Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1778302imm; Sun, 23 Sep 2018 11:27:32 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYpIDNBD7NUppnqDmquc5eXjt9Ji5y/YJi6In57w5mwM2XMBx3XGMryfF/oVjqpz65clwXx X-Received: by 2002:a62:1fdd:: with SMTP id l90-v6mr7157299pfj.121.1537727252854; Sun, 23 Sep 2018 11:27:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537727252; cv=none; d=google.com; s=arc-20160816; b=kA5y6p2dB7qCKK6N6yX0aiD6r78WfYCh9wPNFRTBw7KHCLxMFuHsl6fCQUTfaIjKlC gLKSioNR645hVYro2k6LdTFPvh1UPU3acNfqZ5aZOBnXKxBf+o2C8eDSJDI97kv07jqA z86Z9jXAswoMUaWJjrNpWMxgvu30X7XjidYXNkQtdmGpPcziWNfaEpkFS8ZjsC98wT82 k5Nf+4vUkn1ySUa2kv4etzu+KVX5N4rPq5gzpDYQJUWqcso6ys2r0jRb1p8xqwOHrfi4 pO2Cdk6QfBP+8mhlh1Ds411H3suNvmv0PbnMeaTmlHqTwywdhrxL0263wJ/DC5h+LonR giig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:to:from:dkim-signature; bh=Po1ghVXkDsdNhMQqelu1GWCNdSOcs66SNoFqOuFE7n0=; b=lR1Fx8536ADyJlTrxjww+kUMUh+l1yXjKqJo+0NcugD6xs1SIRNzSnBbLtT5vGH4do Bbx5s0T8q9CdB91mfJmxf/vVE7B2vWJL2pWSvwJEf5anY2Xq3DQVhq3lDD8a4QyGjUXu L/3Fy21lZG8VXjSATVy9vzWCS8g75CFdwWUlhJXaLfVXR0u0i+x36dFlqI1C4HcLDNe+ fs4KMlEuy3rDcrIH2VCYarhPezz68cz1h+kz0p9P/8+ah8RuUXgRNYd7fHqxZNB6MdeO UX8TfrB10GxLkUHHbLF4C7pIYx4hEVT2ATrOQOzpCoslnEwMFnUQL+nkkanl7OVf2cEb KKKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@googlemail.com header.s=20161025 header.b=QX4Tsiiy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=googlemail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 11-v6si12073569pgr.63.2018.09.23.11.27.01; Sun, 23 Sep 2018 11:27:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@googlemail.com header.s=20161025 header.b=QX4Tsiiy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=googlemail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727130AbeIXAZM (ORCPT + 99 others); Sun, 23 Sep 2018 20:25:12 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:39677 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726344AbeIXAZM (ORCPT ); Sun, 23 Sep 2018 20:25:12 -0400 Received: by mail-wm1-f66.google.com with SMTP id q8-v6so7898913wmq.4; Sun, 23 Sep 2018 11:26:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20161025; h=from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=Po1ghVXkDsdNhMQqelu1GWCNdSOcs66SNoFqOuFE7n0=; b=QX4Tsiiy/u8NG+XaGdKpUlT0/AkK27syUu0c/FnhD7mIIMf3RPQI2PkZJ3irzs0h1F AdoYjFPyyfG6MpnXfLWezlL57uE3MxSJ8zmQZpTWGQOndhscuaifJUK2N5DYK8EHWRFm Np76KozO7yqkv6hTioK1J84DkQidFjiAOgmy7rpWNzselsfHLgNv57xvPbhfowq7hb7c KXZYLhZ8jKrPmdShiwZ1UdKnZ8EQDjQ6RpTINVKK7nQAja5TGoDQGVn9k1xEyN4Nu3V0 NB6bkQYhL6zHmWiijBdyy9WsfkPDLjcYujMMp6vXZtP175ehY33sdx1nonXpwjHR2L2D Ofdg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=Po1ghVXkDsdNhMQqelu1GWCNdSOcs66SNoFqOuFE7n0=; b=V7TS884pCBA8vG4zAQbshereVlvZhC0P59+YBjMWRV2kZA42BajcnQ35LtbOsz/nIk GAwnPjav0lSrGPfqRxvvv7178CkzSRekoGZKoioNo9hKMTwOfIyKR6qJKmZTPKeGw4Xk I2KQLOXKzNuchp+SNw8orvcCfcKgbPRcumCKzg8niSsJwweBiMzVe/pK+FC+LEwRE8GZ e1VsSgwAKM7J2EpMEXNcub8TUSK9uaA3WRV7FLyYHMWf2BaTHmds6lkLHwJxBa6oGub8 j+GPgs1+5os3CULSBLAHN1uEfSdQ2iOtBLymYIvUvQNXgSFCu1Ii03eMqIcMEk0Zu9i3 PWnw== X-Gm-Message-State: ABuFfohWTLxIB2Fg0/0OpgGsUIxdfnS7djKi0bZDmX38txD8aspVqPu1 ZO/1P2rfkfsqAlXpymsSps8exHsFI34= X-Received: by 2002:a1c:3a92:: with SMTP id h140-v6mr5065392wma.41.1537727207019; Sun, 23 Sep 2018 11:26:47 -0700 (PDT) Received: from desktopdebian.localdomain (x4dbb2f17.dyn.telefonica.de. [77.187.47.23]) by smtp.gmail.com with ESMTPSA id c8sm15007248wrx.92.2018.09.23.11.26.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 23 Sep 2018 11:26:46 -0700 (PDT) From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= To: pablo@netfilter.org, kadlec@blackhole.kfki.hu, fw@strlen.de, davem@davemloft.net, netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, jmorris@namei.org, serge@hallyn.com, selinux@tycho.nsa.gov, linux-security-module@vger.kernel.org Subject: [PATCH v3 1/2] netfilter: nf_tables: add SECMARK support Date: Sun, 23 Sep 2018 20:26:15 +0200 Message-Id: <20180923182616.11398-1-cgzones@googlemail.com> X-Mailer: git-send-email 2.19.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add the ability to set the security context of packets within the nf_tables framework. Add a nft_object for holding security contexts in the kernel and manipulating packets on the wire. Convert the security context strings at rule addition time to security identifiers. This is the same behavior like in xt_SECMARK and offers better performance than computing it per packet. Set the maximum security context length to 256. Signed-off-by: Christian Göttsche --- v3: switch context string from char[] to char * rename function to nft_secmark_compute_secid() v2: convert security context strings to ids on rule addition time Based on nf-next Tested with v4.18.8 include/net/netfilter/nf_tables_core.h | 4 + include/uapi/linux/netfilter/nf_tables.h | 18 +++- net/netfilter/nf_tables_core.c | 28 +++++- net/netfilter/nft_meta.c | 107 +++++++++++++++++++++++ 4 files changed, 152 insertions(+), 5 deletions(-) diff --git a/include/net/netfilter/nf_tables_core.h b/include/net/netfilter/nf_tables_core.h index 8da837d2a..2046d104f 100644 --- a/include/net/netfilter/nf_tables_core.h +++ b/include/net/netfilter/nf_tables_core.h @@ -16,6 +16,10 @@ extern struct nft_expr_type nft_meta_type; extern struct nft_expr_type nft_rt_type; extern struct nft_expr_type nft_exthdr_type; +#ifdef CONFIG_NETWORK_SECMARK +extern struct nft_object_type nft_secmark_obj_type; +#endif + int nf_tables_core_module_init(void); void nf_tables_core_module_exit(void); diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h index 702e4f0be..5444e7687 100644 --- a/include/uapi/linux/netfilter/nf_tables.h +++ b/include/uapi/linux/netfilter/nf_tables.h @@ -1176,6 +1176,21 @@ enum nft_quota_attributes { }; #define NFTA_QUOTA_MAX (__NFTA_QUOTA_MAX - 1) +/** + * enum nft_secmark_attributes - nf_tables secmark object netlink attributes + * + * @NFTA_SECMARK_CTX: security context (NLA_STRING) + */ +enum nft_secmark_attributes { + NFTA_SECMARK_UNSPEC, + NFTA_SECMARK_CTX, + __NFTA_SECMARK_MAX, +}; +#define NFTA_SECMARK_MAX (__NFTA_SECMARK_MAX - 1) + +/* Max security context length */ +#define NFT_SECMARK_CTX_MAXLEN 256 + /** * enum nft_reject_types - nf_tables reject expression reject types * @@ -1432,7 +1447,8 @@ enum nft_ct_timeout_timeout_attributes { #define NFT_OBJECT_CONNLIMIT 5 #define NFT_OBJECT_TUNNEL 6 #define NFT_OBJECT_CT_TIMEOUT 7 -#define __NFT_OBJECT_MAX 8 +#define NFT_OBJECT_SECMARK 8 +#define __NFT_OBJECT_MAX 9 #define NFT_OBJECT_MAX (__NFT_OBJECT_MAX - 1) /** diff --git a/net/netfilter/nf_tables_core.c b/net/netfilter/nf_tables_core.c index ffd5c0f94..3fbce3b9c 100644 --- a/net/netfilter/nf_tables_core.c +++ b/net/netfilter/nf_tables_core.c @@ -249,12 +249,24 @@ static struct nft_expr_type *nft_basic_types[] = { &nft_exthdr_type, }; +static struct nft_object_type *nft_basic_objects[] = { +#ifdef CONFIG_NETWORK_SECMARK + &nft_secmark_obj_type, +#endif +}; + int __init nf_tables_core_module_init(void) { - int err, i; + int err, i, j = 0; + + for (i = 0; i < ARRAY_SIZE(nft_basic_objects); i++) { + err = nft_register_obj(nft_basic_objects[i]); + if (err) + goto err; + } - for (i = 0; i < ARRAY_SIZE(nft_basic_types); i++) { - err = nft_register_expr(nft_basic_types[i]); + for (j = 0; j < ARRAY_SIZE(nft_basic_types); j++) { + err = nft_register_expr(nft_basic_types[j]); if (err) goto err; } @@ -262,8 +274,12 @@ int __init nf_tables_core_module_init(void) return 0; err: + while (j-- > 0) + nft_unregister_expr(nft_basic_types[j]); + while (i-- > 0) - nft_unregister_expr(nft_basic_types[i]); + nft_unregister_obj(nft_basic_objects[i]); + return err; } @@ -274,4 +290,8 @@ void nf_tables_core_module_exit(void) i = ARRAY_SIZE(nft_basic_types); while (i-- > 0) nft_unregister_expr(nft_basic_types[i]); + + i = ARRAY_SIZE(nft_basic_objects); + while (i-- > 0) + nft_unregister_obj(nft_basic_objects[i]); } diff --git a/net/netfilter/nft_meta.c b/net/netfilter/nft_meta.c index 297fe7d97..c8ac0ef4b 100644 --- a/net/netfilter/nft_meta.c +++ b/net/netfilter/nft_meta.c @@ -543,3 +543,110 @@ struct nft_expr_type nft_meta_type __read_mostly = { .maxattr = NFTA_META_MAX, .owner = THIS_MODULE, }; + +#ifdef CONFIG_NETWORK_SECMARK + +struct nft_secmark { + u32 secid; + char *ctx; +}; + +static const struct nla_policy nft_secmark_policy[NFTA_SECMARK_MAX + 1] = { + [NFTA_SECMARK_CTX] = { .type = NLA_STRING, .len = NFT_SECMARK_CTX_MAXLEN }, +}; + +static int nft_secmark_compute_secid(struct nft_secmark *priv) +{ + int err; + u32 tmp_secid = 0; + + err = security_secctx_to_secid(priv->ctx, strlen(priv->ctx), &tmp_secid); + if (err) + return err; + + if (!tmp_secid) + return -ENOENT; + + err = security_secmark_relabel_packet(tmp_secid); + if (err) + return err; + + priv->secid = tmp_secid; + return 0; +} + +static void nft_secmark_obj_eval(struct nft_object *obj, struct nft_regs *regs, const struct nft_pktinfo *pkt) +{ + const struct nft_secmark *priv = nft_obj_data(obj); + struct sk_buff *skb = pkt->skb; + + skb->secmark = priv->secid; +} + + +static int nft_secmark_obj_init(const struct nft_ctx *ctx, const struct nlattr * const tb[], struct nft_object *obj) +{ + int err; + struct nft_secmark *priv = nft_obj_data(obj); + + if (tb[NFTA_SECMARK_CTX] == NULL) + return -EINVAL; + + priv->ctx = nla_strdup(tb[NFTA_SECMARK_CTX], GFP_KERNEL); + if (!priv->ctx) + return -ENOMEM; + + err = nft_secmark_compute_secid(priv); + if (err) { + kfree(priv->ctx); + return err; + } + + security_secmark_refcount_inc(); + + return 0; +} + +static int nft_secmark_obj_dump(struct sk_buff *skb, struct nft_object *obj, bool reset) +{ + int err; + struct nft_secmark *priv = nft_obj_data(obj); + + if (nla_put_string(skb, NFTA_SECMARK_CTX, priv->ctx)) + return -1; + + if (reset) { + err = nft_secmark_compute_secid(priv); + if (err) + return err; + } + + return 0; +} + +static void nft_secmark_obj_destroy(const struct nft_ctx *ctx, struct nft_object *obj) +{ + struct nft_secmark *priv = nft_obj_data(obj); + + security_secmark_refcount_dec(); + + kfree(priv->ctx); +} + +static const struct nft_object_ops nft_secmark_obj_ops = { + .type = &nft_secmark_obj_type, + .size = sizeof(struct nft_secmark), + .init = nft_secmark_obj_init, + .eval = nft_secmark_obj_eval, + .dump = nft_secmark_obj_dump, + .destroy = nft_secmark_obj_destroy, +}; +struct nft_object_type nft_secmark_obj_type __read_mostly = { + .type = NFT_OBJECT_SECMARK, + .ops = &nft_secmark_obj_ops, + .maxattr = NFTA_SECMARK_MAX, + .policy = nft_secmark_policy, + .owner = THIS_MODULE, +}; + +#endif /* CONFIG_NETWORK_SECMARK */ -- 2.19.0