* Enable eBPF XDP/TC kernel feature for IPFire
@ 2024-04-09 17:36 Vincent Li
2024-04-10 9:04 ` Adolf Belka
0 siblings, 1 reply; 14+ messages in thread
From: Vincent Li @ 2024-04-09 17:36 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 688 bytes --]
Hi,
I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
please refer to
https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
for where XDP fit in Linux network datapath, XDP will not interfere
with existing IPFire firewall rules. XDP is especially good at DDoS
packet filtering at high speed, see
https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
I think we only need to enable XDP/TC network filtering capability
without eBPF tracing capability which some users are concerned about
potential host security information leaks.
Please let me know what you think, thanks!
Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-09 17:36 Enable eBPF XDP/TC kernel feature for IPFire Vincent Li
@ 2024-04-10 9:04 ` Adolf Belka
2024-04-10 14:11 ` Vincent Li
0 siblings, 1 reply; 14+ messages in thread
From: Adolf Belka @ 2024-04-10 9:04 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1289 bytes --]
Hi Vincent,
I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
Regards,
Adolf.
On 09/04/2024 19:36, Vincent Li wrote:
> Hi,
>
> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> please refer to
> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> for where XDP fit in Linux network datapath, XDP will not interfere
> with existing IPFire firewall rules. XDP is especially good at DDoS
> packet filtering at high speed, see
> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>
> I think we only need to enable XDP/TC network filtering capability
> without eBPF tracing capability which some users are concerned about
> potential host security information leaks.
>
> Please let me know what you think, thanks!
>
> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-10 9:04 ` Adolf Belka
@ 2024-04-10 14:11 ` Vincent Li
2024-04-10 15:17 ` Peter Müller
0 siblings, 1 reply; 14+ messages in thread
From: Vincent Li @ 2024-04-10 14:11 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 2424 bytes --]
Hi Adolf,
Please see my reply inline
On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>
> Hi Vincent,
>
> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>
XDP_TX is to redirect the packet out after processing the packet at
XDP stage, yes, netfilter will not see these packets.
for example for DDoS SYN flood attack scenario, when the SYN packet
is received, XDP program can generate SYN+ACK with syncookie and send
the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
which actually saves host CPU cycles to process the SYN in
netfilter/TCP stack, which is actually good thing.
Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
program attached to the network interface, so it is the XDP program
author decide what to do with the packet, if no XDP program attached
to the network interface, everything works as usual, no interference
from XDP.
> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>
XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
XDP program packet processing, XDP_TX is to redirect the packet back
out through the same network interface after XDP program packet
processing.
> Regards,
>
> Adolf.
>
> On 09/04/2024 19:36, Vincent Li wrote:
> > Hi,
> >
> > I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> > please refer to
> > https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> > for where XDP fit in Linux network datapath, XDP will not interfere
> > with existing IPFire firewall rules. XDP is especially good at DDoS
> > packet filtering at high speed, see
> > https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
> >
> > I think we only need to enable XDP/TC network filtering capability
> > without eBPF tracing capability which some users are concerned about
> > potential host security information leaks.
> >
> > Please let me know what you think, thanks!
> >
> > Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-10 14:11 ` Vincent Li
@ 2024-04-10 15:17 ` Peter Müller
2024-04-10 18:01 ` Vincent Li
0 siblings, 1 reply; 14+ messages in thread
From: Peter Müller @ 2024-04-10 15:17 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 3321 bytes --]
Hello Vincent,
thank you for your e-mail and the proposal.
> Hi Adolf,
>
> Please see my reply inline
>
> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>
>> Hi Vincent,
>>
>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>>
> XDP_TX is to redirect the packet out after processing the packet at
> XDP stage, yes, netfilter will not see these packets.
> for example for DDoS SYN flood attack scenario, when the SYN packet
> is received, XDP program can generate SYN+ACK with syncookie and send
> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
> which actually saves host CPU cycles to process the SYN in
> netfilter/TCP stack, which is actually good thing.
>
> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
> program attached to the network interface, so it is the XDP program
> author decide what to do with the packet, if no XDP program attached
> to the network interface, everything works as usual, no interference
> from XDP.
If my understanding of this is correct, then this would lead to the exact
opposite of what IPFire is designed to do. Rather than having packets
processed below any level of operating system influence, the objective of
IPFire in particular and firewalls in general is to control network traffic,
which inherently requires thorough visibility on it.
As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
the right hardware, and SYN flooding attacks are not a major threat to
IPFire users, given that we have historically implemented some fine-tuning
to make such attacks less viable.
Therefore, I - personally - neither see the necessity nor benefit of pursuing
this proposal at this time.
Thanks, and best regards,
Peter Müller
>
>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>>
>
> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
> XDP program packet processing, XDP_TX is to redirect the packet back
> out through the same network interface after XDP program packet
> processing.
>
>> Regards,
>>
>> Adolf.
>>
>> On 09/04/2024 19:36, Vincent Li wrote:
>>> Hi,
>>>
>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
>>> please refer to
>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
>>> for where XDP fit in Linux network datapath, XDP will not interfere
>>> with existing IPFire firewall rules. XDP is especially good at DDoS
>>> packet filtering at high speed, see
>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>>>
>>> I think we only need to enable XDP/TC network filtering capability
>>> without eBPF tracing capability which some users are concerned about
>>> potential host security information leaks.
>>>
>>> Please let me know what you think, thanks!
>>>
>>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-10 15:17 ` Peter Müller
@ 2024-04-10 18:01 ` Vincent Li
2024-04-17 16:07 ` Michael Tremer
0 siblings, 1 reply; 14+ messages in thread
From: Vincent Li @ 2024-04-10 18:01 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 4481 bytes --]
On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
>
> Hello Vincent,
>
> thank you for your e-mail and the proposal.
>
> > Hi Adolf,
> >
> > Please see my reply inline
> >
> > On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> >>
> >> Hi Vincent,
> >>
> >> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
> >>
> > XDP_TX is to redirect the packet out after processing the packet at
> > XDP stage, yes, netfilter will not see these packets.
> > for example for DDoS SYN flood attack scenario, when the SYN packet
> > is received, XDP program can generate SYN+ACK with syncookie and send
> > the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
> > which actually saves host CPU cycles to process the SYN in
> > netfilter/TCP stack, which is actually good thing.
> >
> > Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
> > program attached to the network interface, so it is the XDP program
> > author decide what to do with the packet, if no XDP program attached
> > to the network interface, everything works as usual, no interference
> > from XDP.
>
> If my understanding of this is correct, then this would lead to the exact
> opposite of what IPFire is designed to do. Rather than having packets
> processed below any level of operating system influence, the objective of
> IPFire in particular and firewalls in general is to control network traffic,
> which inherently requires thorough visibility on it.
Kernel still has the traffic statistics processed by XDP program and
store in eBPF maps so the user space program can query and view. you
can still view XDP as part of the firewall except it processes packets
early at the driver layer for efficiency.
>
> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
> the right hardware, and SYN flooding attacks are not a major threat to
> IPFire users, given that we have historically implemented some fine-tuning
> to make such attacks less viable.
DDoS attacks to IPFire users do not happen now does not mean it will
not happen in the future, SYN flood is just one scenario, so better be
prepared than sorry later :) One IPFire user had asked for help
https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
I have studied IPFire, I do not see relevant SYN flooding or DDoS
tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
syncookie implementation, or suricata ddos rules...etc? keep in mind
all these are handled in software, no hardware acceleration.
Why not give IPFire users the options when the options already exist
in the IPFire kernel?
>
> Therefore, I - personally - neither see the necessity nor benefit of pursuing
> this proposal at this time.
>
> Thanks, and best regards,
> Peter Müller
>
> >
> >> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
> >>
> >
> > XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
> > XDP program packet processing, XDP_TX is to redirect the packet back
> > out through the same network interface after XDP program packet
> > processing.
> >
> >> Regards,
> >>
> >> Adolf.
> >>
> >> On 09/04/2024 19:36, Vincent Li wrote:
> >>> Hi,
> >>>
> >>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> >>> please refer to
> >>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> >>> for where XDP fit in Linux network datapath, XDP will not interfere
> >>> with existing IPFire firewall rules. XDP is especially good at DDoS
> >>> packet filtering at high speed, see
> >>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
> >>>
> >>> I think we only need to enable XDP/TC network filtering capability
> >>> without eBPF tracing capability which some users are concerned about
> >>> potential host security information leaks.
> >>>
> >>> Please let me know what you think, thanks!
> >>>
> >>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-10 18:01 ` Vincent Li
@ 2024-04-17 16:07 ` Michael Tremer
2024-04-17 22:36 ` Vincent Li
0 siblings, 1 reply; 14+ messages in thread
From: Michael Tremer @ 2024-04-17 16:07 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 5593 bytes --]
Hello Vincent,
> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>
> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>
>> Hello Vincent,
>>
>> thank you for your e-mail and the proposal.
>>
>>> Hi Adolf,
>>>
>>> Please see my reply inline
>>>
>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>>>
>>>> Hi Vincent,
>>>>
>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>>>>
>>> XDP_TX is to redirect the packet out after processing the packet at
>>> XDP stage, yes, netfilter will not see these packets.
>>> for example for DDoS SYN flood attack scenario, when the SYN packet
>>> is received, XDP program can generate SYN+ACK with syncookie and send
>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
>>> which actually saves host CPU cycles to process the SYN in
>>> netfilter/TCP stack, which is actually good thing.
>>>
>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
>>> program attached to the network interface, so it is the XDP program
>>> author decide what to do with the packet, if no XDP program attached
>>> to the network interface, everything works as usual, no interference
>>> from XDP.
>>
>> If my understanding of this is correct, then this would lead to the exact
>> opposite of what IPFire is designed to do. Rather than having packets
>> processed below any level of operating system influence, the objective of
>> IPFire in particular and firewalls in general is to control network traffic,
>> which inherently requires thorough visibility on it.
>
> Kernel still has the traffic statistics processed by XDP program and
> store in eBPF maps so the user space program can query and view. you
> can still view XDP as part of the firewall except it processes packets
> early at the driver layer for efficiency.
I would like to understand what your need is to use XDP.
As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
* Connection Tracking won’t be up to date
* QoS won’t be able to categorise packets correctly and won’t be able to do its job
* The IPS won’t be able to inspect any data
Those three are just a few, but they are commonly used features of IPFire and without them, it would not be what it is.
>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
>> the right hardware, and SYN flooding attacks are not a major threat to
>> IPFire users, given that we have historically implemented some fine-tuning
>> to make such attacks less viable.
>
> DDoS attacks to IPFire users do not happen now does not mean it will
> not happen in the future, SYN flood is just one scenario, so better be
> prepared than sorry later :) One IPFire user had asked for help
> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
Is this only about SYN flooding?
> I have studied IPFire, I do not see relevant SYN flooding or DDoS
> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
> syncookie implementation, or suricata ddos rules...etc? keep in mind
> all these are handled in software, no hardware acceleration.
Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
-Michael
> Why not give IPFire users the options when the options already exist
> in the IPFire kernel?
>
>>
>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
>> this proposal at this time.
>>
>> Thanks, and best regards,
>> Peter Müller
>>
>>>
>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>>>>
>>>
>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
>>> XDP program packet processing, XDP_TX is to redirect the packet back
>>> out through the same network interface after XDP program packet
>>> processing.
>>>
>>>> Regards,
>>>>
>>>> Adolf.
>>>>
>>>> On 09/04/2024 19:36, Vincent Li wrote:
>>>>> Hi,
>>>>>
>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
>>>>> please refer to
>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
>>>>> packet filtering at high speed, see
>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>>>>>
>>>>> I think we only need to enable XDP/TC network filtering capability
>>>>> without eBPF tracing capability which some users are concerned about
>>>>> potential host security information leaks.
>>>>>
>>>>> Please let me know what you think, thanks!
>>>>>
>>>>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-17 16:07 ` Michael Tremer
@ 2024-04-17 22:36 ` Vincent Li
2024-04-17 22:41 ` Vincent Li
2024-04-18 8:57 ` Michael Tremer
0 siblings, 2 replies; 14+ messages in thread
From: Vincent Li @ 2024-04-17 22:36 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 9065 bytes --]
On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
<michael.tremer(a)ipfire.org> wrote:
>
> Hello Vincent,
>
> > On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> >
> > On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
> >>
> >> Hello Vincent,
> >>
> >> thank you for your e-mail and the proposal.
> >>
> >>> Hi Adolf,
> >>>
> >>> Please see my reply inline
> >>>
> >>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> >>>>
> >>>> Hi Vincent,
> >>>>
> >>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
> >>>>
> >>> XDP_TX is to redirect the packet out after processing the packet at
> >>> XDP stage, yes, netfilter will not see these packets.
> >>> for example for DDoS SYN flood attack scenario, when the SYN packet
> >>> is received, XDP program can generate SYN+ACK with syncookie and send
> >>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
> >>> which actually saves host CPU cycles to process the SYN in
> >>> netfilter/TCP stack, which is actually good thing.
> >>>
> >>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
> >>> program attached to the network interface, so it is the XDP program
> >>> author decide what to do with the packet, if no XDP program attached
> >>> to the network interface, everything works as usual, no interference
> >>> from XDP.
> >>
> >> If my understanding of this is correct, then this would lead to the exact
> >> opposite of what IPFire is designed to do. Rather than having packets
> >> processed below any level of operating system influence, the objective of
> >> IPFire in particular and firewalls in general is to control network traffic,
> >> which inherently requires thorough visibility on it.
> >
> > Kernel still has the traffic statistics processed by XDP program and
> > store in eBPF maps so the user space program can query and view. you
> > can still view XDP as part of the firewall except it processes packets
> > early at the driver layer for efficiency.
>
> I would like to understand what your need is to use XDP.
>
> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
>
> * Connection Tracking won’t be up to date
> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
> * The IPS won’t be able to inspect any data
>
I think I did not explain the XDP use case clearly, for now, most XDP
use cases and particularly my use case is to do DDoS protection at
the earliest packet receiving path in high efficiency since XDP works
inside the network driver. the things you mentioned above would work
fine even if the packets go through XDP program, yes XDP program can
drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
simply passes the packet to Linux as if nothing happened. so it is up
to the XDP program logic, also even if ipfire has the kernel feature
enabled, users still need to attach XDP program to the interface, if
no XDP program is attached to the interface, nothing is in the way to
stop packet flowing to IPfire filtering.
Again this diagram is great to describe the packet path
https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
so the XDP_PASS action from XDP program is to pass packet to Linux as
usual. from the same diagram, you also see "AF_PACKET", right? that is
where tcpdump taking place to capture packet for network
troubleshooting, but tcpdump would not stops all the scenario above
you mentioned working, actually tcpdump is based on classic BPF
technology, the XDP/eBPF is to extended classic BPF technology, it not
only can clone (packet capture), but can also drop, redirect. Please
read more about eBPF/XDP in general if you would like, many online
resources explain better than me :) > Those three are just a few, but
they are commonly used features of IPFire and without them, it would
not be what it is.
>
> >> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
> >> the right hardware, and SYN flooding attacks are not a major threat to
> >> IPFire users, given that we have historically implemented some fine-tuning
> >> to make such attacks less viable.
> >
> > DDoS attacks to IPFire users do not happen now does not mean it will
> > not happen in the future, SYN flood is just one scenario, so better be
> > prepared than sorry later :) One IPFire user had asked for help
> > https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
>
> Is this only about SYN flooding?
>for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
> > I have studied IPFire, I do not see relevant SYN flooding or DDoS
> > tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
> > syncookie implementation, or suricata ddos rules...etc? keep in mind
> > all these are handled in software, no hardware acceleration.
>
> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
hardware acceleration probably is not the right word here for XDP
because XDP is actually still in the software driver, not inside the
hardware, though there is one hardware vendor that supports running
XDP byte code inside the hardware itself for true hardware
acceleration, but that is not common. again XDP does not interfere
with the IPfire filter except in DDoS scenarios, users can have the
option to drop the packet early in the network driver without
consuming IPfire CPU/memory resource. >
> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
home users very unlikely would have this demand because there isn't
much gain for attackers who would use DDoS to attack home users. For
small/medium size businesses, attackers could start DDoS because
business could be impacted and lose profit when under DDoS attack,
many businesses choose cloud DDoS providers if they could not afford
DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
protection on inexpensive commodity hardware. There are already a lot
of open source XDP programs out there, including XDP SYNCookie from
Linux kernel source, I have ported it to xdp-tool repo and ported
xdp-tool to IPfire.
>
> -Michael
>
> > Why not give IPFire users the options when the options already exist
> > in the IPFire kernel?
> >
> >>
> >> Therefore, I - personally - neither see the necessity nor benefit of pursuing
> >> this proposal at this time.
> >>
> >> Thanks, and best regards,
> >> Peter Müller
> >>
> >>>
> >>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
> >>>>
> >>>
> >>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
> >>> XDP program packet processing, XDP_TX is to redirect the packet back
> >>> out through the same network interface after XDP program packet
> >>> processing.
> >>>
> >>>> Regards,
> >>>>
> >>>> Adolf.
> >>>>
> >>>> On 09/04/2024 19:36, Vincent Li wrote:
> >>>>> Hi,
> >>>>>
> >>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> >>>>> please refer to
> >>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> >>>>> for where XDP fit in Linux network datapath, XDP will not interfere
> >>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
> >>>>> packet filtering at high speed, see
> >>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
> >>>>>
> >>>>> I think we only need to enable XDP/TC network filtering capability
> >>>>> without eBPF tracing capability which some users are concerned about
> >>>>> potential host security information leaks.
> >>>>>
> >>>>> Please let me know what you think, thanks!
> >>>>>
> >>>>> Vincent
>
>
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-17 22:36 ` Vincent Li
@ 2024-04-17 22:41 ` Vincent Li
2024-04-18 8:57 ` Michael Tremer
1 sibling, 0 replies; 14+ messages in thread
From: Vincent Li @ 2024-04-17 22:41 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 9718 bytes --]
sorry the previous reply might be messed up since gmail alerting me
to attach something in the attachment because gmail saw I typed the
"attach" word in my reply email, so I copy and pasted the whole email
from external text editor.
On Wed, Apr 17, 2024 at 3:36 PM Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>
> On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
> <michael.tremer(a)ipfire.org> wrote:
> >
> > Hello Vincent,
> >
> > > On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> > >
> > > On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
> > >>
> > >> Hello Vincent,
> > >>
> > >> thank you for your e-mail and the proposal.
> > >>
> > >>> Hi Adolf,
> > >>>
> > >>> Please see my reply inline
> > >>>
> > >>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> > >>>>
> > >>>> Hi Vincent,
> > >>>>
> > >>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
> > >>>>
> > >>> XDP_TX is to redirect the packet out after processing the packet at
> > >>> XDP stage, yes, netfilter will not see these packets.
> > >>> for example for DDoS SYN flood attack scenario, when the SYN packet
> > >>> is received, XDP program can generate SYN+ACK with syncookie and send
> > >>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
> > >>> which actually saves host CPU cycles to process the SYN in
> > >>> netfilter/TCP stack, which is actually good thing.
> > >>>
> > >>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
> > >>> program attached to the network interface, so it is the XDP program
> > >>> author decide what to do with the packet, if no XDP program attached
> > >>> to the network interface, everything works as usual, no interference
> > >>> from XDP.
> > >>
> > >> If my understanding of this is correct, then this would lead to the exact
> > >> opposite of what IPFire is designed to do. Rather than having packets
> > >> processed below any level of operating system influence, the objective of
> > >> IPFire in particular and firewalls in general is to control network traffic,
> > >> which inherently requires thorough visibility on it.
> > >
> > > Kernel still has the traffic statistics processed by XDP program and
> > > store in eBPF maps so the user space program can query and view. you
> > > can still view XDP as part of the firewall except it processes packets
> > > early at the driver layer for efficiency.
> >
> > I would like to understand what your need is to use XDP.
> >
> > As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
> >
> > * Connection Tracking won’t be up to date
> > * QoS won’t be able to categorise packets correctly and won’t be able to do its job
> > * The IPS won’t be able to inspect any data
> >
>
> I think I did not explain the XDP use case clearly, for now, most XDP
> use cases and particularly my use case is to do DDoS protection at
> the earliest packet receiving path in high efficiency since XDP works
> inside the network driver. the things you mentioned above would work
> fine even if the packets go through XDP program, yes XDP program can
> drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
> simply passes the packet to Linux as if nothing happened. so it is up
> to the XDP program logic, also even if ipfire has the kernel feature
> enabled, users still need to attach XDP program to the interface, if
> no XDP program is attached to the interface, nothing is in the way to
> stop packet flowing to IPfire filtering.
> Again this diagram is great to describe the packet path
> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
> so the XDP_PASS action from XDP program is to pass packet to Linux as
> usual. from the same diagram, you also see "AF_PACKET", right? that is
> where tcpdump taking place to capture packet for network
> troubleshooting, but tcpdump would not stops all the scenario above
> you mentioned working, actually tcpdump is based on classic BPF
> technology, the XDP/eBPF is to extended classic BPF technology, it not
> only can clone (packet capture), but can also drop, redirect. Please
> read more about eBPF/XDP in general if you would like, many online
> resources explain better than me :) > Those three are just a few, but
> they are commonly used features of IPFire and without them, it would
> not be what it is.
> >
> > >> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
> > >> the right hardware, and SYN flooding attacks are not a major threat to
> > >> IPFire users, given that we have historically implemented some fine-tuning
> > >> to make such attacks less viable.
> > >
> > > DDoS attacks to IPFire users do not happen now does not mean it will
> > > not happen in the future, SYN flood is just one scenario, so better be
> > > prepared than sorry later :) One IPFire user had asked for help
> > > https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
> >
> > Is this only about SYN flooding?
> >for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
> > > I have studied IPFire, I do not see relevant SYN flooding or DDoS
> > > tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
> > > syncookie implementation, or suricata ddos rules...etc? keep in mind
> > > all these are handled in software, no hardware acceleration.
> >
> > Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
> hardware acceleration probably is not the right word here for XDP
> because XDP is actually still in the software driver, not inside the
> hardware, though there is one hardware vendor that supports running
> XDP byte code inside the hardware itself for true hardware
> acceleration, but that is not common. again XDP does not interfere
> with the IPfire filter except in DDoS scenarios, users can have the
> option to drop the packet early in the network driver without
> consuming IPfire CPU/memory resource. >
> > IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
> home users very unlikely would have this demand because there isn't
> much gain for attackers who would use DDoS to attack home users. For
> small/medium size businesses, attackers could start DDoS because
> business could be impacted and lose profit when under DDoS attack,
> many businesses choose cloud DDoS providers if they could not afford
> DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
> protection on inexpensive commodity hardware. There are already a lot
> of open source XDP programs out there, including XDP SYNCookie from
> Linux kernel source, I have ported it to xdp-tool repo and ported
> xdp-tool to IPfire.
> >
> > -Michael
> >
> > > Why not give IPFire users the options when the options already exist
> > > in the IPFire kernel?
> > >
> > >>
> > >> Therefore, I - personally - neither see the necessity nor benefit of pursuing
> > >> this proposal at this time.
> > >>
> > >> Thanks, and best regards,
> > >> Peter Müller
> > >>
> > >>>
> > >>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
> > >>>>
> > >>>
> > >>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
> > >>> XDP program packet processing, XDP_TX is to redirect the packet back
> > >>> out through the same network interface after XDP program packet
> > >>> processing.
> > >>>
> > >>>> Regards,
> > >>>>
> > >>>> Adolf.
> > >>>>
> > >>>> On 09/04/2024 19:36, Vincent Li wrote:
> > >>>>> Hi,
> > >>>>>
> > >>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> > >>>>> please refer to
> > >>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> > >>>>> for where XDP fit in Linux network datapath, XDP will not interfere
> > >>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
> > >>>>> packet filtering at high speed, see
> > >>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
> > >>>>>
> > >>>>> I think we only need to enable XDP/TC network filtering capability
> > >>>>> without eBPF tracing capability which some users are concerned about
> > >>>>> potential host security information leaks.
> > >>>>>
> > >>>>> Please let me know what you think, thanks!
> > >>>>>
> > >>>>> Vincent
> >
> >
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-17 22:36 ` Vincent Li
2024-04-17 22:41 ` Vincent Li
@ 2024-04-18 8:57 ` Michael Tremer
2024-04-18 15:21 ` Vincent Li
1 sibling, 1 reply; 14+ messages in thread
From: Michael Tremer @ 2024-04-18 8:57 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 10233 bytes --]
Hello,
> On 17 Apr 2024, at 23:36, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>
> On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
> <michael.tremer(a)ipfire.org> wrote:
>>
>> Hello Vincent,
>>
>>> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>
>>> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>
>>>> Hello Vincent,
>>>>
>>>> thank you for your e-mail and the proposal.
>>>>
>>>>> Hi Adolf,
>>>>>
>>>>> Please see my reply inline
>>>>>
>>>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>>>>>
>>>>>> Hi Vincent,
>>>>>>
>>>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>>>>>>
>>>>> XDP_TX is to redirect the packet out after processing the packet at
>>>>> XDP stage, yes, netfilter will not see these packets.
>>>>> for example for DDoS SYN flood attack scenario, when the SYN packet
>>>>> is received, XDP program can generate SYN+ACK with syncookie and send
>>>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
>>>>> which actually saves host CPU cycles to process the SYN in
>>>>> netfilter/TCP stack, which is actually good thing.
>>>>>
>>>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
>>>>> program attached to the network interface, so it is the XDP program
>>>>> author decide what to do with the packet, if no XDP program attached
>>>>> to the network interface, everything works as usual, no interference
>>>>> from XDP.
>>>>
>>>> If my understanding of this is correct, then this would lead to the exact
>>>> opposite of what IPFire is designed to do. Rather than having packets
>>>> processed below any level of operating system influence, the objective of
>>>> IPFire in particular and firewalls in general is to control network traffic,
>>>> which inherently requires thorough visibility on it.
>>>
>>> Kernel still has the traffic statistics processed by XDP program and
>>> store in eBPF maps so the user space program can query and view. you
>>> can still view XDP as part of the firewall except it processes packets
>>> early at the driver layer for efficiency.
>>
>> I would like to understand what your need is to use XDP.
>>
>> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
>>
>> * Connection Tracking won’t be up to date
>> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
>> * The IPS won’t be able to inspect any data
>>
>
> I think I did not explain the XDP use case clearly, for now, most XDP
> use cases and particularly my use case is to do DDoS protection at
> the earliest packet receiving path in high efficiency since XDP works
> inside the network driver. the things you mentioned above would work
> fine even if the packets go through XDP program, yes XDP program can
> drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
> simply passes the packet to Linux as if nothing happened. so it is up
> to the XDP program logic, also even if ipfire has the kernel feature
> enabled, users still need to attach XDP program to the interface, if
> no XDP program is attached to the interface, nothing is in the way to
> stop packet flowing to IPfire filtering.
> Again this diagram is great to describe the packet path
> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
> so the XDP_PASS action from XDP program is to pass packet to Linux as
> usual. from the same diagram, you also see "AF_PACKET", right? that is
> where tcpdump taking place to capture packet for network
> troubleshooting, but tcpdump would not stops all the scenario above
> you mentioned working, actually tcpdump is based on classic BPF
> technology, the XDP/eBPF is to extended classic BPF technology, it not
> only can clone (packet capture), but can also drop, redirect. Please
> read more about eBPF/XDP in general if you would like, many online
> resources explain better than me :) > Those three are just a few, but
> they are commonly used features of IPFire and without them, it would
> not be what it is.
Thank you. I am very familiar with how Netfilter works, including BPF and XDP.
I think your diagram just proves my point when I say that everything is going to bypass the OS. That is the long arrow at the bottom.
At least I am assuming that you are interested in forwarding packets instead of going the “XDP_PASS” route, because for that you don’t need XDP?
I think you still haven’t explained what your goal is on a lower level. DoS protection is incredibly broad and that does not strictly require XDP. What kind of XDP program are you interested in using?
>>
>>>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
>>>> the right hardware, and SYN flooding attacks are not a major threat to
>>>> IPFire users, given that we have historically implemented some fine-tuning
>>>> to make such attacks less viable.
>>>
>>> DDoS attacks to IPFire users do not happen now does not mean it will
>>> not happen in the future, SYN flood is just one scenario, so better be
>>> prepared than sorry later :) One IPFire user had asked for help
>>> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
>>
>> Is this only about SYN flooding?
>> for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
>>> I have studied IPFire, I do not see relevant SYN flooding or DDoS
>>> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
>>> syncookie implementation, or suricata ddos rules...etc? keep in mind
>>> all these are handled in software, no hardware acceleration.
>>
>> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
> hardware acceleration probably is not the right word here for XDP
> because XDP is actually still in the software driver, not inside the
> hardware, though there is one hardware vendor that supports running
> XDP byte code inside the hardware itself for true hardware
> acceleration, but that is not common. again XDP does not interfere
> with the IPfire filter except in DDoS scenarios, users can have the
> option to drop the packet early in the network driver without
> consuming IPfire CPU/memory resource. >
But do you have any kind of system out there that is under constant fire and the OS cannot cope? What kind of packet rates or bandwidth are we talking about?
>> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
> home users very unlikely would have this demand because there isn't
> much gain for attackers who would use DDoS to attack home users. For
> small/medium size businesses, attackers could start DDoS because
> business could be impacted and lose profit when under DDoS attack,
> many businesses choose cloud DDoS providers if they could not afford
> DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
> protection on inexpensive commodity hardware. There are already a lot
> of open source XDP programs out there, including XDP SYNCookie from
> Linux kernel source, I have ported it to xdp-tool repo and ported
> xdp-tool to IPfire.
Maybe share this code on the list here so that people understand better what you are looking for.
I am still not sure what kind of changes you are asking us to make.
-Michael
>>
>> -Michael
>>
>>> Why not give IPFire users the options when the options already exist
>>> in the IPFire kernel?
>>>
>>>>
>>>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
>>>> this proposal at this time.
>>>>
>>>> Thanks, and best regards,
>>>> Peter Müller
>>>>
>>>>>
>>>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>>>>>>
>>>>>
>>>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
>>>>> XDP program packet processing, XDP_TX is to redirect the packet back
>>>>> out through the same network interface after XDP program packet
>>>>> processing.
>>>>>
>>>>>> Regards,
>>>>>>
>>>>>> Adolf.
>>>>>>
>>>>>> On 09/04/2024 19:36, Vincent Li wrote:
>>>>>>> Hi,
>>>>>>>
>>>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
>>>>>>> please refer to
>>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
>>>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
>>>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
>>>>>>> packet filtering at high speed, see
>>>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>>>>>>>
>>>>>>> I think we only need to enable XDP/TC network filtering capability
>>>>>>> without eBPF tracing capability which some users are concerned about
>>>>>>> potential host security information leaks.
>>>>>>>
>>>>>>> Please let me know what you think, thanks!
>>>>>>>
>>>>>>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-18 8:57 ` Michael Tremer
@ 2024-04-18 15:21 ` Vincent Li
2024-04-18 21:13 ` Michael Tremer
0 siblings, 1 reply; 14+ messages in thread
From: Vincent Li @ 2024-04-18 15:21 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 12748 bytes --]
On Thu, Apr 18, 2024 at 1:57 AM Michael Tremer
<michael.tremer(a)ipfire.org> wrote:
>
> Hello,
>
> > On 17 Apr 2024, at 23:36, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> >
> > On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
> > <michael.tremer(a)ipfire.org> wrote:
> >>
> >> Hello Vincent,
> >>
> >>> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> >>>
> >>> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
> >>>>
> >>>> Hello Vincent,
> >>>>
> >>>> thank you for your e-mail and the proposal.
> >>>>
> >>>>> Hi Adolf,
> >>>>>
> >>>>> Please see my reply inline
> >>>>>
> >>>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> >>>>>>
> >>>>>> Hi Vincent,
> >>>>>>
> >>>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
> >>>>>>
> >>>>> XDP_TX is to redirect the packet out after processing the packet at
> >>>>> XDP stage, yes, netfilter will not see these packets.
> >>>>> for example for DDoS SYN flood attack scenario, when the SYN packet
> >>>>> is received, XDP program can generate SYN+ACK with syncookie and send
> >>>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
> >>>>> which actually saves host CPU cycles to process the SYN in
> >>>>> netfilter/TCP stack, which is actually good thing.
> >>>>>
> >>>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
> >>>>> program attached to the network interface, so it is the XDP program
> >>>>> author decide what to do with the packet, if no XDP program attached
> >>>>> to the network interface, everything works as usual, no interference
> >>>>> from XDP.
> >>>>
> >>>> If my understanding of this is correct, then this would lead to the exact
> >>>> opposite of what IPFire is designed to do. Rather than having packets
> >>>> processed below any level of operating system influence, the objective of
> >>>> IPFire in particular and firewalls in general is to control network traffic,
> >>>> which inherently requires thorough visibility on it.
> >>>
> >>> Kernel still has the traffic statistics processed by XDP program and
> >>> store in eBPF maps so the user space program can query and view. you
> >>> can still view XDP as part of the firewall except it processes packets
> >>> early at the driver layer for efficiency.
> >>
> >> I would like to understand what your need is to use XDP.
> >>
> >> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
> >>
> >> * Connection Tracking won’t be up to date
> >> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
> >> * The IPS won’t be able to inspect any data
> >>
> >
> > I think I did not explain the XDP use case clearly, for now, most XDP
> > use cases and particularly my use case is to do DDoS protection at
> > the earliest packet receiving path in high efficiency since XDP works
> > inside the network driver. the things you mentioned above would work
> > fine even if the packets go through XDP program, yes XDP program can
> > drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
> > simply passes the packet to Linux as if nothing happened. so it is up
> > to the XDP program logic, also even if ipfire has the kernel feature
> > enabled, users still need to attach XDP program to the interface, if
> > no XDP program is attached to the interface, nothing is in the way to
> > stop packet flowing to IPfire filtering.
> > Again this diagram is great to describe the packet path
> > https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
> > so the XDP_PASS action from XDP program is to pass packet to Linux as
> > usual. from the same diagram, you also see "AF_PACKET", right? that is
> > where tcpdump taking place to capture packet for network
> > troubleshooting, but tcpdump would not stops all the scenario above
> > you mentioned working, actually tcpdump is based on classic BPF
> > technology, the XDP/eBPF is to extended classic BPF technology, it not
> > only can clone (packet capture), but can also drop, redirect. Please
> > read more about eBPF/XDP in general if you would like, many online
> > resources explain better than me :) > Those three are just a few, but
> > they are commonly used features of IPFire and without them, it would
> > not be what it is.
>
> Thank you. I am very familiar with how Netfilter works, including BPF and XDP.
>
> I think your diagram just proves my point when I say that everything is going to bypass the OS. That is the long arrow at the bottom.
>
I think you refer to the XDP_TX action to bypass the whole OS, for
IPFire, this is not recommended
> At least I am assuming that you are interested in forwarding packets instead of going the “XDP_PASS” route, because for that you don’t need XDP?
>
For IPFire, XDP_PASS action is recommended because we don't want to
bypass the OS, we only want to drop DDoS packet at the driver, the
good packet passes through the OS as usual.
> I think you still haven’t explained what your goal is on a lower level. DoS protection is incredibly broad and that does not strictly require XDP. What kind of XDP program are you interested in using?
>
use XDP to stop DoS has low overhead, save OS cycles, I have IPFire
KVM instance, if I run TCP SYN flood the IPFire, the IPFire ssh
session, WeUI session because sluggish and unresponsive, but with XDP,
it is almost like nothing happening, IPFire is responsive all the time
during flood attack.
these are the XDP program I am interested in using
https://elixir.bootlin.com/linux/latest/source/tools/testing/selftests/bpf/progs/xdp_synproxy_kern.c
https://github.com/NLnetLabs/XDPeriments
I had ported them to xdp-tools
https://github.com/vincentmli/xdp-tools/tree/vli-xdp-synproxy so
xdp-tools loader program could attach multiple XDP programs to red0
interface to stop various DDoS attack
> >>
> >>>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
> >>>> the right hardware, and SYN flooding attacks are not a major threat to
> >>>> IPFire users, given that we have historically implemented some fine-tuning
> >>>> to make such attacks less viable.
> >>>
> >>> DDoS attacks to IPFire users do not happen now does not mean it will
> >>> not happen in the future, SYN flood is just one scenario, so better be
> >>> prepared than sorry later :) One IPFire user had asked for help
> >>> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
> >>
> >> Is this only about SYN flooding?
> >> for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
> >>> I have studied IPFire, I do not see relevant SYN flooding or DDoS
> >>> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
> >>> syncookie implementation, or suricata ddos rules...etc? keep in mind
> >>> all these are handled in software, no hardware acceleration.
> >>
> >> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
> > hardware acceleration probably is not the right word here for XDP
> > because XDP is actually still in the software driver, not inside the
> > hardware, though there is one hardware vendor that supports running
> > XDP byte code inside the hardware itself for true hardware
> > acceleration, but that is not common. again XDP does not interfere
> > with the IPfire filter except in DDoS scenarios, users can have the
> > option to drop the packet early in the network driver without
> > consuming IPfire CPU/memory resource. >
>
> But do you have any kind of system out there that is under constant fire and the OS cannot cope? What kind of packet rates or bandwidth are we talking about?
I don't have IPFire in production since I am just starting to know
about the IPFire project. My day time job is enterprise network
engineer supporting fortune 500 enterprise customer with our
enterprise product (BIG-IP) which handles 10G/25G/40G or even 100G
throughput with FPGA, we often has enterprise customer under DDoS
attack, and sometime my day time job is to simulate such high
bandwidth attack in lab to see if enterprise product handles well or
not. I don't think IPFire can handle such flood attack since I know
the limitation of netfilter ( with more than 20 years of working with
Linux networking :))
>
> >> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
> > home users very unlikely would have this demand because there isn't
> > much gain for attackers who would use DDoS to attack home users. For
> > small/medium size businesses, attackers could start DDoS because
> > business could be impacted and lose profit when under DDoS attack,
> > many businesses choose cloud DDoS providers if they could not afford
> > DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
> > protection on inexpensive commodity hardware. There are already a lot
> > of open source XDP programs out there, including XDP SYNCookie from
> > Linux kernel source, I have ported it to xdp-tool repo and ported
> > xdp-tool to IPfire.
>
> Maybe share this code on the list here so that people understand better what you are looking for.
>
see above link I shared
> I am still not sure what kind of changes you are asking us to make.
>
actually the asking is minimum, turn on the kernel config feature
for eBPF for networking
CONFIG_BPF_SYSCALL=y
CONFIG_DEBUG_INFO=y
CONFIG_DEBUG_INFO_BTF=y
CONFIG_DEBUG_INFO_DWARF4=y
CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
I have a working fork of IPFire
https://github.com/vincentmli/BPFire/tree/bpfire, the discussion here
is I want to share that great technology with the IPFire community and
contribute that to IPFire.
Vincent
> -Michael
>
> >>
> >> -Michael
> >>
> >>> Why not give IPFire users the options when the options already exist
> >>> in the IPFire kernel?
> >>>
> >>>>
> >>>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
> >>>> this proposal at this time.
> >>>>
> >>>> Thanks, and best regards,
> >>>> Peter Müller
> >>>>
> >>>>>
> >>>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
> >>>>>>
> >>>>>
> >>>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
> >>>>> XDP program packet processing, XDP_TX is to redirect the packet back
> >>>>> out through the same network interface after XDP program packet
> >>>>> processing.
> >>>>>
> >>>>>> Regards,
> >>>>>>
> >>>>>> Adolf.
> >>>>>>
> >>>>>> On 09/04/2024 19:36, Vincent Li wrote:
> >>>>>>> Hi,
> >>>>>>>
> >>>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> >>>>>>> please refer to
> >>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> >>>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
> >>>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
> >>>>>>> packet filtering at high speed, see
> >>>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
> >>>>>>>
> >>>>>>> I think we only need to enable XDP/TC network filtering capability
> >>>>>>> without eBPF tracing capability which some users are concerned about
> >>>>>>> potential host security information leaks.
> >>>>>>>
> >>>>>>> Please let me know what you think, thanks!
> >>>>>>>
> >>>>>>> Vincent
>
>
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-18 15:21 ` Vincent Li
@ 2024-04-18 21:13 ` Michael Tremer
2024-04-19 0:17 ` Vincent Li
0 siblings, 1 reply; 14+ messages in thread
From: Michael Tremer @ 2024-04-18 21:13 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 15668 bytes --]
Hello Vincent,
> On 18 Apr 2024, at 16:21, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>
> On Thu, Apr 18, 2024 at 1:57 AM Michael Tremer
> <michael.tremer(a)ipfire.org> wrote:
>>
>> Hello,
>>
>>> On 17 Apr 2024, at 23:36, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>
>>> On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
>>> <michael.tremer(a)ipfire.org> wrote:
>>>>
>>>> Hello Vincent,
>>>>
>>>>> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>>>
>>>>> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>>>
>>>>>> Hello Vincent,
>>>>>>
>>>>>> thank you for your e-mail and the proposal.
>>>>>>
>>>>>>> Hi Adolf,
>>>>>>>
>>>>>>> Please see my reply inline
>>>>>>>
>>>>>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>>>>>>>
>>>>>>>> Hi Vincent,
>>>>>>>>
>>>>>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>>>>>>>>
>>>>>>> XDP_TX is to redirect the packet out after processing the packet at
>>>>>>> XDP stage, yes, netfilter will not see these packets.
>>>>>>> for example for DDoS SYN flood attack scenario, when the SYN packet
>>>>>>> is received, XDP program can generate SYN+ACK with syncookie and send
>>>>>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
>>>>>>> which actually saves host CPU cycles to process the SYN in
>>>>>>> netfilter/TCP stack, which is actually good thing.
>>>>>>>
>>>>>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
>>>>>>> program attached to the network interface, so it is the XDP program
>>>>>>> author decide what to do with the packet, if no XDP program attached
>>>>>>> to the network interface, everything works as usual, no interference
>>>>>>> from XDP.
>>>>>>
>>>>>> If my understanding of this is correct, then this would lead to the exact
>>>>>> opposite of what IPFire is designed to do. Rather than having packets
>>>>>> processed below any level of operating system influence, the objective of
>>>>>> IPFire in particular and firewalls in general is to control network traffic,
>>>>>> which inherently requires thorough visibility on it.
>>>>>
>>>>> Kernel still has the traffic statistics processed by XDP program and
>>>>> store in eBPF maps so the user space program can query and view. you
>>>>> can still view XDP as part of the firewall except it processes packets
>>>>> early at the driver layer for efficiency.
>>>>
>>>> I would like to understand what your need is to use XDP.
>>>>
>>>> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
>>>>
>>>> * Connection Tracking won’t be up to date
>>>> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
>>>> * The IPS won’t be able to inspect any data
>>>>
>>>
>>> I think I did not explain the XDP use case clearly, for now, most XDP
>>> use cases and particularly my use case is to do DDoS protection at
>>> the earliest packet receiving path in high efficiency since XDP works
>>> inside the network driver. the things you mentioned above would work
>>> fine even if the packets go through XDP program, yes XDP program can
>>> drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
>>> simply passes the packet to Linux as if nothing happened. so it is up
>>> to the XDP program logic, also even if ipfire has the kernel feature
>>> enabled, users still need to attach XDP program to the interface, if
>>> no XDP program is attached to the interface, nothing is in the way to
>>> stop packet flowing to IPfire filtering.
>>> Again this diagram is great to describe the packet path
>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
>>> so the XDP_PASS action from XDP program is to pass packet to Linux as
>>> usual. from the same diagram, you also see "AF_PACKET", right? that is
>>> where tcpdump taking place to capture packet for network
>>> troubleshooting, but tcpdump would not stops all the scenario above
>>> you mentioned working, actually tcpdump is based on classic BPF
>>> technology, the XDP/eBPF is to extended classic BPF technology, it not
>>> only can clone (packet capture), but can also drop, redirect. Please
>>> read more about eBPF/XDP in general if you would like, many online
>>> resources explain better than me :) > Those three are just a few, but
>>> they are commonly used features of IPFire and without them, it would
>>> not be what it is.
>>
>> Thank you. I am very familiar with how Netfilter works, including BPF and XDP.
>>
>> I think your diagram just proves my point when I say that everything is going to bypass the OS. That is the long arrow at the bottom.
>>
> I think you refer to the XDP_TX action to bypass the whole OS, for
> IPFire, this is not recommended
I think it is safe to assume that this is the core feature of XDP is what most people mean when they refer to it.
>> At least I am assuming that you are interested in forwarding packets instead of going the “XDP_PASS” route, because for that you don’t need XDP?
>>
>
> For IPFire, XDP_PASS action is recommended because we don't want to
> bypass the OS, we only want to drop DDoS packet at the driver, the
> good packet passes through the OS as usual.
You did not make at clear at all that your goal is to implement SYNPROXY with BPF.
You still do not want to bypass the OS, you just want to bypass Netfilter. So let’s maybe try to be more clear with what we are referring to so that we will save many roundtrips.
>> I think you still haven’t explained what your goal is on a lower level. DoS protection is incredibly broad and that does not strictly require XDP. What kind of XDP program are you interested in using?
>>
> use XDP to stop DoS has low overhead, save OS cycles, I have IPFire
> KVM instance, if I run TCP SYN flood the IPFire, the IPFire ssh
> session, WeUI session because sluggish and unresponsive, but with XDP,
> it is almost like nothing happening, IPFire is responsive all the time
> during flood attack.
Could you describe your test scenario more, please?
The Linux kernel is already using SYN cookies whenever it cannot keep up with processing all SYN packets that it receives. That can be configured with net.ipv4.tcp_max_syn_backlog which is set to 256 on my system. That should be low enough to trigger the mechanism.
Using a KVM-virtualised machine is probably not the best way to deploy this in production as interrupts are expensive and you are competing for compute power with other machines on the host. But I am sure this is just your test environment.
> these are the XDP program I am interested in using
> https://elixir.bootlin.com/linux/latest/source/tools/testing/selftests/bpf/progs/xdp_synproxy_kern.c
Okay, so this does not DoS protect in a strict sense. It just moves the part of SYNPROXY into the driver. I believe this is your primary goal here.
> https://github.com/NLnetLabs/XDPeriments
>
> I had ported them to xdp-tools
> https://github.com/vincentmli/xdp-tools/tree/vli-xdp-synproxy so
> xdp-tools loader program could attach multiple XDP programs to red0
> interface to stop various DDoS attack
Thank you for sharing this.
>
>>>>
>>>>>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
>>>>>> the right hardware, and SYN flooding attacks are not a major threat to
>>>>>> IPFire users, given that we have historically implemented some fine-tuning
>>>>>> to make such attacks less viable.
>>>>>
>>>>> DDoS attacks to IPFire users do not happen now does not mean it will
>>>>> not happen in the future, SYN flood is just one scenario, so better be
>>>>> prepared than sorry later :) One IPFire user had asked for help
>>>>> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
>>>>
>>>> Is this only about SYN flooding?
>>>> for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
>>>>> I have studied IPFire, I do not see relevant SYN flooding or DDoS
>>>>> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
>>>>> syncookie implementation, or suricata ddos rules...etc? keep in mind
>>>>> all these are handled in software, no hardware acceleration.
>>>>
>>>> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
>>> hardware acceleration probably is not the right word here for XDP
>>> because XDP is actually still in the software driver, not inside the
>>> hardware, though there is one hardware vendor that supports running
>>> XDP byte code inside the hardware itself for true hardware
>>> acceleration, but that is not common. again XDP does not interfere
>>> with the IPfire filter except in DDoS scenarios, users can have the
>>> option to drop the packet early in the network driver without
>>> consuming IPfire CPU/memory resource. >
>>
>> But do you have any kind of system out there that is under constant fire and the OS cannot cope? What kind of packet rates or bandwidth are we talking about?
>
> I don't have IPFire in production since I am just starting to know
> about the IPFire project. My day time job is enterprise network
> engineer supporting fortune 500 enterprise customer with our
> enterprise product (BIG-IP) which handles 10G/25G/40G or even 100G
> throughput with FPGA, we often has enterprise customer under DDoS
> attack, and sometime my day time job is to simulate such high
> bandwidth attack in lab to see if enterprise product handles well or
> not. I don't think IPFire can handle such flood attack since I know
> the limitation of netfilter ( with more than 20 years of working with
> Linux networking :))
Do you have any figures how much your test environment can handle now compared to a stock IPFire without your changes?
>>>> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
>>> home users very unlikely would have this demand because there isn't
>>> much gain for attackers who would use DDoS to attack home users. For
>>> small/medium size businesses, attackers could start DDoS because
>>> business could be impacted and lose profit when under DDoS attack,
>>> many businesses choose cloud DDoS providers if they could not afford
>>> DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
>>> protection on inexpensive commodity hardware. There are already a lot
>>> of open source XDP programs out there, including XDP SYNCookie from
>>> Linux kernel source, I have ported it to xdp-tool repo and ported
>>> xdp-tool to IPfire.
>>
>> Maybe share this code on the list here so that people understand better what you are looking for.
>>
> see above link I shared
>
>> I am still not sure what kind of changes you are asking us to make.
>>
> actually the asking is minimum, turn on the kernel config feature
> for eBPF for networking
You say as a minimum, but you have not asked this before. Usually we handle this in the way that people send an email with a description of their feature and if there is generally an option to include this in the distribution. If agreed, then you can work on some code and send it to this list.
> CONFIG_BPF_SYSCALL=y
> CONFIG_DEBUG_INFO=y
> CONFIG_DEBUG_INFO_BTF=y
> CONFIG_DEBUG_INFO_DWARF4=y
> CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
We don’t need any of those debugging symbols in production. They are actually really large and will make the kernel slower.
I have just posted a suggestion to the list as we are going to ship a fresh kernel with the next Core Update:
https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/QYG5SEVSEK53KKW3KAGTPQBC4S654BQW/
> I have a working fork of IPFire
> https://github.com/vincentmli/BPFire/tree/bpfire, the discussion here
> is I want to share that great technology with the IPFire community and
> contribute that to IPFire.
I was entirely unaware that you have written any code here. And I was also entirely unaware what your goal was. Thankfully we are on the same page now.
Since I didn’t know that you have written some code, I implemented a classic SYN proxy using Netfilter this afternoon:
https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/5PUYYFTQBIOIRGIIV55PYSA5LJ5S3OVP/
I believe that this does what you want to do, although it does not use BPF/XDP. However, it has the advantage that it can be enabled on a per rule basis and does not have to be globally enabled for all incoming connection to that host. How could BPF/XDP be integrated into this without losing that functionality?
Best,
-Michael
>
> Vincent
>
>
>> -Michael
>>
>>>>
>>>> -Michael
>>>>
>>>>> Why not give IPFire users the options when the options already exist
>>>>> in the IPFire kernel?
>>>>>
>>>>>>
>>>>>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
>>>>>> this proposal at this time.
>>>>>>
>>>>>> Thanks, and best regards,
>>>>>> Peter Müller
>>>>>>
>>>>>>>
>>>>>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>>>>>>>>
>>>>>>>
>>>>>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
>>>>>>> XDP program packet processing, XDP_TX is to redirect the packet back
>>>>>>> out through the same network interface after XDP program packet
>>>>>>> processing.
>>>>>>>
>>>>>>>> Regards,
>>>>>>>>
>>>>>>>> Adolf.
>>>>>>>>
>>>>>>>> On 09/04/2024 19:36, Vincent Li wrote:
>>>>>>>>> Hi,
>>>>>>>>>
>>>>>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
>>>>>>>>> please refer to
>>>>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
>>>>>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
>>>>>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
>>>>>>>>> packet filtering at high speed, see
>>>>>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>>>>>>>>>
>>>>>>>>> I think we only need to enable XDP/TC network filtering capability
>>>>>>>>> without eBPF tracing capability which some users are concerned about
>>>>>>>>> potential host security information leaks.
>>>>>>>>>
>>>>>>>>> Please let me know what you think, thanks!
>>>>>>>>>
>>>>>>>>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-18 21:13 ` Michael Tremer
@ 2024-04-19 0:17 ` Vincent Li
2024-04-24 15:28 ` Michael Tremer
0 siblings, 1 reply; 14+ messages in thread
From: Vincent Li @ 2024-04-19 0:17 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 18754 bytes --]
On Thu, Apr 18, 2024 at 2:13 PM Michael Tremer
<michael.tremer(a)ipfire.org> wrote:
>
> Hello Vincent,
>
> > On 18 Apr 2024, at 16:21, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> >
> > On Thu, Apr 18, 2024 at 1:57 AM Michael Tremer
> > <michael.tremer(a)ipfire.org> wrote:
> >>
> >> Hello,
> >>
> >>> On 17 Apr 2024, at 23:36, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> >>>
> >>> On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
> >>> <michael.tremer(a)ipfire.org> wrote:
> >>>>
> >>>> Hello Vincent,
> >>>>
> >>>>> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
> >>>>>
> >>>>> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
> >>>>>>
> >>>>>> Hello Vincent,
> >>>>>>
> >>>>>> thank you for your e-mail and the proposal.
> >>>>>>
> >>>>>>> Hi Adolf,
> >>>>>>>
> >>>>>>> Please see my reply inline
> >>>>>>>
> >>>>>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> >>>>>>>>
> >>>>>>>> Hi Vincent,
> >>>>>>>>
> >>>>>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
> >>>>>>>>
> >>>>>>> XDP_TX is to redirect the packet out after processing the packet at
> >>>>>>> XDP stage, yes, netfilter will not see these packets.
> >>>>>>> for example for DDoS SYN flood attack scenario, when the SYN packet
> >>>>>>> is received, XDP program can generate SYN+ACK with syncookie and send
> >>>>>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
> >>>>>>> which actually saves host CPU cycles to process the SYN in
> >>>>>>> netfilter/TCP stack, which is actually good thing.
> >>>>>>>
> >>>>>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
> >>>>>>> program attached to the network interface, so it is the XDP program
> >>>>>>> author decide what to do with the packet, if no XDP program attached
> >>>>>>> to the network interface, everything works as usual, no interference
> >>>>>>> from XDP.
> >>>>>>
> >>>>>> If my understanding of this is correct, then this would lead to the exact
> >>>>>> opposite of what IPFire is designed to do. Rather than having packets
> >>>>>> processed below any level of operating system influence, the objective of
> >>>>>> IPFire in particular and firewalls in general is to control network traffic,
> >>>>>> which inherently requires thorough visibility on it.
> >>>>>
> >>>>> Kernel still has the traffic statistics processed by XDP program and
> >>>>> store in eBPF maps so the user space program can query and view. you
> >>>>> can still view XDP as part of the firewall except it processes packets
> >>>>> early at the driver layer for efficiency.
> >>>>
> >>>> I would like to understand what your need is to use XDP.
> >>>>
> >>>> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
> >>>>
> >>>> * Connection Tracking won’t be up to date
> >>>> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
> >>>> * The IPS won’t be able to inspect any data
> >>>>
> >>>
> >>> I think I did not explain the XDP use case clearly, for now, most XDP
> >>> use cases and particularly my use case is to do DDoS protection at
> >>> the earliest packet receiving path in high efficiency since XDP works
> >>> inside the network driver. the things you mentioned above would work
> >>> fine even if the packets go through XDP program, yes XDP program can
> >>> drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
> >>> simply passes the packet to Linux as if nothing happened. so it is up
> >>> to the XDP program logic, also even if ipfire has the kernel feature
> >>> enabled, users still need to attach XDP program to the interface, if
> >>> no XDP program is attached to the interface, nothing is in the way to
> >>> stop packet flowing to IPfire filtering.
> >>> Again this diagram is great to describe the packet path
> >>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
> >>> so the XDP_PASS action from XDP program is to pass packet to Linux as
> >>> usual. from the same diagram, you also see "AF_PACKET", right? that is
> >>> where tcpdump taking place to capture packet for network
> >>> troubleshooting, but tcpdump would not stops all the scenario above
> >>> you mentioned working, actually tcpdump is based on classic BPF
> >>> technology, the XDP/eBPF is to extended classic BPF technology, it not
> >>> only can clone (packet capture), but can also drop, redirect. Please
> >>> read more about eBPF/XDP in general if you would like, many online
> >>> resources explain better than me :) > Those three are just a few, but
> >>> they are commonly used features of IPFire and without them, it would
> >>> not be what it is.
> >>
> >> Thank you. I am very familiar with how Netfilter works, including BPF and XDP.
> >>
> >> I think your diagram just proves my point when I say that everything is going to bypass the OS. That is the long arrow at the bottom.
> >>
> > I think you refer to the XDP_TX action to bypass the whole OS, for
> > IPFire, this is not recommended
>
> I think it is safe to assume that this is the core feature of XDP is what most people mean when they refer to it.
>
> >> At least I am assuming that you are interested in forwarding packets instead of going the “XDP_PASS” route, because for that you don’t need XDP?
> >>
> >
> > For IPFire, XDP_PASS action is recommended because we don't want to
> > bypass the OS, we only want to drop DDoS packet at the driver, the
> > good packet passes through the OS as usual.
>
> You did not make at clear at all that your goal is to implement SYNPROXY with BPF.
>
> You still do not want to bypass the OS, you just want to bypass Netfilter. So let’s maybe try to be more clear with what we are referring to so that we will save many roundtrips.
>
I assumed everyone knows what I was talking about in my first email
with the https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf,
apparently I failed :)
> >> I think you still haven’t explained what your goal is on a lower level. DoS protection is incredibly broad and that does not strictly require XDP. What kind of XDP program are you interested in using?
> >>
> > use XDP to stop DoS has low overhead, save OS cycles, I have IPFire
> > KVM instance, if I run TCP SYN flood the IPFire, the IPFire ssh
> > session, WeUI session because sluggish and unresponsive, but with XDP,
> > it is almost like nothing happening, IPFire is responsive all the time
> > during flood attack.
>
> Could you describe your test scenario more, please?
>
> The Linux kernel is already using SYN cookies whenever it cannot keep up with processing all SYN packets that it receives. That can be configured with net.ipv4.tcp_max_syn_backlog which is set to 256 on my system. That should be low enough to trigger the mechanism.
>
yes, that is for protection for services listening on the Linux host itself.
> Using a KVM-virtualised machine is probably not the best way to deploy this in production as interrupts are expensive and you are competing for compute power with other machines on the host. But I am sure this is just your test environment.
>
This is my hobby project so I used KVM, but also I used a virtual
machine for the client starting SYN flood, so it is comparable. If I
can afford a physical server with 10/25G NIC and a client machine with
the same capability, the result will likely be the same.
> > these are the XDP program I am interested in using
> > https://elixir.bootlin.com/linux/latest/source/tools/testing/selftests/bpf/progs/xdp_synproxy_kern.c
>
> Okay, so this does not DoS protect in a strict sense. It just moves the part of SYNPROXY into the driver. I believe this is your primary goal here.
>
right, it does what SYNPROXY does, but way more efficiently, page 24
of above xdp pdf link shows result.
> > https://github.com/NLnetLabs/XDPeriments
> >
> > I had ported them to xdp-tools
> > https://github.com/vincentmli/xdp-tools/tree/vli-xdp-synproxy so
> > xdp-tools loader program could attach multiple XDP programs to red0
> > interface to stop various DDoS attack
>
> Thank you for sharing this.
>
> >
> >>>>
> >>>>>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
> >>>>>> the right hardware, and SYN flooding attacks are not a major threat to
> >>>>>> IPFire users, given that we have historically implemented some fine-tuning
> >>>>>> to make such attacks less viable.
> >>>>>
> >>>>> DDoS attacks to IPFire users do not happen now does not mean it will
> >>>>> not happen in the future, SYN flood is just one scenario, so better be
> >>>>> prepared than sorry later :) One IPFire user had asked for help
> >>>>> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
> >>>>
> >>>> Is this only about SYN flooding?
> >>>> for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
> >>>>> I have studied IPFire, I do not see relevant SYN flooding or DDoS
> >>>>> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
> >>>>> syncookie implementation, or suricata ddos rules...etc? keep in mind
> >>>>> all these are handled in software, no hardware acceleration.
> >>>>
> >>>> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
> >>> hardware acceleration probably is not the right word here for XDP
> >>> because XDP is actually still in the software driver, not inside the
> >>> hardware, though there is one hardware vendor that supports running
> >>> XDP byte code inside the hardware itself for true hardware
> >>> acceleration, but that is not common. again XDP does not interfere
> >>> with the IPfire filter except in DDoS scenarios, users can have the
> >>> option to drop the packet early in the network driver without
> >>> consuming IPfire CPU/memory resource. >
> >>
> >> But do you have any kind of system out there that is under constant fire and the OS cannot cope? What kind of packet rates or bandwidth are we talking about?
> >
> > I don't have IPFire in production since I am just starting to know
> > about the IPFire project. My day time job is enterprise network
> > engineer supporting fortune 500 enterprise customer with our
> > enterprise product (BIG-IP) which handles 10G/25G/40G or even 100G
> > throughput with FPGA, we often has enterprise customer under DDoS
> > attack, and sometime my day time job is to simulate such high
> > bandwidth attack in lab to see if enterprise product handles well or
> > not. I don't think IPFire can handle such flood attack since I know
> > the limitation of netfilter ( with more than 20 years of working with
> > Linux networking :))
>
> Do you have any figures how much your test environment can handle now compared to a stock IPFire without your changes?
>
I don't, but I think the xdp pdf link I referred to should answer, if
the performance is not significant, the kernel community would not
accept such feature.
> >>>> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
> >>> home users very unlikely would have this demand because there isn't
> >>> much gain for attackers who would use DDoS to attack home users. For
> >>> small/medium size businesses, attackers could start DDoS because
> >>> business could be impacted and lose profit when under DDoS attack,
> >>> many businesses choose cloud DDoS providers if they could not afford
> >>> DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
> >>> protection on inexpensive commodity hardware. There are already a lot
> >>> of open source XDP programs out there, including XDP SYNCookie from
> >>> Linux kernel source, I have ported it to xdp-tool repo and ported
> >>> xdp-tool to IPfire.
> >>
> >> Maybe share this code on the list here so that people understand better what you are looking for.
> >>
> > see above link I shared
> >
> >> I am still not sure what kind of changes you are asking us to make.
> >>
> > actually the asking is minimum, turn on the kernel config feature
> > for eBPF for networking
>
> You say as a minimum, but you have not asked this before. Usually we handle this in the way that people send an email with a description of their feature and if there is generally an option to include this in the distribution. If agreed, then you can work on some code and send it to this list.
>
yep, should have asked this in the beginning.
> > CONFIG_BPF_SYSCALL=y
> > CONFIG_DEBUG_INFO=y
> > CONFIG_DEBUG_INFO_BTF=y
> > CONFIG_DEBUG_INFO_DWARF4=y
> > CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
>
> We don’t need any of those debugging symbols in production. They are actually really large and will make the kernel slower.
>
the debug symbols is required during build time for kernel image, but
can be stripped after BTF is generated for kernel image
> I have just posted a suggestion to the list as we are going to ship a fresh kernel with the next Core Update:
>
> https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/QYG5SEVSEK53KKW3KAGTPQBC4S654BQW/
>
> > I have a working fork of IPFire
> > https://github.com/vincentmli/BPFire/tree/bpfire, the discussion here
> > is I want to share that great technology with the IPFire community and
> > contribute that to IPFire.
>
> I was entirely unaware that you have written any code here. And I was also entirely unaware what your goal was. Thankfully we are on the same page now.
>
> Since I didn’t know that you have written some code, I implemented a classic SYN proxy using Netfilter this afternoon:
>
> https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/5PUYYFTQBIOIRGIIV55PYSA5LJ5S3OVP/
>
> I believe that this does what you want to do, although it does not use BPF/XDP. However, it has the advantage that it can be enabled on a per rule basis and does not have to be globally enabled for all incoming connection to that host. How could BPF/XDP be integrated into this without losing that functionality?
>
enabled kernel config feature for XDP does not mean all incoming
traffic will be processed by XDP, the incoming traffic will only be
processed if there is XDP program bytecode/machine code attached to
the incoming network interface, so it is up to what individual XDP
program does
for example XDP program below, it does nothing, simply pass every
packet/connection to the netfilter/OS
SEC("xdp")
int xdp_pass(struct xdp_md *ctx)
{
return XDP_PASS;
}
another XDP program example to drop packet to port 5555
SEC("xdp")
int xdp_drop(struct xdp_md *ctx)
{
... code to parse the raw packet header..
if tcp->dest == 5555
return XDP_DROP;
}
so you could attach none or many XDP programs to the network
interface, the XDP program developers have to write the XDP program
based on what users want.
The XDP synproxy program is more complicated than the above example,
but it also only does filtering on a per port basis and configurable
by user.
for example snippet of the code:
/* Pass to upper stack if port requires no syncookie handling */
if (!check_port_allowed(bpf_ntohs(hdr->tcp->dest)))
return XDP_PASS;
so for example if user only want port 80 syn flood protected by the
XDP syncookie program , user can add port 80 to the ebpf map that
function check_port_allowed looks up ( in my fork I already added
IPFire UI option for user to do that), for all other ports, XDP
program does nothing about it, simply pass it to netfilter/OS.
> Best,
> -Michael
>
> >
> > Vincent
> >
> >
> >> -Michael
> >>
> >>>>
> >>>> -Michael
> >>>>
> >>>>> Why not give IPFire users the options when the options already exist
> >>>>> in the IPFire kernel?
> >>>>>
> >>>>>>
> >>>>>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
> >>>>>> this proposal at this time.
> >>>>>>
> >>>>>> Thanks, and best regards,
> >>>>>> Peter Müller
> >>>>>>
> >>>>>>>
> >>>>>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
> >>>>>>>>
> >>>>>>>
> >>>>>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
> >>>>>>> XDP program packet processing, XDP_TX is to redirect the packet back
> >>>>>>> out through the same network interface after XDP program packet
> >>>>>>> processing.
> >>>>>>>
> >>>>>>>> Regards,
> >>>>>>>>
> >>>>>>>> Adolf.
> >>>>>>>>
> >>>>>>>> On 09/04/2024 19:36, Vincent Li wrote:
> >>>>>>>>> Hi,
> >>>>>>>>>
> >>>>>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
> >>>>>>>>> please refer to
> >>>>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
> >>>>>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
> >>>>>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
> >>>>>>>>> packet filtering at high speed, see
> >>>>>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
> >>>>>>>>>
> >>>>>>>>> I think we only need to enable XDP/TC network filtering capability
> >>>>>>>>> without eBPF tracing capability which some users are concerned about
> >>>>>>>>> potential host security information leaks.
> >>>>>>>>>
> >>>>>>>>> Please let me know what you think, thanks!
> >>>>>>>>>
> >>>>>>>>> Vincent
>
>
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
2024-04-19 0:17 ` Vincent Li
@ 2024-04-24 15:28 ` Michael Tremer
0 siblings, 0 replies; 14+ messages in thread
From: Michael Tremer @ 2024-04-24 15:28 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 20547 bytes --]
Hello,
> On 19 Apr 2024, at 02:17, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>
> On Thu, Apr 18, 2024 at 2:13 PM Michael Tremer
> <michael.tremer(a)ipfire.org> wrote:
>>
>> Hello Vincent,
>>
>>> On 18 Apr 2024, at 16:21, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>
>>> On Thu, Apr 18, 2024 at 1:57 AM Michael Tremer
>>> <michael.tremer(a)ipfire.org> wrote:
>>>>
>>>> Hello,
>>>>
>>>>> On 17 Apr 2024, at 23:36, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>>>
>>>>> On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
>>>>> <michael.tremer(a)ipfire.org> wrote:
>>>>>>
>>>>>> Hello Vincent,
>>>>>>
>>>>>>> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>>>>>
>>>>>>> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>>>>>
>>>>>>>> Hello Vincent,
>>>>>>>>
>>>>>>>> thank you for your e-mail and the proposal.
>>>>>>>>
>>>>>>>>> Hi Adolf,
>>>>>>>>>
>>>>>>>>> Please see my reply inline
>>>>>>>>>
>>>>>>>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>>>>>>>>>
>>>>>>>>>> Hi Vincent,
>>>>>>>>>>
>>>>>>>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>>>>>>>>>>
>>>>>>>>> XDP_TX is to redirect the packet out after processing the packet at
>>>>>>>>> XDP stage, yes, netfilter will not see these packets.
>>>>>>>>> for example for DDoS SYN flood attack scenario, when the SYN packet
>>>>>>>>> is received, XDP program can generate SYN+ACK with syncookie and send
>>>>>>>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
>>>>>>>>> which actually saves host CPU cycles to process the SYN in
>>>>>>>>> netfilter/TCP stack, which is actually good thing.
>>>>>>>>>
>>>>>>>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
>>>>>>>>> program attached to the network interface, so it is the XDP program
>>>>>>>>> author decide what to do with the packet, if no XDP program attached
>>>>>>>>> to the network interface, everything works as usual, no interference
>>>>>>>>> from XDP.
>>>>>>>>
>>>>>>>> If my understanding of this is correct, then this would lead to the exact
>>>>>>>> opposite of what IPFire is designed to do. Rather than having packets
>>>>>>>> processed below any level of operating system influence, the objective of
>>>>>>>> IPFire in particular and firewalls in general is to control network traffic,
>>>>>>>> which inherently requires thorough visibility on it.
>>>>>>>
>>>>>>> Kernel still has the traffic statistics processed by XDP program and
>>>>>>> store in eBPF maps so the user space program can query and view. you
>>>>>>> can still view XDP as part of the firewall except it processes packets
>>>>>>> early at the driver layer for efficiency.
>>>>>>
>>>>>> I would like to understand what your need is to use XDP.
>>>>>>
>>>>>> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
>>>>>>
>>>>>> * Connection Tracking won’t be up to date
>>>>>> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
>>>>>> * The IPS won’t be able to inspect any data
>>>>>>
>>>>>
>>>>> I think I did not explain the XDP use case clearly, for now, most XDP
>>>>> use cases and particularly my use case is to do DDoS protection at
>>>>> the earliest packet receiving path in high efficiency since XDP works
>>>>> inside the network driver. the things you mentioned above would work
>>>>> fine even if the packets go through XDP program, yes XDP program can
>>>>> drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
>>>>> simply passes the packet to Linux as if nothing happened. so it is up
>>>>> to the XDP program logic, also even if ipfire has the kernel feature
>>>>> enabled, users still need to attach XDP program to the interface, if
>>>>> no XDP program is attached to the interface, nothing is in the way to
>>>>> stop packet flowing to IPfire filtering.
>>>>> Again this diagram is great to describe the packet path
>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
>>>>> so the XDP_PASS action from XDP program is to pass packet to Linux as
>>>>> usual. from the same diagram, you also see "AF_PACKET", right? that is
>>>>> where tcpdump taking place to capture packet for network
>>>>> troubleshooting, but tcpdump would not stops all the scenario above
>>>>> you mentioned working, actually tcpdump is based on classic BPF
>>>>> technology, the XDP/eBPF is to extended classic BPF technology, it not
>>>>> only can clone (packet capture), but can also drop, redirect. Please
>>>>> read more about eBPF/XDP in general if you would like, many online
>>>>> resources explain better than me :) > Those three are just a few, but
>>>>> they are commonly used features of IPFire and without them, it would
>>>>> not be what it is.
>>>>
>>>> Thank you. I am very familiar with how Netfilter works, including BPF and XDP.
>>>>
>>>> I think your diagram just proves my point when I say that everything is going to bypass the OS. That is the long arrow at the bottom.
>>>>
>>> I think you refer to the XDP_TX action to bypass the whole OS, for
>>> IPFire, this is not recommended
>>
>> I think it is safe to assume that this is the core feature of XDP is what most people mean when they refer to it.
>>
>>>> At least I am assuming that you are interested in forwarding packets instead of going the “XDP_PASS” route, because for that you don’t need XDP?
>>>>
>>>
>>> For IPFire, XDP_PASS action is recommended because we don't want to
>>> bypass the OS, we only want to drop DDoS packet at the driver, the
>>> good packet passes through the OS as usual.
>>
>> You did not make at clear at all that your goal is to implement SYNPROXY with BPF.
>>
>> You still do not want to bypass the OS, you just want to bypass Netfilter. So let’s maybe try to be more clear with what we are referring to so that we will save many roundtrips.
>>
>
> I assumed everyone knows what I was talking about in my first email
> with the https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf,
> apparently I failed :)
Well, I don’t think it is very efficient to ask people to read through a long presentation to find the thing that you want. You should briefly explain it in your own words and link further references.
>>>> I think you still haven’t explained what your goal is on a lower level. DoS protection is incredibly broad and that does not strictly require XDP. What kind of XDP program are you interested in using?
>>>>
>>> use XDP to stop DoS has low overhead, save OS cycles, I have IPFire
>>> KVM instance, if I run TCP SYN flood the IPFire, the IPFire ssh
>>> session, WeUI session because sluggish and unresponsive, but with XDP,
>>> it is almost like nothing happening, IPFire is responsive all the time
>>> during flood attack.
>>
>> Could you describe your test scenario more, please?
>>
>> The Linux kernel is already using SYN cookies whenever it cannot keep up with processing all SYN packets that it receives. That can be configured with net.ipv4.tcp_max_syn_backlog which is set to 256 on my system. That should be low enough to trigger the mechanism.
>>
> yes, that is for protection for services listening on the Linux host itself.
Ah okay, I wasn’t aware that we were talking about port forwardings.
>> Using a KVM-virtualised machine is probably not the best way to deploy this in production as interrupts are expensive and you are competing for compute power with other machines on the host. But I am sure this is just your test environment.
>>
> This is my hobby project so I used KVM, but also I used a virtual
> machine for the client starting SYN flood, so it is comparable. If I
> can afford a physical server with 10/25G NIC and a client machine with
> the same capability, the result will likely be the same.
I highly doubt that as virtual machines are not very good at interrupt handling.
>>> these are the XDP program I am interested in using
>>> https://elixir.bootlin.com/linux/latest/source/tools/testing/selftests/bpf/progs/xdp_synproxy_kern.c
>>
>> Okay, so this does not DoS protect in a strict sense. It just moves the part of SYNPROXY into the driver. I believe this is your primary goal here.
>>
> right, it does what SYNPROXY does, but way more efficiently, page 24
> of above xdp pdf link shows result.
It does, but it also does less.
>
>>> https://github.com/NLnetLabs/XDPeriments
>>>
>>> I had ported them to xdp-tools
>>> https://github.com/vincentmli/xdp-tools/tree/vli-xdp-synproxy so
>>> xdp-tools loader program could attach multiple XDP programs to red0
>>> interface to stop various DDoS attack
>>
>> Thank you for sharing this.
>>
>>>
>>>>>>
>>>>>>>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
>>>>>>>> the right hardware, and SYN flooding attacks are not a major threat to
>>>>>>>> IPFire users, given that we have historically implemented some fine-tuning
>>>>>>>> to make such attacks less viable.
>>>>>>>
>>>>>>> DDoS attacks to IPFire users do not happen now does not mean it will
>>>>>>> not happen in the future, SYN flood is just one scenario, so better be
>>>>>>> prepared than sorry later :) One IPFire user had asked for help
>>>>>>> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
>>>>>>
>>>>>> Is this only about SYN flooding?
>>>>>> for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
>>>>>>> I have studied IPFire, I do not see relevant SYN flooding or DDoS
>>>>>>> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
>>>>>>> syncookie implementation, or suricata ddos rules...etc? keep in mind
>>>>>>> all these are handled in software, no hardware acceleration.
>>>>>>
>>>>>> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
>>>>> hardware acceleration probably is not the right word here for XDP
>>>>> because XDP is actually still in the software driver, not inside the
>>>>> hardware, though there is one hardware vendor that supports running
>>>>> XDP byte code inside the hardware itself for true hardware
>>>>> acceleration, but that is not common. again XDP does not interfere
>>>>> with the IPfire filter except in DDoS scenarios, users can have the
>>>>> option to drop the packet early in the network driver without
>>>>> consuming IPfire CPU/memory resource. >
>>>>
>>>> But do you have any kind of system out there that is under constant fire and the OS cannot cope? What kind of packet rates or bandwidth are we talking about?
>>>
>>> I don't have IPFire in production since I am just starting to know
>>> about the IPFire project. My day time job is enterprise network
>>> engineer supporting fortune 500 enterprise customer with our
>>> enterprise product (BIG-IP) which handles 10G/25G/40G or even 100G
>>> throughput with FPGA, we often has enterprise customer under DDoS
>>> attack, and sometime my day time job is to simulate such high
>>> bandwidth attack in lab to see if enterprise product handles well or
>>> not. I don't think IPFire can handle such flood attack since I know
>>> the limitation of netfilter ( with more than 20 years of working with
>>> Linux networking :))
>>
>> Do you have any figures how much your test environment can handle now compared to a stock IPFire without your changes?
>>
> I don't, but I think the xdp pdf link I referred to should answer, if
> the performance is not significant, the kernel community would not
> accept such feature.
I don’t think that that is a true statement. Not everything is about performance.
And if something works in a lab with a for-purpose built kernel does not exactly mean that this is true for IPFire. I am sure that in all sorts of tests, there are is no NAT involved which quite likely is always involved in a standard IPFire setup - that is how port forwardings work. Therefore it would be good to have real figures.
>>>>>> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
>>>>> home users very unlikely would have this demand because there isn't
>>>>> much gain for attackers who would use DDoS to attack home users. For
>>>>> small/medium size businesses, attackers could start DDoS because
>>>>> business could be impacted and lose profit when under DDoS attack,
>>>>> many businesses choose cloud DDoS providers if they could not afford
>>>>> DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
>>>>> protection on inexpensive commodity hardware. There are already a lot
>>>>> of open source XDP programs out there, including XDP SYNCookie from
>>>>> Linux kernel source, I have ported it to xdp-tool repo and ported
>>>>> xdp-tool to IPfire.
>>>>
>>>> Maybe share this code on the list here so that people understand better what you are looking for.
>>>>
>>> see above link I shared
>>>
>>>> I am still not sure what kind of changes you are asking us to make.
>>>>
>>> actually the asking is minimum, turn on the kernel config feature
>>> for eBPF for networking
>>
>> You say as a minimum, but you have not asked this before. Usually we handle this in the way that people send an email with a description of their feature and if there is generally an option to include this in the distribution. If agreed, then you can work on some code and send it to this list.
>>
> yep, should have asked this in the beginning.
Yes, you should also have sent your code that you have been working on and sent a link to your YouTube channel (https://www.youtube.com/@BPFireOS) where you explain your feature in detail. That would have helped a lot to understand where you were actually going with this instead of us trying to fill in the blanks.
>>> CONFIG_BPF_SYSCALL=y
>>> CONFIG_DEBUG_INFO=y
>>> CONFIG_DEBUG_INFO_BTF=y
>>> CONFIG_DEBUG_INFO_DWARF4=y
>>> CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
>>
>> We don’t need any of those debugging symbols in production. They are actually really large and will make the kernel slower.
>>
> the debug symbols is required during build time for kernel image, but
> can be stripped after BTF is generated for kernel image
How much extra build time does generating the debug information add?
>> I have just posted a suggestion to the list as we are going to ship a fresh kernel with the next Core Update:
>>
>> https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/QYG5SEVSEK53KKW3KAGTPQBC4S654BQW/
>>
>>> I have a working fork of IPFire
>>> https://github.com/vincentmli/BPFire/tree/bpfire, the discussion here
>>> is I want to share that great technology with the IPFire community and
>>> contribute that to IPFire.
>>
>> I was entirely unaware that you have written any code here. And I was also entirely unaware what your goal was. Thankfully we are on the same page now.
>>
>> Since I didn’t know that you have written some code, I implemented a classic SYN proxy using Netfilter this afternoon:
>>
>> https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/5PUYYFTQBIOIRGIIV55PYSA5LJ5S3OVP/
>>
>> I believe that this does what you want to do, although it does not use BPF/XDP. However, it has the advantage that it can be enabled on a per rule basis and does not have to be globally enabled for all incoming connection to that host. How could BPF/XDP be integrated into this without losing that functionality?
>>
> enabled kernel config feature for XDP does not mean all incoming
> traffic will be processed by XDP, the incoming traffic will only be
> processed if there is XDP program bytecode/machine code attached to
> the incoming network interface, so it is up to what individual XDP
> program does
>
> for example XDP program below, it does nothing, simply pass every
> packet/connection to the netfilter/OS
>
> SEC("xdp")
> int xdp_pass(struct xdp_md *ctx)
> {
> return XDP_PASS;
> }
>
> another XDP program example to drop packet to port 5555
>
> SEC("xdp")
> int xdp_drop(struct xdp_md *ctx)
> {
> ... code to parse the raw packet header..
> if tcp->dest == 5555
> return XDP_DROP;
>
> }
>
> so you could attach none or many XDP programs to the network
> interface, the XDP program developers have to write the XDP program
> based on what users want.
>
> The XDP synproxy program is more complicated than the above example,
> but it also only does filtering on a per port basis and configurable
> by user.
>
> for example snippet of the code:
>
> /* Pass to upper stack if port requires no syncookie handling */
> if (!check_port_allowed(bpf_ntohs(hdr->tcp->dest)))
> return XDP_PASS;
>
> so for example if user only want port 80 syn flood protected by the
> XDP syncookie program , user can add port 80 to the ebpf map that
> function check_port_allowed looks up ( in my fork I already added
> IPFire UI option for user to do that), for all other ports, XDP
> program does nothing about it, simply pass it to netfilter/OS.
Well, this does answer my question then… This solution cannot be enabled individually per rule, but only globally for all traffic that hits the firewall on a certain port. That is not exactly selling this.
-Michael
>
>> Best,
>> -Michael
>>
>>>
>>> Vincent
>>>
>>>
>>>> -Michael
>>>>
>>>>>>
>>>>>> -Michael
>>>>>>
>>>>>>> Why not give IPFire users the options when the options already exist
>>>>>>> in the IPFire kernel?
>>>>>>>
>>>>>>>>
>>>>>>>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
>>>>>>>> this proposal at this time.
>>>>>>>>
>>>>>>>> Thanks, and best regards,
>>>>>>>> Peter Müller
>>>>>>>>
>>>>>>>>>
>>>>>>>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
>>>>>>>>> XDP program packet processing, XDP_TX is to redirect the packet back
>>>>>>>>> out through the same network interface after XDP program packet
>>>>>>>>> processing.
>>>>>>>>>
>>>>>>>>>> Regards,
>>>>>>>>>>
>>>>>>>>>> Adolf.
>>>>>>>>>>
>>>>>>>>>> On 09/04/2024 19:36, Vincent Li wrote:
>>>>>>>>>>> Hi,
>>>>>>>>>>>
>>>>>>>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
>>>>>>>>>>> please refer to
>>>>>>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
>>>>>>>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
>>>>>>>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
>>>>>>>>>>> packet filtering at high speed, see
>>>>>>>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>>>>>>>>>>>
>>>>>>>>>>> I think we only need to enable XDP/TC network filtering capability
>>>>>>>>>>> without eBPF tracing capability which some users are concerned about
>>>>>>>>>>> potential host security information leaks.
>>>>>>>>>>>
>>>>>>>>>>> Please let me know what you think, thanks!
>>>>>>>>>>>
>>>>>>>>>>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Enable eBPF XDP/TC kernel feature for IPFire
[not found] <CAK3+h2x_Qx3DtbKGPEexfjfEeoEJVnNhOxZGJMkSMYJZW=qhMg@mail.gmail.com>
@ 2024-04-25 10:08 ` Michael Tremer
0 siblings, 0 replies; 14+ messages in thread
From: Michael Tremer @ 2024-04-25 10:08 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 22535 bytes --]
Hello,
Please make sure you keep the list copied.
> On 24 Apr 2024, at 20:55, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>
> On Wed, Apr 24, 2024 at 8:28 AM Michael Tremer
> <michael.tremer(a)ipfire.org> wrote:
>>
>> Hello,
>>
>>> On 19 Apr 2024, at 02:17, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>
>>> On Thu, Apr 18, 2024 at 2:13 PM Michael Tremer
>>> <michael.tremer(a)ipfire.org> wrote:
>>>>
>>>> Hello Vincent,
>>>>
>>>>> On 18 Apr 2024, at 16:21, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>>>
>>>>> On Thu, Apr 18, 2024 at 1:57 AM Michael Tremer
>>>>> <michael.tremer(a)ipfire.org> wrote:
>>>>>>
>>>>>> Hello,
>>>>>>
>>>>>>> On 17 Apr 2024, at 23:36, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>>>>>
>>>>>>> On Wed, Apr 17, 2024 at 9:07 AM Michael Tremer
>>>>>>> <michael.tremer(a)ipfire.org> wrote:
>>>>>>>>
>>>>>>>> Hello Vincent,
>>>>>>>>
>>>>>>>>> On 10 Apr 2024, at 19:01, Vincent Li <vincent.mc.li(a)gmail.com> wrote:
>>>>>>>>>
>>>>>>>>> On Wed, Apr 10, 2024 at 8:17 AM Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>>>>>>>
>>>>>>>>>> Hello Vincent,
>>>>>>>>>>
>>>>>>>>>> thank you for your e-mail and the proposal.
>>>>>>>>>>
>>>>>>>>>>> Hi Adolf,
>>>>>>>>>>>
>>>>>>>>>>> Please see my reply inline
>>>>>>>>>>>
>>>>>>>>>>> On Wed, Apr 10, 2024 at 2:04 AM Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>> Hi Vincent,
>>>>>>>>>>>>
>>>>>>>>>>>> I am not very familiar at all with this type of stuff but one thing that I noticed is that in the image you provided a link to, the XDP section has a line labelled XDP_TX which completely bypasses the whole Netfilter section which doesn't seem to be a good idea to me.
>>>>>>>>>>>>
>>>>>>>>>>> XDP_TX is to redirect the packet out after processing the packet at
>>>>>>>>>>> XDP stage, yes, netfilter will not see these packets.
>>>>>>>>>>> for example for DDoS SYN flood attack scenario, when the SYN packet
>>>>>>>>>>> is received, XDP program can generate SYN+ACK with syncookie and send
>>>>>>>>>>> the SYN+ACK out, netfilter/Linux tcp stack knows nothing about it,
>>>>>>>>>>> which actually saves host CPU cycles to process the SYN in
>>>>>>>>>>> netfilter/TCP stack, which is actually good thing.
>>>>>>>>>>>
>>>>>>>>>>> Also, XDP_DROP, XDP_PASS, XDP_TX action is depending on the XDP
>>>>>>>>>>> program attached to the network interface, so it is the XDP program
>>>>>>>>>>> author decide what to do with the packet, if no XDP program attached
>>>>>>>>>>> to the network interface, everything works as usual, no interference
>>>>>>>>>>> from XDP.
>>>>>>>>>>
>>>>>>>>>> If my understanding of this is correct, then this would lead to the exact
>>>>>>>>>> opposite of what IPFire is designed to do. Rather than having packets
>>>>>>>>>> processed below any level of operating system influence, the objective of
>>>>>>>>>> IPFire in particular and firewalls in general is to control network traffic,
>>>>>>>>>> which inherently requires thorough visibility on it.
>>>>>>>>>
>>>>>>>>> Kernel still has the traffic statistics processed by XDP program and
>>>>>>>>> store in eBPF maps so the user space program can query and view. you
>>>>>>>>> can still view XDP as part of the firewall except it processes packets
>>>>>>>>> early at the driver layer for efficiency.
>>>>>>>>
>>>>>>>> I would like to understand what your need is to use XDP.
>>>>>>>>
>>>>>>>> As Peter has stated, your system will pass packets with this, but 90% of the features that IPFire has won’t work any more:
>>>>>>>>
>>>>>>>> * Connection Tracking won’t be up to date
>>>>>>>> * QoS won’t be able to categorise packets correctly and won’t be able to do its job
>>>>>>>> * The IPS won’t be able to inspect any data
>>>>>>>>
>>>>>>>
>>>>>>> I think I did not explain the XDP use case clearly, for now, most XDP
>>>>>>> use cases and particularly my use case is to do DDoS protection at
>>>>>>> the earliest packet receiving path in high efficiency since XDP works
>>>>>>> inside the network driver. the things you mentioned above would work
>>>>>>> fine even if the packets go through XDP program, yes XDP program can
>>>>>>> drop, modify, reflect the packet, but in non-DDoS packet senario, XDP
>>>>>>> simply passes the packet to Linux as if nothing happened. so it is up
>>>>>>> to the XDP program logic, also even if ipfire has the kernel feature
>>>>>>> enabled, users still need to attach XDP program to the interface, if
>>>>>>> no XDP program is attached to the interface, nothing is in the way to
>>>>>>> stop packet flowing to IPfire filtering.
>>>>>>> Again this diagram is great to describe the packet path
>>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg,
>>>>>>> so the XDP_PASS action from XDP program is to pass packet to Linux as
>>>>>>> usual. from the same diagram, you also see "AF_PACKET", right? that is
>>>>>>> where tcpdump taking place to capture packet for network
>>>>>>> troubleshooting, but tcpdump would not stops all the scenario above
>>>>>>> you mentioned working, actually tcpdump is based on classic BPF
>>>>>>> technology, the XDP/eBPF is to extended classic BPF technology, it not
>>>>>>> only can clone (packet capture), but can also drop, redirect. Please
>>>>>>> read more about eBPF/XDP in general if you would like, many online
>>>>>>> resources explain better than me :) > Those three are just a few, but
>>>>>>> they are commonly used features of IPFire and without them, it would
>>>>>>> not be what it is.
>>>>>>
>>>>>> Thank you. I am very familiar with how Netfilter works, including BPF and XDP.
>>>>>>
>>>>>> I think your diagram just proves my point when I say that everything is going to bypass the OS. That is the long arrow at the bottom.
>>>>>>
>>>>> I think you refer to the XDP_TX action to bypass the whole OS, for
>>>>> IPFire, this is not recommended
>>>>
>>>> I think it is safe to assume that this is the core feature of XDP is what most people mean when they refer to it.
>>>>
>>>>>> At least I am assuming that you are interested in forwarding packets instead of going the “XDP_PASS” route, because for that you don’t need XDP?
>>>>>>
>>>>>
>>>>> For IPFire, XDP_PASS action is recommended because we don't want to
>>>>> bypass the OS, we only want to drop DDoS packet at the driver, the
>>>>> good packet passes through the OS as usual.
>>>>
>>>> You did not make at clear at all that your goal is to implement SYNPROXY with BPF.
>>>>
>>>> You still do not want to bypass the OS, you just want to bypass Netfilter. So let’s maybe try to be more clear with what we are referring to so that we will save many roundtrips.
>>>>
>>>
>>> I assumed everyone knows what I was talking about in my first email
>>> with the https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf,
>>> apparently I failed :)
>>
>> Well, I don’t think it is very efficient to ask people to read through a long presentation to find the thing that you want. You should briefly explain it in your own words and link further references.
>>
>>>>>> I think you still haven’t explained what your goal is on a lower level. DoS protection is incredibly broad and that does not strictly require XDP. What kind of XDP program are you interested in using?
>>>>>>
>>>>> use XDP to stop DoS has low overhead, save OS cycles, I have IPFire
>>>>> KVM instance, if I run TCP SYN flood the IPFire, the IPFire ssh
>>>>> session, WeUI session because sluggish and unresponsive, but with XDP,
>>>>> it is almost like nothing happening, IPFire is responsive all the time
>>>>> during flood attack.
>>>>
>>>> Could you describe your test scenario more, please?
>>>>
>>>> The Linux kernel is already using SYN cookies whenever it cannot keep up with processing all SYN packets that it receives. That can be configured with net.ipv4.tcp_max_syn_backlog which is set to 256 on my system. That should be low enough to trigger the mechanism.
>>>>
>>> yes, that is for protection for services listening on the Linux host itself.
>>
>> Ah okay, I wasn’t aware that we were talking about port forwardings.
>>
>>>> Using a KVM-virtualised machine is probably not the best way to deploy this in production as interrupts are expensive and you are competing for compute power with other machines on the host. But I am sure this is just your test environment.
>>>>
>>> This is my hobby project so I used KVM, but also I used a virtual
>>> machine for the client starting SYN flood, so it is comparable. If I
>>> can afford a physical server with 10/25G NIC and a client machine with
>>> the same capability, the result will likely be the same.
>>
>> I highly doubt that as virtual machines are not very good at interrupt handling.
>>
>>>>> these are the XDP program I am interested in using
>>>>> https://elixir.bootlin.com/linux/latest/source/tools/testing/selftests/bpf/progs/xdp_synproxy_kern.c
>>>>
>>>> Okay, so this does not DoS protect in a strict sense. It just moves the part of SYNPROXY into the driver. I believe this is your primary goal here.
>>>>
>>> right, it does what SYNPROXY does, but way more efficiently, page 24
>>> of above xdp pdf link shows result.
>>
>> It does, but it also does less.
>>
>>>
>>>>> https://github.com/NLnetLabs/XDPeriments
>>>>>
>>>>> I had ported them to xdp-tools
>>>>> https://github.com/vincentmli/xdp-tools/tree/vli-xdp-synproxy so
>>>>> xdp-tools loader program could attach multiple XDP programs to red0
>>>>> interface to stop various DDoS attack
>>>>
>>>> Thank you for sharing this.
>>>>
>>>>>
>>>>>>>>
>>>>>>>>>> As far as I am aware, IPFire is currently able to handle 25 GBit/sec. on
>>>>>>>>>> the right hardware, and SYN flooding attacks are not a major threat to
>>>>>>>>>> IPFire users, given that we have historically implemented some fine-tuning
>>>>>>>>>> to make such attacks less viable.
>>>>>>>>>
>>>>>>>>> DDoS attacks to IPFire users do not happen now does not mean it will
>>>>>>>>> not happen in the future, SYN flood is just one scenario, so better be
>>>>>>>>> prepared than sorry later :) One IPFire user had asked for help
>>>>>>>>> https://community.ipfire.org/t/filter-out-ddos-attacks-anyone-can-help-me-please/11046/43
>>>>>>>>
>>>>>>>> Is this only about SYN flooding?
>>>>>>>> for layer 4 TCP DDoS, the most common scenario is SYN flooding, ACK flooding, RST flooding. all these flooding can be stopped by SYN cookie that is already built in the Linux TCP host stack, but IPFire is a middle box firewall, the packet destination endpoint is not IPFire, but the host/green network port forwarded by IPFire, so that is where the netfilter SYNPROXY module plays in, I don't see SYNPROXY module being referenced anywhere in IPFire, so even without XDP, I still recommend IPFire provides user option to use SYNPROXY for TCP SYN/ACK/RST flood attack
>>>>>>>>> I have studied IPFire, I do not see relevant SYN flooding or DDoS
>>>>>>>>> tuning, where is it? netfilter with SYNPROXY module? or the TCP stack
>>>>>>>>> syncookie implementation, or suricata ddos rules...etc? keep in mind
>>>>>>>>> all these are handled in software, no hardware acceleration.
>>>>>>>>
>>>>>>>> Yes, IPFire runs in software. We cannot use hardware acceleration because it is designed to pass packets and not to do what we are doing here.
>>>>>>> hardware acceleration probably is not the right word here for XDP
>>>>>>> because XDP is actually still in the software driver, not inside the
>>>>>>> hardware, though there is one hardware vendor that supports running
>>>>>>> XDP byte code inside the hardware itself for true hardware
>>>>>>> acceleration, but that is not common. again XDP does not interfere
>>>>>>> with the IPfire filter except in DDoS scenarios, users can have the
>>>>>>> option to drop the packet early in the network driver without
>>>>>>> consuming IPfire CPU/memory resource. >
>>>>>>
>>>>>> But do you have any kind of system out there that is under constant fire and the OS cannot cope? What kind of packet rates or bandwidth are we talking about?
>>>>>
>>>>> I don't have IPFire in production since I am just starting to know
>>>>> about the IPFire project. My day time job is enterprise network
>>>>> engineer supporting fortune 500 enterprise customer with our
>>>>> enterprise product (BIG-IP) which handles 10G/25G/40G or even 100G
>>>>> throughput with FPGA, we often has enterprise customer under DDoS
>>>>> attack, and sometime my day time job is to simulate such high
>>>>> bandwidth attack in lab to see if enterprise product handles well or
>>>>> not. I don't think IPFire can handle such flood attack since I know
>>>>> the limitation of netfilter ( with more than 20 years of working with
>>>>> Linux networking :))
>>>>
>>>> Do you have any figures how much your test environment can handle now compared to a stock IPFire without your changes?
>>>>
>>> I don't, but I think the xdp pdf link I referred to should answer, if
>>> the performance is not significant, the kernel community would not
>>> accept such feature.
>>
>> I don’t think that that is a true statement. Not everything is about performance.
>>
>> And if something works in a lab with a for-purpose built kernel does not exactly mean that this is true for IPFire. I am sure that in all sorts of tests, there are is no NAT involved which quite likely is always involved in a standard IPFire setup - that is how port forwardings work. Therefore it would be good to have real figures.
>
> I will see if I can do some testing on real hardware with NAT port forwarding
>
>>
>>>>>>>> IPFire uses SYN cookies by default for all incoming connections. We currently do not use the SYNPROXY module, but that is simply because there has not been any demand for it. If this suits your use-case I would rather implement that than XDP.
>>>>>>> home users very unlikely would have this demand because there isn't
>>>>>>> much gain for attackers who would use DDoS to attack home users. For
>>>>>>> small/medium size businesses, attackers could start DDoS because
>>>>>>> business could be impacted and lose profit when under DDoS attack,
>>>>>>> many businesses choose cloud DDoS providers if they could not afford
>>>>>>> DDoS protection devices. XDP DDoS protection on IPFire provides DDoS
>>>>>>> protection on inexpensive commodity hardware. There are already a lot
>>>>>>> of open source XDP programs out there, including XDP SYNCookie from
>>>>>>> Linux kernel source, I have ported it to xdp-tool repo and ported
>>>>>>> xdp-tool to IPfire.
>>>>>>
>>>>>> Maybe share this code on the list here so that people understand better what you are looking for.
>>>>>>
>>>>> see above link I shared
>>>>>
>>>>>> I am still not sure what kind of changes you are asking us to make.
>>>>>>
>>>>> actually the asking is minimum, turn on the kernel config feature
>>>>> for eBPF for networking
>>>>
>>>> You say as a minimum, but you have not asked this before. Usually we handle this in the way that people send an email with a description of their feature and if there is generally an option to include this in the distribution. If agreed, then you can work on some code and send it to this list.
>>>>
>>> yep, should have asked this in the beginning.
>>
>> Yes, you should also have sent your code that you have been working on and sent a link to your YouTube channel (https://www.youtube.com/@BPFireOS) where you explain your feature in detail. That would have helped a lot to understand where you were actually going with this instead of us trying to fill in the blanks.
>>
>>>>> CONFIG_BPF_SYSCALL=y
>>>>> CONFIG_DEBUG_INFO=y
>>>>> CONFIG_DEBUG_INFO_BTF=y
>>>>> CONFIG_DEBUG_INFO_DWARF4=y
>>>>> CONFIG_BPF_UNPRIV_DEFAULT_OFF=y
>>>>
>>>> We don’t need any of those debugging symbols in production. They are actually really large and will make the kernel slower.
>>>>
>>> the debug symbols is required during build time for kernel image, but
>>> can be stripped after BTF is generated for kernel image
>>
>> How much extra build time does generating the debug information add?
>>
>
> I did not measure with and without debug info, my impression is it is
> not significantly long that I would have noticed, I can definitely
> measure.
>
>>>> I have just posted a suggestion to the list as we are going to ship a fresh kernel with the next Core Update:
>>>>
>>>> https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/QYG5SEVSEK53KKW3KAGTPQBC4S654BQW/
>>>>
>>>>> I have a working fork of IPFire
>>>>> https://github.com/vincentmli/BPFire/tree/bpfire, the discussion here
>>>>> is I want to share that great technology with the IPFire community and
>>>>> contribute that to IPFire.
>>>>
>>>> I was entirely unaware that you have written any code here. And I was also entirely unaware what your goal was. Thankfully we are on the same page now.
>>>>
>>>> Since I didn’t know that you have written some code, I implemented a classic SYN proxy using Netfilter this afternoon:
>>>>
>>>> https://lists.ipfire.org/hyperkitty/list/development(a)lists.ipfire.org/thread/5PUYYFTQBIOIRGIIV55PYSA5LJ5S3OVP/
>>>>
>>>> I believe that this does what you want to do, although it does not use BPF/XDP. However, it has the advantage that it can be enabled on a per rule basis and does not have to be globally enabled for all incoming connection to that host. How could BPF/XDP be integrated into this without losing that functionality?
>>>>
>>> enabled kernel config feature for XDP does not mean all incoming
>>> traffic will be processed by XDP, the incoming traffic will only be
>>> processed if there is XDP program bytecode/machine code attached to
>>> the incoming network interface, so it is up to what individual XDP
>>> program does
>>>
>>> for example XDP program below, it does nothing, simply pass every
>>> packet/connection to the netfilter/OS
>>>
>>> SEC("xdp")
>>> int xdp_pass(struct xdp_md *ctx)
>>> {
>>> return XDP_PASS;
>>> }
>>>
>>> another XDP program example to drop packet to port 5555
>>>
>>> SEC("xdp")
>>> int xdp_drop(struct xdp_md *ctx)
>>> {
>>> ... code to parse the raw packet header..
>>> if tcp->dest == 5555
>>> return XDP_DROP;
>>>
>>> }
>>>
>>> so you could attach none or many XDP programs to the network
>>> interface, the XDP program developers have to write the XDP program
>>> based on what users want.
>>>
>>> The XDP synproxy program is more complicated than the above example,
>>> but it also only does filtering on a per port basis and configurable
>>> by user.
>>>
>>> for example snippet of the code:
>>>
>>> /* Pass to upper stack if port requires no syncookie handling */
>>> if (!check_port_allowed(bpf_ntohs(hdr->tcp->dest)))
>>> return XDP_PASS;
>>>
>>> so for example if user only want port 80 syn flood protected by the
>>> XDP syncookie program , user can add port 80 to the ebpf map that
>>> function check_port_allowed looks up ( in my fork I already added
>>> IPFire UI option for user to do that), for all other ports, XDP
>>> program does nothing about it, simply pass it to netfilter/OS.
>>
>> Well, this does answer my question then… This solution cannot be enabled individually per rule, but only globally for all traffic that hits the firewall on a certain port. That is not exactly selling this.
>>
> I am not sure I understand what you mean by per rule, you mean iptable
> rules for iptables SYNPROXY module or just iptable rules. for XDP
> SYNPROXY to work, it also does require setup iptable rule for each
> port that requires XDP SYNPROXY.
In the web UI, you can define firewall rules. Those.
They might generate more than one iptables rule, but generally that is what I am interested in. You can combine SYNPROXY with other features that we have like country filtering and so on. So there are huge benefits there.
The XDP approach that you have been taking seems to take over the entire port no matter where the packet is coming from which makes this solution less flexible.
-Michael
>> -Michael
>>
>>>
>>>> Best,
>>>> -Michael
>>>>
>>>>>
>>>>> Vincent
>>>>>
>>>>>
>>>>>> -Michael
>>>>>>
>>>>>>>>
>>>>>>>> -Michael
>>>>>>>>
>>>>>>>>> Why not give IPFire users the options when the options already exist
>>>>>>>>> in the IPFire kernel?
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Therefore, I - personally - neither see the necessity nor benefit of pursuing
>>>>>>>>>> this proposal at this time.
>>>>>>>>>>
>>>>>>>>>> Thanks, and best regards,
>>>>>>>>>> Peter Müller
>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>> I don't understand what the difference is between XDP_PASS and XDP_TX but I would expect that nothing should be allowed to bypass the netfilter section unless it is being dropped or rejected already by the XDP process.
>>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> XDP_PASS is to pass the packet to netfilter/TCP stack as usual after
>>>>>>>>>>> XDP program packet processing, XDP_TX is to redirect the packet back
>>>>>>>>>>> out through the same network interface after XDP program packet
>>>>>>>>>>> processing.
>>>>>>>>>>>
>>>>>>>>>>>> Regards,
>>>>>>>>>>>>
>>>>>>>>>>>> Adolf.
>>>>>>>>>>>>
>>>>>>>>>>>> On 09/04/2024 19:36, Vincent Li wrote:
>>>>>>>>>>>>> Hi,
>>>>>>>>>>>>>
>>>>>>>>>>>>> I have been working on enabling eBPF XDP/TC kernel feature for IPFire,
>>>>>>>>>>>>> please refer to
>>>>>>>>>>>>> https://upload.wikimedia.org/wikipedia/commons/3/37/Netfilter-packet-flow.svg
>>>>>>>>>>>>> for where XDP fit in Linux network datapath, XDP will not interfere
>>>>>>>>>>>>> with existing IPFire firewall rules. XDP is especially good at DDoS
>>>>>>>>>>>>> packet filtering at high speed, see
>>>>>>>>>>>>> https://netdevconf.info/0x15/slides/30/Netdev%200x15%20Accelerating%20synproxy%20with%20XDP.pdf
>>>>>>>>>>>>>
>>>>>>>>>>>>> I think we only need to enable XDP/TC network filtering capability
>>>>>>>>>>>>> without eBPF tracing capability which some users are concerned about
>>>>>>>>>>>>> potential host security information leaks.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Please let me know what you think, thanks!
>>>>>>>>>>>>>
>>>>>>>>>>>>> Vincent
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2024-04-25 10:08 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-04-09 17:36 Enable eBPF XDP/TC kernel feature for IPFire Vincent Li
2024-04-10 9:04 ` Adolf Belka
2024-04-10 14:11 ` Vincent Li
2024-04-10 15:17 ` Peter Müller
2024-04-10 18:01 ` Vincent Li
2024-04-17 16:07 ` Michael Tremer
2024-04-17 22:36 ` Vincent Li
2024-04-17 22:41 ` Vincent Li
2024-04-18 8:57 ` Michael Tremer
2024-04-18 15:21 ` Vincent Li
2024-04-18 21:13 ` Michael Tremer
2024-04-19 0:17 ` Vincent Li
2024-04-24 15:28 ` Michael Tremer
[not found] <CAK3+h2x_Qx3DtbKGPEexfjfEeoEJVnNhOxZGJMkSMYJZW=qhMg@mail.gmail.com>
2024-04-25 10:08 ` Michael Tremer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox