TODO.npf revision 1.15 1 # $NetBSD: TODO.npf,v 1.15 2025/04/17 19:54:24 gdt Exp $
2
3 # Meta
4
5 This file intends to be the location for all work needing to be done
6 for npf within NetBSD, except for bugs that are straightforward enough
7 to live in gnats. The presence of an item does not imply that there
8 is consensus that the item should be implemented.
9
10 (The older TODO list, last modified in May, 2020:
11 https://www.netbsd.org/~rmind/npf/__tasklist.html
12 has been merged into this file.)
13
14 ## Review all items to see if they are still relevant and correct.
15
16 # Syncing
17
18 ## from https://github.com/rmind/npf/
19
20 Periodically, check this repo to see if there are changes/improvements
21 that are not in NetBDS and which are appopriate, and merge them.
22
23 ## to https://github.com/rmind/npf/
24
25 Periodically, compare code between NetBSD and this repo, and file PRs
26 for changes in NetBSD as appropriate, when there are not already PRs.
27
28 ## Merge https://github.com/rmind/npf doc subdir
29
30 rmind's repo has a doc directory. Some content is in man pages and
31 thus available within NetBSD. Understand if there are things that
32 aren't (likely), decide how to have them in NetBSD
33 (/usr/share/doc/npf?) and add them.
34
35 # Documentation
36
37 ## Conversion Guides
38
39 Add instructions for converting configuration for other packet filters
40 to npf configuration.
41
42 ## More Examples
43
44 ## Man page nits
45
46 ### npf.conf: rule group processing
47
48 Explain if groups are processed in the same order as npf.conf.
49 Explain what happens if a packet matches the group header, but does
50 not match a rule in the group. Currently it is unclear exactly when
51 the default group is run, and if multiple matching groups might run.
52
53 ### npf.conf dynamic ruleset
54
55 Dynamic rulesets are mentioned in npfctl, and blocklistd examples, but
56 they are not explained in npf.conf. In addition to the basics, while
57 it is not expected that these rules be treated as if they have the
58 final flag, the code seems to do that.
59
60 # NetBSD integration
61
62 ## save/restore
63
64 /etc/rc.d/npf lacks the ability to save and load state (stateful rules
65 and NAT).
66
67 # npfctl
68
69 ## npfctl start does not load
70
71 npfctl start does not load the configuration if not loaded.
72 It is not clear you need to reload first. Or if it loads it should
73 print the error messages. Or it should be called enable/disable since
74 this is what it does. It does not "start" because like an engine with
75 no fuel, an npf with no configuration does not do much.
76
77 Alternatively: warn if there are no rules, or decide that npfctl
78 behaves as documented.
79
80 ## better error reporting
81
82 although the framework checks the file for consistency, returning
83 EINVAL for system failures is probably not good enough. For example if
84 a module failed to autoload, it is probably an error and it should be
85 reported differently?
86
87 ## handle array variables in more places
88
89 (Decide if this is just about npfctl or also about the kernel, and if
90 the latter move it.)
91
92 ## support variables and inline sets which contain both IPv4 and IPv6 addresses
93
94 for example: $ext_if = { inet4(wm0), inet6(wm0) }
95
96 (Decide if this is just about npfctl or also about the kernel, and if
97 the latter move it.)
98
99 ## support inline blocks with different types of data in the rule.
100
101 This will require a clean-up of the type system in
102 npfctl parser, since it is currently a bit of a mess. Examples:
103
104 pass in from all to { inet4(wm0), $some_var, 10.0.0.1, }
105 pass in final proto tcp to 172.28.1.2 port { 161, 162 }
106 pass in final proto { tcp, udp } to 172.28.1.2 port 53
107
108 [MOSTLY DONE?]
109
110 (Decide if this is just about npfctl or also about the kernel, and if
111 the latter move it.)
112
113 ## npf show improvements
114
115 Consistent `npfctl show' output with rule syntax. Difficult/messy
116 because rules are compiled into the byte-code.
117
118 Add examples of what is wrong.
119
120 ## -D option to set variables
121
122 Allow `npfctl -D varname=value` to set a variable, as if were defined
123 in the config file. See pfctl(8).
124
125 # Architectural changes
126
127 ## Layer 2 filtering
128
129 1. All rules in NPF are added to a ruleset. At this moment, it is assumed
130 that there is only one ruleset and all rules are processed at layer 3.
131 One approach is to support another ruleset for layer 2 (or rather, have
132 capability to specify the "starting layer").
133
134 2. One way to separate L2 and L3 rules could be by marking groups. In NPF,
135 a group is just a rule (i.e. rules can be nested).
136
137 3. npfctl: update the parser such that the group would have an option for
138 specifying a layer. See "group_opts" token in npf_parse.y file. Also,
139 we may want to add support for "hwaddr <mac>" syntax or something.
140
141 4. npfctl_build_rule() code will need to distinguish groups/rules which
142 were marked as layer 2, i.e. byte-code generation (npfctl_build_code()
143 and the logic in it) needs to know that we are starting from Ethernet
144 header and not IP header. Note: it needs to be passed to all nested
145 rules, so basically take the option from the "current group".
146
147 5. For a start (i.e. less work to do), you can just add byte-code to parse
148 Ethernet header and compare the MAC addresses. Just return "not supported"
149 error for any other filter pattern.
150
151 6. libnpf: create a new ruleset for L2 and add all groups (and its nested
152 rules) there. To keep it simpler, we can add npf_rule_setlayer() function
153 and just handle this separation in libnpf rather than npfctl.
154
155 7. libnpf-kernel: currently, proplib dictionary has only one "ruleset" dict.
156 This needs to be split into "ruleset-l3" and "ruleset-l2". Retrieve and
157 construct a new ruleset in npfctl_reload(); it is simple, but disgusting
158 proplib code. It is just re-using the existing code to handle another
159 ruleset.
160
161 8. Kernel: add a new handler in npf_handler.c, e.g. npf_packet_l2handler()
162 or something. Register it in npf_pfil_register() using Ethernet pfil
163 hook. In the handler, call npf_ruleset_inspect() passing L2 ruleset.
164
165 ## Consider single large BPF program
166
167 Implement NPF rules as a single large BPF program, instead of
168 providing BPF byte-code per each rule. In combination with BPF JIT
169 compilation, such approach would significantly improve the performance
170 of very large rulesets. Problems: BPF byte-code limitations; we can
171 either extend the byte-code or workaround them.
172
173 ## Multiple rule matching
174
175 Multiple rule matching to call the rule-procedures or a suitable
176 design alternative to that.
177
178 (Explain what this means more clearly.)
179
180 ## ipchains-like feature
181
182 Implement ipchains-like feature to support nested rules and sharing of
183 a rule group. NPF already supports nested rules. Unresolved questions
184 are: 1) what kind of complexity of rule chains do we want to support,
185 e.g. a directed graph with loop resolution or more strict hierarchy
186 which does not allow jumping up the chain? 2) syntax in npf.conf file.
187
188 ## Support for packets arriving at or departing the socket layer
189
190 Similar to how one can do this in nftables, add a way to write a rule
191 that will be applied to all packets being delivered to sockets, or
192 really processed by the system as a host rather than simply forwarded.
193 The point is to be able to express rules like "block connections to
194 this machine's ssh daemon, but don't block ssh connections that are
195 merely being routed", without having to match on addresses.
196
197 ## redundancy and load balancing
198
199 Redundancy and load balancing: initially, add state replication and
200 replace in-kernel CARP/VRRP with a userlevel daemon.
201
202 Check "Note: we probably want to eliminate proplib in NPF before doing
203 this." and drop if proplib has in fact been eliminated.
204
205 ## QoS
206
207 QoS: rate limiting, traffic shaping, prioritising. Question: how much
208 of this should be a part of the packet filter and how much of the
209 network stack (merely involving some integration with the packet
210 filters)?
211
212 ## address/port and port in tables
213
214 Tables currently contain addresses. Add support for address/port
215 tuples, and ports.
216
217 ## Separate mss clamping from normal rules
218
219 Currently, mss clamping is a rule procedure and has to be specified on
220 a matching rule. But, if there are both firewall rules and a desire
221 to clamp, then one has to add clamping to all rules. This item is
222 about having a way to express rules normally, and also say that
223 clamping shouldhappen.
224
225 http://mail-index.netbsd.org/tech-net/2017/01/15/msg006224.html
226
227 # Features (not needing architectural changes)
228
229 ## Add an extension for "route-to"
230
231 The essence is to change the next hop of a packet if it matches a
232 rule.
233
234 http://mail-index.netbsd.org/tech-net/2014/05/19/msg004526.html
235
236 ## support for ALTQ
237
238 ALTQ is a QoS scheme, and it expects a way to classify packets so that
239 different flows can be treated differently. Currently, ALTQ in NetBSD
240 uses pf. (An earlier comment indicated a solution might involve mbuf
241 tags.)
242
243 ## Support for NAT64 i.e. the protocol translation.
244
245 ## MiniUPnP
246
247 Add support for MiniUPnP (see http://miniupnp.free.fr/ web page).
248
249 ## add support for "with short"
250
251 (Clarify: is this about dropping packets that are shorter than they
252 should be? Why would the user choose?)
253
254 ## Add specific kinds of ICMP unreachable
255
256 Currently, rules are documented to allow returning `ICMP UNREACHABLE`
257 given the keyword `return-icmp`. Probably this is ICMP Admin
258 Prohibited, but this is not clear.
259
260 This item is about different or additional keywords to allow the user
261 to specify network, host, or port unreachable instead.
262
263 # Security
264
265 ## Extra measures to protect npf from SYN flood attacks.
266
267 E.g. accelerate connection expiration on low memory or after certain
268 threshold. The timeout can also be self-balancing. This item is about
269 protecting npf state in situations where excessive SYNs arrive in
270 situations where a legitimate SYN should trigger a state entry.
271
272 ## Consider blind reset attacks (see RFC 5961).
273
274 This is about the situation when npf is doing stateful processing on a
275 TCP connection and only allowing packets matching the connection.
276 Extend the definition of a packet matching the connection to meet the
277 new rules in RFC5961, and perhaps generate the specified response
278 packets.
279
280 ## Add counters
281
282 Add a hit counter to rules, or some other way so that the user can say
283 "show me the list of rules and for each rules, how many times it was
284 invoked". This is similar to ipfilter's `ipfstat -inh`.
285
286 # General
287
288 ## IPv4 options
289
290 Implement "block return-icmp in log final all with ipopts".
291 (Explain if this is more than "enable writing rules to match packets
292 with ip options".)
293
294 Consider defaulting to blocking options, with "allow-ip4opts" to
295 enable them.
296
297 ## IPv6 options
298
299 (Jointly with IPv4 options.)
300
301 Perhaps a limited set (IPPROTO_ROUTING, IPPROTO_HOPOPTS and
302 IPPROTO_DSTOPTS) by default, and "allow-ip6opts" to enable others.
303
304 ## add an ioctl, similar to PF's DIOCNATLOOK and IPF's SIOCGNATL
305
306 document it so that it can be added in third-party software, like:
307 https://github.com/squid-cache/squid/blob/5b74111aff8948e869959113241adada0cd488c2/src/ip/Intercept.cc#L263
308
309 ### patch squid to support transparent-proxy with NPF.
310
311 (Likely, simply using the ioctl from the previous item.)
312
313 ## support IPv6 jumbograms
314
315 (Explain what is or is not supported now, and what needs to happen
316 differently.)
317
318 ## IPv6 reassembly
319
320 Investigate and fix the IPv6 reassembly (there is a memory leak).
321
322 ## nbuf_ensure_writable
323
324 Use nbuf_ensure_writable() where appropriate.
325
326 # Low priority items
327
328 These items are left in the list, but there's no reason to think
329 anyone will address them any time soon, or that they are high enough
330 priority that anyone should. They can of course be moved (up likely
331 clarified if someeone, especially someone intending to work on them,
332 doesn't see it that way. (Perhaps we should drop them, but for now
333 they are parked.)
334
335 ## NAT Application Level Gateways for FTP
336
337 Generally, FTP is done in passive mode, so that the data connection is
338 created by the client, and no particular support is needed in
339 firewalls. This item is about creating an alg that allows the
340 (regular, not passive mode) inbound connection from the server, based
341 on watching the control connection.
342
343 (It is likely that there are almost no remaining uses of active FTP,
344 and thus it is unlikely this would be implemented.)
345
346 ## Consider experimentation to use bloom filters against certain DoS attacks.
347
348 (This needs much more clarity.)
349
350 ## support large IPv6 options
351
352 as explained here:
353 http://mail-index.netbsd.org/tech-net/2018/04/08/msg006786.html
354 But it's not a big problem - perhaps we don't care at all.
355
356 ## TCP FSM enhancement
357
358 Minor TCP FSM investigation: should it be not allowed to immediately
359 re-open the connection after RST or FIN?
360
361 (Explain what this means, how it relates to standards, and what the
362 concerns are.)
363