bugzilla-daemon at netfilter.org
2018-Nov-14  15:05 UTC
[Bug 1295] New: Access decision from previous priority
https://bugzilla.netfilter.org/show_bug.cgi?id=1295
            Bug ID: 1295
           Summary: Access decision from previous priority
           Product: nftables
           Version: unspecified
          Hardware: x86_64
                OS: Debian GNU/Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: nft
          Assignee: pablo at netfilter.org
          Reporter: Vincent.VSmeets at GMail.com
Hallo,
https://wiki.nftables.org/wiki-nftables/index.php/Configuring_chains#Base_chain_priority
describes that all the chains for a hook are executed in the order of the
priority. The higher priority chains overrule the decision of the lower
priority chains. The example from the wiki:
table inet filter {
        # this chain is evaluated first due to priority
        chain ssh {
                type filter hook input priority 0; policy drop;
                # ssh packet accepted
                tcp dport ssh accept
        }
        # this chain is evaluated last due to priority
        chain input {
                type filter hook input priority 1; policy drop;
                # the same ssh packet is dropped here by means of default
policy
        }
}
Now my question: is it possible to access the previous decision in the current
chain? Something like:
        # this chain is evaluated last due to priority
        chain input {
                type filter hook input priority 1; policy drop;
                # In case the previous decision was accept, then accept it here
too.
                meta previous-decision accept accept
        }
The source of this problem is: I want to use Docker in combination with my own
firewall rules. Docker uses the chain ip/filter/FORWARD (and some DOCKER-*) at
priority 0 to implement the network isolation. I don't want to change those
chains because Docker will change them at runtime and relies on them. But I
still want to control the forwarding of the packets.
My idea was to create my own chain ip/filter/my-forward at priority -1. This
will be executed before the docker chain. Docker provides a chain for user
modifications DOCKER-USER. In that chain, I want to drop all the packets that
were already droped by the previous (my-forward) chain. All other packets may
then be processed by the docker chains. Something like:
        chain my-forward {
                type filter hook forward priority -1; policy drop;
                # The web server lives in a docker container.
                iifname "eth0" oifname "docker0" tcp dport {
80, 443 } accept
        }
        chain DOCKER-USER {
                # In case the previous decision was drop, then drop it here
too.
                meta previous-decision drop drop
                # All other packets are procesed by the docker chain(s).
        }
Is it possible to have this implemented? 
Regards,
Vincent Smeets
-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181114/f7cd0edd/attachment.html>
bugzilla-daemon at netfilter.org
2018-Nov-14  15:19 UTC
[Bug 1295] Access decision from previous priority
https://bugzilla.netfilter.org/show_bug.cgi?id=1295
Florian Westphal <fw at strlen.de> changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |fw at strlen.de
--- Comment #1 from Florian Westphal <fw at strlen.de> ---
(In reply to Vincent from comment #0)> Hallo,
> 
> https://wiki.nftables.org/wiki-nftables/index.php/
> Configuring_chains#Base_chain_priority describes that all the chains for a
> hook are executed in the order of the priority. The higher priority chains
> overrule the decision of the lower priority chains.
Thats not true.  I've fixed this paragraph. Drops are instant, the packet is
free'd, and no further rules or chains are evaluated.
> The example from the
> wiki:
> 
> table inet filter {
>         # this chain is evaluated first due to priority
>         chain ssh {
>                 type filter hook input priority 0; policy drop;
>                 # ssh packet accepted
>                 tcp dport ssh accept
>         }
> 
>         # this chain is evaluated last due to priority
>         chain input {
>                 type filter hook input priority 1; policy drop;
>                 # the same ssh packet is dropped here by means of default
> policy
>         }
> }
This example is correct, the later hook can still drop the packet.
> Now my question: is it possible to access the previous decision in the
> current chain? Something like:
Not at this time.
If verdict was drop, no re-evaluation occurs.
If verdict was accept, re-evaluation occurs.
So, if packet made it to a certain base chain, previous hooks (if any)
accepted the packet.
> The source of this problem is: I want to use Docker in combination with my
> own firewall rules. Docker uses the chain ip/filter/FORWARD (and some
> DOCKER-*) at priority 0 to implement the network isolation. I don't
want to
> change those chains because Docker will change them at runtime and relies
on
> them. But I still want to control the forwarding of the packets.
> 
> My idea was to create my own chain ip/filter/my-forward at priority -1.
This
> will be executed before the docker chain. Docker provides a chain for user
> modifications DOCKER-USER. In that chain, I want to drop all the packets
> that were already droped by the previous (my-forward) chain.
Thats not needed, anything that gets dropped in the -1 prio hook won't make
it
to the 0-prio hooks.
-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181114/dfea34ba/attachment.html>
bugzilla-daemon at netfilter.org
2018-Nov-14  15:58 UTC
[Bug 1295] Access decision from previous priority
https://bugzilla.netfilter.org/show_bug.cgi?id=1295
Vincent <Vincent.VSmeets at GMail.com> changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |INVALID
--- Comment #2 from Vincent <Vincent.VSmeets at GMail.com> ---
Thank you. The documentation is now better. This has now solved this ticket.
Maybe you can add your last sentince to the wiki too:
anything that gets dropped in the -1 prio hook won't make it to the 0-prio
hooks.
-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181114/78185f9c/attachment-0001.html>
bugzilla-daemon at netfilter.org
2018-Nov-14  16:08 UTC
[Bug 1295] Access decision from previous priority
https://bugzilla.netfilter.org/show_bug.cgi?id=1295 --- Comment #3 from Florian Westphal <fw at strlen.de> --- (In reply to Vincent from comment #2)> Thank you. The documentation is now better. This has now solved this ticket. > Maybe you can add your last sentince to the wiki too: > > anything that gets dropped in the -1 prio hook won't make it to the 0-prio > hooks.I've clarified this, thanks. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20181114/9a4cb95c/attachment.html>
Apparently Analagous Threads
- [Bug 1070] New: NETMAP "to" address is not separated from previous output while listing NAT rules
- [Bug 1254] New: nft commandline tool can't parse negative priority values.
- [Bug 1281] New: Using kernel 4.18.10, nft commandline tool or nft -f can't parse negative priority values over -200.
- [Bug 1295] [PATCH] Transparent proxy support on Linux
- Docker container isolation not working in CentOS 7