diff mbox

conntrackd segfault on EPSV IPv6 ftp command when using ftp ExpectationSync

Message ID 20130710055815.a1bd2c1d.billfink@mindspring.com
State Superseded
Headers show

Commit Message

Bill Fink July 10, 2013, 9:58 a.m. UTC
On Tue, 9 Jul 2013, Pablo Neira Ayuso wrote:

> On Tue, Jul 09, 2013 at 01:30:23AM -0400, Bill Fink wrote:
> > On Sun, 7 Jul 2013, Bill Fink wrote:
> > 
> > > I still have the remaining problem that the IPv6 expectation
> > > is not successfully synced from the primary firewall to the
> > > backup firewall.  I see the following error in conntrackd.log
> > > on the backup firewall:
> > > 
> > > [Sun Jul  7 01:56:38 2013] (pid=24763) [ERROR] inject-add2: Invalid argument
> > > Sun Jul  7 01:56:38 2013	300 proto=6 src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy sport=0 dport=39767 mask-src=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mask-dst=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff sport=0 dport=65535 master-src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx master-dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy sport=37484 dport=21 class=0 helper=ftp
> > > 
> > > This exactly matches the IPv6 expectation on the primary firewall:
> > > 
> > > [root@sen-fw1 ~]# conntrackd -i expect
> > > proto=6 src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy sport=0 dport=39767 mask-src=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mask-dst=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff sport=0 dport=65535 master-src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx master-dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy sport=37484 dport=21 class=0 helper=ftp [active since 9s]
> > > 
> > > IPv4 expectations are working fine.
> > > 
> > > I tried to track down the error, and followed the error path:
> > > 
> > > 	external_inject_exp_new() ->
> > > 	  nl_create_expect()->
> > > 	    nfexp_query() ->
> > > 	      nfnl_query() ->
> > > 		nfnl_catch() ->
> > > 		  nfnl_process() ->
> > > 		    nfnl_step() ->
> > > 		      nfnl_is_error() because
> > > 			nlh->nlmsg_type == NLMSG_ERROR
> > > 
> > > but I wasn't sure how to proceed further.
> > 
> > I made some more progress, but still haven't found the root
> > cause.  I put some printks in the nf_conntrack_netlink and
> > nf_conntrack_ipv6 modules and tracked the error path there:
> > 
> > 	ctnetlink_new_expect() ->
> > 	  ctnetlink_create_expect() ->
> > 	    ctnetlink_parse_expect_nat() ->
> > 	      ctnetlink_parse_tuple() ->
> > 		ctnetlink_parse_tuple_ip() ->
> > 		  l3proto->nlattr_to_tuple() ->
> > 		    ipv6_nlattr_to_tuple() which fails
> > 
> > because tb[CTA_IP_V6_SRC] and tb[CTA_IP_V6_DST] are null.
> > 
> > But I'm currently stuck there.  Where are tb[CTA_IP_V6_SRC]
> > and tb[CTA_IP_V6_DST] supposed to be set?  Is it in conntrackd
> > during the build of the netlink message, or somewhere in one
> > of the conntrack kernel modules during processing of the
> > netlink message?  Is there a map somewhere of the control
> > flow betwwen conntrackd and the conntrack kernel modules?
> > 
> > I was also a little confused by the call to ctnetlink_parse_expect_nat()
> > since I'm not using NAT.
> 
> That's a good clue, thanks. Please, give a try to the attached kernel
> patch.

From 08fd3987afa49e092d3165a1b965a7a466cd3dc2 Mon Sep 17 00:00:00 2001
From: Pablo Neira Ayuso <pablo@netfilter.org>
Date: Tue, 9 Jul 2013 20:16:39 +0200
Subject: [PATCH] netfilter: ctnetlink: fix incorrect NAT expectation dumping

nf_ct_expect_alloc leaves unset the expectation NAT fields. However,
ctnetlink_exp_dump_expect expects them to be zeroed in case they are
not used, which may not be the case. This results in dumping the NAT
tuple of the expectation when it should not.

Fix it by zeroing the NAT fields of the expectation.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
---
 net/netfilter/nf_conntrack_expect.c |    5 +++++
 1 file changed, 5 insertions(+)

Almost there.  With the above patch, I now successfully get
IPv6 expectations on the backup firewall.  Unfortunately they're
not quite right.  On the backup firewall, the expectation src-IP
is the same as the dst-IP (either IPv4 or IPv6).

Primary firewall:

[root@sen-fw1 linux-3.7.3-101.fc17.x86_64]# conntrack -L expect
251 proto=6 src=192.168.218.199 dst=192.168.28.198 sport=0 dport=54705 mask-src=255.255.255.255 mask-dst=255.255.255.255 sport=0 dport=65535 master-src=192.168.218.199 master-dst=192.168.28.198 sport=56877 dport=21 class=0 helper=ftp
conntrack v1.4.0 (conntrack-tools): 1 expectations have been shown.

Backup firewall:

[root@sen-fw2 linux-3.7.3-101.fc17.x86_64]# conntrack -L expect
245 proto=6 src=192.168.28.198 dst=192.168.28.198 sport=0 dport=54705 mask-src=255.255.255.255 mask-dst=255.255.255.255 sport=0 dport=65535 master-src=192.168.218.199 master-dst=192.168.28.198 sport=56877 dport=21 class=0 helper=ftp
conntrack v1.4.0 (conntrack-tools): 1 expectations have been shown.

This was an unfortunate side affect of the patch to fix the
conntrackd segfault problem.  If I use Florian's version
of the fix segfault patch rather than Pablo's then all is
good.

Primary firewall:

[root@sen-fw1 linux-3.7.3-101.fc17.x86_64]# conntrack -L expect
270 proto=6 src=192.168.218.199 dst=192.168.28.198 sport=0 dport=58224 mask-src=255.255.255.255 mask-dst=255.255.255.255 sport=0 dport=65535 master-src=192.168.218.199 master-dst=192.168.28.198 sport=52814 dport=21 class=0 helper=ftp
conntrack v1.4.0 (conntrack-tools): 1 expectations have been shown.

Backup firewall:

[root@sen-fw2 linux-3.7.3-101.fc17.x86_64]# conntrack -L expect
262 proto=6 src=192.168.218.199 dst=192.168.28.198 sport=0 dport=58224 mask-src=255.255.255.255 mask-dst=255.255.255.255 sport=0 dport=65535 master-src=192.168.218.199 master-dst=192.168.28.198 sport=52814 dport=21 class=0 helper=ftp
conntrack v1.4.0 (conntrack-tools): 1 expectations have been shown.

Primary firewall:

[root@sen-fw1 linux-3.7.3-101.fc17.x86_64]# conntrack -f ipv6 -L expect
285 proto=6 src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:b8 dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:bf sport=0 dport=13031 mask-src=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mask-dst=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff sport=0 dport=65535 master-src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:b8 master-dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:bf sport=56784 dport=21 class=0 helper=ftp
conntrack v1.4.0 (conntrack-tools): 1 expectations have been shown.

Backup firewall:

[root@sen-fw2 linux-3.7.3-101.fc17.x86_64]# conntrack -f ipv6 -L expect
270 proto=6 src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:b8 dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:bf sport=0 dport=13031 mask-src=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff mask-dst=ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff sport=0 dport=65535 master-src=2001:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:b8 master-dst=2001:yyyy:yyyy:yyyy:yyyy:yyyy:yyyy:bf sport=56784 dport=21 class=0 helper=ftp
conntrack v1.4.0 (conntrack-tools): 1 expectations have been shown.

Primary firewall and backup firewall expectations exactly match
(both IPv4 and IPv6).

						-Thanks again

						-Bill
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/net/netfilter/nf_conntrack_expect.c b/net/netfilter/nf_conntrack_expect.c
index c63b618..4fd1ca9 100644
--- a/net/netfilter/nf_conntrack_expect.c
+++ b/net/netfilter/nf_conntrack_expect.c
@@ -293,6 +293,11 @@  void nf_ct_expect_init(struct nf_conntrack_expect *exp, unsigned int class,
 		       sizeof(exp->tuple.dst.u3) - len);
 
 	exp->tuple.dst.u.all = *dst;
+
+#ifdef CONFIG_NF_NAT_NEEDED
+	memset(&exp->saved_addr, 0, sizeof(exp->saved_addr));
+	memset(&exp->saved_proto, 0, sizeof(exp->saved_proto));
+#endif
 }
 EXPORT_SYMBOL_GPL(nf_ct_expect_init);