables_error(PARAMETER_PROBLEM,
> +				      "Policy RETURN only allowed for user "
> +				      "defined chains");
> +		}

Not sure why you need this change.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Arturo Borrero Nov. 19, 2014, 12:23 p.m. UTC | #2
On 18 November 2014 19:43, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
>>                       if (command == 'N' && c == 'P') {
>> -                             command = c;
>> -                             optind--; /* No table specified */
>> -                             goto handle_P;
>> +                             xtables_error(PARAMETER_PROBLEM,
>> +                                           "The default policy in user-defined"
>> +                                           " chains is RETURN (mandatory)");
>>                       }
>
> I'd really prefer to avoid changes in the ebtables parser. Could you
> perform this checking from later on, when validating the
> configuration.
>
>         if (strcmp(chain, "INPUT") != 0 &&
>             strcmp(chain, "FORWARD") != 0 &&
>             ...                           &&
>             strcmp(policy, "RETURN") != 0)
>                 xtables_error("...);
>

In the user-defined chain creation path, the code jumps to several
places (the goto handle_P; thing). I don't see clearly a zone where to
put these validations.

Could you please point to where would you like to put this code?

regards.
Pablo Neira Ayuso Nov. 19, 2014, 12:36 p.m. UTC | #3
On Wed, Nov 19, 2014 at 01:23:01PM +0100, Arturo Borrero Gonzalez wrote:
> On 18 November 2014 19:43, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> >>                       if (command == 'N' && c == 'P') {
> >> -                             command = c;
> >> -                             optind--; /* No table specified */
> >> -                             goto handle_P;
> >> +                             xtables_error(PARAMETER_PROBLEM,
> >> +                                           "The default policy in user-defined"
> >> +                                           " chains is RETURN (mandatory)");
> >>                       }
> >
> > I'd really prefer to avoid changes in the ebtables parser. Could you
> > perform this checking from later on, when validating the
> > configuration.
> >
> >         if (strcmp(chain, "INPUT") != 0 &&
> >             strcmp(chain, "FORWARD") != 0 &&
> >             ...                           &&
> >             strcmp(policy, "RETURN") != 0)
> >                 xtables_error("...);
> >
> 
> In the user-defined chain creation path, the code jumps to several
> places (the goto handle_P; thing). I don't see clearly a zone where to
> put these validations.
> 
> Could you please point to where would you like to put this code?

This will leave the while ((c = getopt_long ...) loop at some point,
right? So perform the validation after the parsing is done.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/iptables/nft-bridge.c b/iptables/nft-bridge.c
index b5aec00..dc26bfd 100644
--- a/iptables/nft-bridge.c
+++ b/iptables/nft-bridge.c
@@ -356,7 +356,12 @@  static void nft_bridge_print_header(unsigned int format, const char *chain,
 				    const struct xt_counters *counters,
 				    bool basechain, uint32_t refs)
 {
-	printf("Bridge chain: %s, entries: %u, policy: %s\n", chain, refs, pol);
+	if (basechain)
+		printf("Bridge chain: %s, entries: %u, policy: %s\n",
+		       chain, refs, pol);
+	else
+		printf("Bridge chain: %s, entries: %u, policy: RETURN\n",
+		       chain, refs);
 }
 
 static void nft_bridge_print_firewall(struct nft_rule *r, unsigned int num,
diff --git a/iptables/xtables-eb.c b/iptables/xtables-eb.c
index 917bca2..bf9f264 100644
--- a/iptables/xtables-eb.c
+++ b/iptables/xtables-eb.c
@@ -615,11 +615,10 @@  int do_commandeb(struct nft_handle *h, int argc, char *argv[], char **table)
 		case 'N': /* Make a user defined chain */
 		case 'E': /* Rename chain */
 		case 'X': /* Delete chain */
-			/* We allow -N chainname -P policy */
 			if (command == 'N' && c == 'P') {
-				command = c;
-				optind--; /* No table specified */
-				goto handle_P;
+				xtables_error(PARAMETER_PROBLEM,
+					      "The default policy in user-defined"
+					      " chains is RETURN (mandatory)");
 			}
 			if (OPT_COMMANDS)
 				xtables_error(PARAMETER_PROBLEM,
@@ -663,7 +662,6 @@  int do_commandeb(struct nft_handle *h, int argc, char *argv[], char **table)
 					optind++;
 				}
 			} else if (c == 'P') {
-handle_P:
 				if (optind >= argc)
 					xtables_error(PARAMETER_PROBLEM,
 						      "No policy specified");
@@ -1146,9 +1144,16 @@  check_extension: */
 	cs.fw.ethproto = htons(cs.fw.ethproto);
 
 	if (command == 'P') {
-		if (selected_chain < NF_BR_NUMHOOKS && strcmp(policy, "RETURN")==0)
+		if (selected_chain < 0) {
 			xtables_error(PARAMETER_PROBLEM,
-				      "Policy RETURN only allowed for user defined chains");
+				      "Default policy in user-defined chains "
+				      "is mandatory RETURN");
+		}
+		if (strcmp(policy, "RETURN") == 0) {
+			xtables_error(PARAMETER_PROBLEM,
+				      "Policy RETURN only allowed for user "
+				      "defined chains");
+		}
 		ret = nft_chain_set(h, *table, chain, policy, NULL);
 		if (ret < 0)
 			xtables_error(PARAMETER_PROBLEM, "Wrong policy");