Page MenuHomeFreeBSD

cy (Cy Schubert)
Committer

Projects (10)

User Details

User Since
May 10 2014, 4:26 AM (600 w, 2 d)

Recent Activity

Thu, Nov 6

cy requested review of D53623: ipfilter: Restrict ipfilter within a jail.
Thu, Nov 6, 7:24 PM
cy committed R11:b005ce630ecd: mail/spamassassin*: Make GNUPG2 defauilt (authored by cy).
mail/spamassassin*: Make GNUPG2 defauilt
Thu, Nov 6, 12:20 AM

Wed, Nov 5

cy committed rGdf381bec2d2b: ipfilter: Don't trust userland supplied iph_size (authored by cy).
ipfilter: Don't trust userland supplied iph_size
Wed, Nov 5, 3:35 PM
cy committed rGf3b94f47f55c: ipfilter: Add an htable max size tuneable. (authored by cy).
ipfilter: Add an htable max size tuneable.
Wed, Nov 5, 3:35 PM
cy committed rGc57262716b08: ipfilter: Add htable (hash table) tunable (authored by cy).
ipfilter: Add htable (hash table) tunable
Wed, Nov 5, 3:35 PM
cy closed D53286: ipfilter: Don't trust userland supplied iph_size.
Wed, Nov 5, 3:35 PM
cy closed D53284: ipfilter: Add an htable max size tuneable..
Wed, Nov 5, 3:35 PM
cy closed D53283: ipfilter: Add htable (hash table) tunable.
Wed, Nov 5, 3:34 PM
cy closed D53308: ipfilter: Calculate the number of elements in ipf_errors.
Wed, Nov 5, 3:34 PM
cy committed rGab3c9853285b: ipfilter: Calculate the number of elements in ipf_errors (authored by cy).
ipfilter: Calculate the number of elements in ipf_errors
Wed, Nov 5, 3:34 PM
cy added a comment to D53484: Remove RIP and RIPng.
In D53484#1223559, @ivy wrote:

Note that there are tests that use routed :(

oh, i missed that; i'll investigate and update the diff. thanks.

In D53484#1223413, @cy wrote:

Would there be any value into turning routed into a port? I don't use routed though I did in a different lifetime on a different O/S (Tru64).

there is already a net/freebsd-routed package, maintained by one "cy@FreeBSD.org" :-) this is mentioned in the UPDATING entry in this diff.

Wed, Nov 5, 4:44 AM

Tue, Nov 4

cy added a comment to D53484: Remove RIP and RIPng.

Would there be any value into turning routed into a port? I don't use routed though I did in a different lifetime on a different O/S (Tru64).

Tue, Nov 4, 6:47 PM
cy updated the diff for D53475: ipfilter: Verify frentry on entry into kernel.
  1. Make sure frentry_t passed from userland >= sizeof(frentry_t).
Tue, Nov 4, 6:06 PM
cy added a comment to D53475: ipfilter: Verify frentry on entry into kernel.

I do have something ready to upload to this review. I want to exercise it a bit more. There will be another review for a similar patch for ipnat, also being tested here.

Tue, Nov 4, 3:13 PM

Sun, Nov 2

cy committed R11:fe22c0c182c2: x11/cde*: Remove unused iconv dependencies (authored by cy).
x11/cde*: Remove unused iconv dependencies
Sun, Nov 2, 9:56 PM
cy committed R11:5df36de6d36b: x11/cde*: Remove unused iconv dependencies (authored by cy).
x11/cde*: Remove unused iconv dependencies
Sun, Nov 2, 9:47 PM

Fri, Oct 31

cy added a comment to D53475: ipfilter: Verify frentry on entry into kernel.

Would it be better if we got together in a Teams call to discuss this?

Fri, Oct 31, 2:58 PM
cy committed R11:cda6bfb7b6a9: sysutils/ipsc: Update WWW and MASTER_SITES, add LICENSE (authored by portmaster_BSDforge.com).
sysutils/ipsc: Update WWW and MASTER_SITES, add LICENSE
Fri, Oct 31, 3:48 AM
cy committed R11:40260d04f413: sysutils/ipsc: Update 0.4.3 => 0.4.4 (authored by portmaster_BSDforge.com).
sysutils/ipsc: Update 0.4.3 => 0.4.4
Fri, Oct 31, 3:47 AM
cy committed R11:5f3546784e90: sysutils/prips: Update to 1.2.2 (authored by cy).
sysutils/prips: Update to 1.2.2
Fri, Oct 31, 3:40 AM
cy committed R11:5353ac872d54: sysutils/prips: Assume maintainership (authored by cy).
sysutils/prips: Assume maintainership
Fri, Oct 31, 3:39 AM

Thu, Oct 30

cy added a comment to D53475: ipfilter: Verify frentry on entry into kernel.

I added jrm@ as a subscriber as Ed, Joseph and I had discussed this patch after the wireless meeting.

Thu, Oct 30, 2:27 PM
cy requested review of D53475: ipfilter: Verify frentry on entry into kernel.
Thu, Oct 30, 2:25 PM
cy updated the diff for D53286: ipfilter: Don't trust userland supplied iph_size.

Removal of two size_t casts.

Thu, Oct 30, 2:24 PM

Tue, Oct 28

cy abandoned D53281: ipfilter: Avoid out of bounds read in ip_state.

This is based on the misunderstanding that fr_names only contains interface names.

Tue, Oct 28, 11:18 PM
cy abandoned D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.

This is based on my incorrect understanding that fr_names contains only interface names.

Tue, Oct 28, 11:17 PM
cy abandoned D53280: ipfilter: Limit ifname to 16 bytes.
Tue, Oct 28, 11:16 PM
cy added a comment to D53280: ipfilter: Limit ifname to 16 bytes.

fr_names appears to be used for more than interface names. Until I fully understand this, a review is pointless.

Tue, Oct 28, 11:15 PM
cy abandoned D53282: ipfilter: ip_state uses user-influenced state without verification.

This will need some testing.

Tue, Oct 28, 11:14 PM
cy added a comment to D53286: ipfilter: Don't trust userland supplied iph_size.

This review is still active.

Tue, Oct 28, 11:13 PM
cy abandoned D53276: ipfilter: Ensure that interface names are not OOB.

The assumption that fr_names only contains interface names is incorrect and elements are not limited to LIFNAMSIZ. I need to step back to try an understand this.

Tue, Oct 28, 11:13 PM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

Fix a typo.

Tue, Oct 28, 7:32 PM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

Again, update interror.c. Need to save it too before updating the commit.

Tue, Oct 28, 7:19 PM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

Validating fr_sifpidx in a separate commit is cumbersome. Both depend
on fr_namelen not to exceed the fr_names boundary.

Tue, Oct 28, 7:17 PM
cy abandoned D53277: ipfilter: Make sure fr_sifpidx does not point outside of fr_names.

It makes no sense to do this test in isolation. This test and D53276 require fp->fr_namelen not to exceed LIFNAMSIZ. The entire issue will be fixed by D53276 instead of splitting the fix into two.

Tue, Oct 28, 7:11 PM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

Add missing ipferror.c updates.

Tue, Oct 28, 6:05 PM
cy abandoned D53388: ipfilter: Add ipf_frname_vfy().

This is no longer needed as the validation is now to be performed in frrequest().

Tue, Oct 28, 5:56 PM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

I've taken Mark's suggestion to move the validation code from
ipf_synclist() to frrequest().

Tue, Oct 28, 5:55 PM
cy retitled D53276: ipfilter: Ensure that interface names are not OOB from ipfilter: Avoid out of bounds read in ip_nat to ipfilter: Ensure that interface names are not OOB.
Tue, Oct 28, 5:53 PM
cy added a comment to D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.

Hmm. I may want to abandon the reviews and take a broader approach to input verification. Some input verification is already there but needs improvement.

Tue, Oct 28, 4:43 PM
cy added a comment to D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.

Looking at the code, I think this structure is copied in in ipf_nat_ioctl(). There, we copy in a struct ipnat without the variable-length interface name after it. Then, we check the in_size field of the copied-in structure (which presumably includes the length of the interface name) and copy the whole thing in.

So, I guess we should handle validation there, and we should check that the string is in the bounds defined by the in_size field instead.

Tue, Oct 28, 4:38 PM
cy added a comment to D53276: ipfilter: Ensure that interface names are not OOB.

Shouldn't the validation be done at the ioctl layer, i.e., in frrequest() when we're copying in the frentry object?

Tue, Oct 28, 4:34 PM
cy committed rG5ae7b106cfd4: ipfs: Fix typo in error message (authored by cy).
ipfs: Fix typo in error message
Tue, Oct 28, 3:44 AM
cy updated the diff for D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.

Use LIFNAMSIZ.

Tue, Oct 28, 3:27 AM
cy updated the diff for D53277: ipfilter: Make sure fr_sifpidx does not point outside of fr_names.

Move the test to frrequest() (on input).

Tue, Oct 28, 3:24 AM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

Use new ipf_frname_vfy() function.

Tue, Oct 28, 2:40 AM

Mon, Oct 27

cy requested review of D53388: ipfilter: Add ipf_frname_vfy().
Mon, Oct 27, 11:21 PM

Sun, Oct 26

cy committed rGfe3e929ffa97: local-unbound-setup: Set so-sndbuf to 0 (authored by des).
local-unbound-setup: Set so-sndbuf to 0
Sun, Oct 26, 3:16 AM
cy committed rG29b59b8ac433: unbound: Vendor import 1.24.0 (authored by cy).
unbound: Vendor import 1.24.0
Sun, Oct 26, 3:16 AM
cy committed rG4260de80f05d: ipfilter: Plug ip_nat kernel information leak (authored by cy).
ipfilter: Plug ip_nat kernel information leak
Sun, Oct 26, 3:16 AM
cy committed rG4efaa7834793: unbound: Vendor import 1.24.1 (authored by cy).
unbound: Vendor import 1.24.1
Sun, Oct 26, 3:16 AM
cy committed rG2ebb4779c40a: ipfilter: Plug ip_htable kernel information leak (authored by cy).
ipfilter: Plug ip_htable kernel information leak
Sun, Oct 26, 3:16 AM
cy committed rG49ed9e4acb6e: local-unbound-setup: Set so-sndbuf to 0 (authored by des).
local-unbound-setup: Set so-sndbuf to 0
Sun, Oct 26, 3:15 AM
cy committed rG65629acb4a79: local-unbound-setup: Set so-sndbuf to 0 (authored by des).
local-unbound-setup: Set so-sndbuf to 0
Sun, Oct 26, 3:15 AM
cy committed rGeeb41dca070f: unbound: Vendor import 1.24.1 (authored by cy).
unbound: Vendor import 1.24.1
Sun, Oct 26, 3:15 AM
cy committed rGfe7bb59bb014: unbound: Vendor import 1.24.0 (authored by cy).
unbound: Vendor import 1.24.0
Sun, Oct 26, 3:15 AM
cy committed rGd78f36183a26: ipfilter: Plug ip_nat kernel information leak (authored by cy).
ipfilter: Plug ip_nat kernel information leak
Sun, Oct 26, 3:15 AM
cy committed rGe190f21c98ae: ipfilter: Plug ip_htable kernel information leak (authored by cy).
ipfilter: Plug ip_htable kernel information leak
Sun, Oct 26, 3:15 AM
cy committed rGfc3c317b055c: unbound: Vendor import 1.24.1 (authored by cy).
unbound: Vendor import 1.24.1
Sun, Oct 26, 3:15 AM
cy committed rG0143f06b45dc: unbound: Vendor import 1.24.0 (authored by cy).
unbound: Vendor import 1.24.0
Sun, Oct 26, 3:15 AM
cy committed rGd3b0843d2cec: ipfilter: Plug ip_nat kernel information leak (authored by cy).
ipfilter: Plug ip_nat kernel information leak
Sun, Oct 26, 3:15 AM
cy committed rGfcdc47e20959: ipfilter: Plug ip_htable kernel information leak (authored by cy).
ipfilter: Plug ip_htable kernel information leak
Sun, Oct 26, 3:15 AM

Fri, Oct 24

cy added a comment to D53286: ipfilter: Don't trust userland supplied iph_size.

I really should have tested this before submitting the updated diff. I will test it now.

Fri, Oct 24, 11:40 PM
cy updated the diff for D53286: ipfilter: Don't trust userland supplied iph_size.

Fix the last of the issues Ilja Van Sprundel had identified in his
email regarding ip_htable.c.

Fri, Oct 24, 11:39 PM
cy added inline comments to D53286: ipfilter: Don't trust userland supplied iph_size.
Fri, Oct 24, 11:34 PM
cy added inline comments to D53276: ipfilter: Ensure that interface names are not OOB.
Fri, Oct 24, 10:51 PM
cy added a comment to D53308: ipfilter: Calculate the number of elements in ipf_errors.

Or if you wanted you could just use nitems() in find_error instead of IPF_NUM_ERRORS

Fri, Oct 24, 10:36 PM
cy added inline comments to D53282: ipfilter: ip_state uses user-influenced state without verification.
Fri, Oct 24, 10:20 PM
cy committed rGa67114ae32fc: rc: Chase 052211e08c0e and bfb202c4554a, remove ifconfig down/up (authored by cy).
rc: Chase 052211e08c0e and bfb202c4554a, remove ifconfig down/up
Fri, Oct 24, 3:36 AM
cy committed rG0fe083b6e8e8: rc: Chase 052211e08c0e and bfb202c4554a, remove ifconfig down/up (authored by cy).
rc: Chase 052211e08c0e and bfb202c4554a, remove ifconfig down/up
Fri, Oct 24, 3:35 AM

Thu, Oct 23

cy requested review of D53308: ipfilter: Calculate the number of elements in ipf_errors.
Thu, Oct 23, 11:01 PM
cy committed rG0d589ecbc7aa: ipfilter: Plug ip_htable kernel information leak (authored by cy).
ipfilter: Plug ip_htable kernel information leak
Thu, Oct 23, 10:57 PM
cy closed D53274: ipfilter: Plug ip_nat kernel information leak.
Thu, Oct 23, 10:57 PM
cy closed D53275: ipfilter: Plug ip_htable kernel information leak.
Thu, Oct 23, 10:57 PM
cy committed rG6535e9308a26: ipfilter: Plug ip_nat kernel information leak (authored by cy).
ipfilter: Plug ip_nat kernel information leak
Thu, Oct 23, 10:57 PM
cy added a comment to D53277: ipfilter: Make sure fr_sifpidx does not point outside of fr_names.

After testing this patch, it needs more work.

Thu, Oct 23, 8:18 PM
cy committed rG8b29c373e6ab: unbound: Vendor import 1.24.1 (authored by cy).
unbound: Vendor import 1.24.1
Thu, Oct 23, 7:05 PM
cy committed rG73dd92916f53: unbound: Vendor import 1.24.0 (authored by cy).
unbound: Vendor import 1.24.0
Thu, Oct 23, 6:50 PM
cy added a comment to D53275: ipfilter: Plug ip_htable kernel information leak.

If you haven't tried testing ipf with the GENERIC-KMSAN kernel config, I suggest it: it'll automatically catch bugs of this kind. kmsan.9 has some details.

Thu, Oct 23, 6:22 PM
cy updated the diff for D53274: ipfilter: Plug ip_nat kernel information leak.

Fix stupid mistake.

Thu, Oct 23, 3:22 PM
cy retitled D53275: ipfilter: Plug ip_htable kernel information leak from ipfilter: Plug kernel information leak to ipfilter: Plug ip_htable kernel information leak.
Thu, Oct 23, 3:22 PM
cy retitled D53274: ipfilter: Plug ip_nat kernel information leak from ipfilter: Plug kernel information leak to ipfilter: Plug ip_nat kernel information leak.
Thu, Oct 23, 3:21 PM
cy added inline comments to D53274: ipfilter: Plug ip_nat kernel information leak.
Thu, Oct 23, 3:17 PM
cy updated the diff for D53282: ipfilter: ip_state uses user-influenced state without verification.

Use strnlen().

Thu, Oct 23, 5:28 AM
cy updated the diff for D53281: ipfilter: Avoid out of bounds read in ip_state.

Use strnlen() instead of strlen().

Thu, Oct 23, 5:28 AM
cy updated the diff for D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.

Use strnlen().

Thu, Oct 23, 5:27 AM
cy updated the diff for D53276: ipfilter: Ensure that interface names are not OOB.

Use strnlen() instead of strlen.

Thu, Oct 23, 5:25 AM
cy added a comment to D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.

I will review my use of strlen throughout. I'll get back to you tomorrow.

Thu, Oct 23, 2:34 AM

Wed, Oct 22

cy requested review of D53286: ipfilter: Don't trust userland supplied iph_size.
Wed, Oct 22, 11:35 PM
cy abandoned D53285: ipfilter: Add an htable max size tuneable..

This is a duplicate.

Wed, Oct 22, 11:35 PM
cy requested review of D53285: ipfilter: Add an htable max size tuneable..
Wed, Oct 22, 11:34 PM
cy requested review of D53284: ipfilter: Add an htable max size tuneable..
Wed, Oct 22, 11:33 PM
cy requested review of D53283: ipfilter: Add htable (hash table) tunable.
Wed, Oct 22, 11:33 PM
cy requested review of D53282: ipfilter: ip_state uses user-influenced state without verification.
Wed, Oct 22, 11:32 PM
cy requested review of D53281: ipfilter: Avoid out of bounds read in ip_state.
Wed, Oct 22, 11:31 PM
cy requested review of D53280: ipfilter: Limit ifname to 16 bytes.
Wed, Oct 22, 11:31 PM
cy requested review of D53279: ipfilter: Plug OOB read in ip_nat proxy.
Wed, Oct 22, 11:31 PM
cy requested review of D53278: ipfilter: Avoid OOB read when ingesting interface names in ip_nat.
Wed, Oct 22, 11:31 PM
cy requested review of D53277: ipfilter: Make sure fr_sifpidx does not point outside of fr_names.
Wed, Oct 22, 11:30 PM
cy requested review of D53276: ipfilter: Ensure that interface names are not OOB.
Wed, Oct 22, 11:30 PM