git: 3468cd95ca12 - main - pf: ether l3 rules can only use addresses
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 25 Mar 2022 12:53:56 UTC
The branch main has been updated by kp:
URL: https://cgit.FreeBSD.org/src/commit/?id=3468cd95ca1249946bace931f2035e76b070711e
commit 3468cd95ca1249946bace931f2035e76b070711e
Author: Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2022-03-25 10:13:47 +0000
Commit: Kristof Provost <kp@FreeBSD.org>
CommitDate: 2022-03-25 10:13:47 +0000
pf: ether l3 rules can only use addresses
Disallow the use of tables in ethernet rules. Using tables requires
taking the PF_RULES lock. Moreover, the current table code isn't ready
to deal with ethernet rules.
Disallow their use for now.
Sponsored by: Rubicon Communications, LLC ("Netgate")
---
sbin/pfctl/parse.y | 10 ++++++++++
sys/netpfil/pf/pf_nv.c | 6 ++++++
tests/sys/netpfil/pf/ether.sh | 5 +++++
3 files changed, 21 insertions(+)
diff --git a/sbin/pfctl/parse.y b/sbin/pfctl/parse.y
index bcbbfe872c6c..b3690fd22009 100644
--- a/sbin/pfctl/parse.y
+++ b/sbin/pfctl/parse.y
@@ -3261,6 +3261,16 @@ l3fromto : /* empty */ {
bzero(&$$, sizeof($$));
}
| L3 fromto {
+ if ($2.src.host != NULL &&
+ $2.src.host->addr.type != PF_ADDR_ADDRMASK) {
+ yyerror("from must be an address");
+ YYERROR;
+ }
+ if ($2.dst.host != NULL &&
+ $2.dst.host->addr.type != PF_ADDR_ADDRMASK) {
+ yyerror("to must be an address");
+ YYERROR;
+ }
$$ = $2;
}
;
diff --git a/sys/netpfil/pf/pf_nv.c b/sys/netpfil/pf/pf_nv.c
index 3b0d92cc5d20..0a79dfb0de7a 100644
--- a/sys/netpfil/pf/pf_nv.c
+++ b/sys/netpfil/pf/pf_nv.c
@@ -1146,6 +1146,9 @@ pf_nveth_rule_to_keth_rule(const nvlist_t *nvl,
nvlist_get_nvlist(nvl, "ipsrc"), &krule->ipsrc);
if (error != 0)
return (error);
+
+ if (krule->ipsrc.addr.type != PF_ADDR_ADDRMASK)
+ return (EINVAL);
}
if (nvlist_exists_nvlist(nvl, "ipdst")) {
@@ -1153,6 +1156,9 @@ pf_nveth_rule_to_keth_rule(const nvlist_t *nvl,
nvlist_get_nvlist(nvl, "ipdst"), &krule->ipdst);
if (error != 0)
return (error);
+
+ if (krule->ipdst.addr.type != PF_ADDR_ADDRMASK)
+ return (EINVAL);
}
PFNV_CHK(pf_nvstring(nvl, "qname", krule->qname, sizeof(krule->qname)));
diff --git a/tests/sys/netpfil/pf/ether.sh b/tests/sys/netpfil/pf/ether.sh
index 319956219fe4..6e81f07ca26e 100644
--- a/tests/sys/netpfil/pf/ether.sh
+++ b/tests/sys/netpfil/pf/ether.sh
@@ -534,6 +534,11 @@ ip_body()
"ether pass" \
"ether block out l3 to 192.0.2.3"
atf_check -s exit:2 -o ignore ping -c 1 192.0.2.2
+
+ # We can't use tables in these rules
+ echo "ether pass out l3 from <test>" | \
+ atf_check -s exit:1 -o ignore -e ignore \
+ jexec alcatraz pfctl -g -f -
}
ip_cleanup()