Differences

This shows you the differences between two versions of the page.

Link to this comparison view

ep:labs:04:contents:tasks:ex1 [2021/09/27 22:38]
radu.mantu [01. [??p] Primer / Reminder]
ep:labs:04:contents:tasks:ex1 [2025/02/11 23:36] (current)
cezar.craciunoiu
Line 1: Line 1:
-==== 01. [??pPrimer / Reminder ​====+==== 01. [10pMemory usage ====
  
-=== [??p] Task A - tcpdump ===+Open {{:​ep:​labs:​ep2017_l2_ex02.txt|ex01.py}} and take a look at the code. What is the difference between the methods //​do_append()//​ and //​do_allocate()//​
  
-**tcpdump** is network traffic monitoring toolAt its core, it uses **libpcap** which in turn uses a technology called **Extended Berkley Packet Filter ​(eBPF)**.+Use //vmstat// to monitor the memory usage while performing the following experimentsIn the main methodcall: 
 +  * The //​do_append//​ method on it's own (see //​Experiment 1//). 
 +  ​The //​do_allocate//​ method on it's own (see //​Experiment 2//)
 +  ​Both methods as shown in the //​Experiment 3// area in the code. 
 +  ​Both methods as shown in the //​Experiment 4// area in the code.
  
-**eBPF** was first proposed around 1995 when filtering mechanisms (and firewalls) were still a novel concept and were based on interpreters. **BPF** ​(now referred to as Classic BPF - **cBPF**was the initial version of a Motorola inspired virtual ISA (i.e.: had no hardware implementation -- think **CHIP-8**).+Offer an interpretation for the obtained results ​and change the code in //do_append()// so that the memory usage will be the same when performing //​Experiment 3// or //​Experiment 4//\\
  
-The whole idea was to compile a packet filtering program and attach it to a socket in kernelspace. This program would filter out packets that the userspace process would not be interested in and reduce the quantity of data copied over the kernelspace/​userspace boundary, only to ultimately be discarded. +HINTSPython GC; Reference cycle
- +
-Today, **eBPF** is used heavily for system profiling by companies such as Netflix and Facebook. **tcpdump** is one of the few examples that still use it for its original purpose. Ask your assistant if you want to know more about **eBPF** tracing (not part of the lab, don't panic!) +
- +
-== The Task == +
- +
-Use **tcpdump** to output outgoing **NTP** queries and incoming **http(s)** responses. Use the ''​-d''​ flag to see an **objdump** of the filter program'​s code. +
- +
-Complete the **tcpdump** command in order to satisfy the following formatting requirements: +
-  * print the packet number +
-  * print the elapsed time (in nanoseconds) since the first packet was captured +
-  * print the content of each packet (w/o l2 header) in hex and ASCII +
-  * do not resolve IP addresses to names +
- +
-How to test: +
-<code bash> +
-$ ntpdate -q ro.pool.ntp.org +
-$ curl ocw.cs.pub.ro +
-</​code>​ +
- +
-<note tip> +
-**tpcdump** can list the available interfaces if run with ''​-D''​. In addition to your network interfaces, you may also see a **Bluetooth** device or the **dbus-system** (depending on your desktop). +
- +
-If you don't specify the interface with ''​-i'',​ the first entry in the printed list will be used by default. This may not always be your active network interface but in stead, your **docker** bridge (for example). +
-</​note>​+
  
 <​solution -hidden> <​solution -hidden>
-<​code>​ +  * **Experiment 1,2:** There is not much difference in terms of memory usage between Experiment 1 and 2. 
-$ tcpdump -d '(udp dst port 123or (tcp src port 80) or (tcp src port 443)'​ +  * **Experiment 3:** The //​do_append//​ method starts using memory. After it finished running, since there is no reference for the generated array, the allocated memory is unallocated ​(reference counting garbage collector). Then the next method, ​//​do_allocate//,​ starts running and using memory. 
-$ sudo tcpdump -# --nano -ttttt -n -X '(udp dst port 123) or (tcp src port 80) or (tcp src port 443)'​ +  * **Experiment 4:** After the first method ends, since in this case there is a reference for the generated array, the memory is not unallocated. When the second method starts running, the amount of memory that it uses is added to the amount already used by the first method. If the used memory is taking up almost all the available free memory of the system, you can notice: swpd increasing, buff decreasing, cache decreasing, and si, so, bi, bo activity.
-</code> +
-</​solution>​+
  
-=== [??p] Task B - iptables ===+Notice the increased number of interrupts and context switches. These are caused by time.sleep().
  
-**iptables** is a configuration tool for the kernel packet filter. 
- 
-The system as a whole provides many functionalities that are grouped by **tables**: //filter, nat, mangle, raw, security//. If you want to alter a packet header, you place a rule in the //mangle// table. If you want to mask the private IP address of an internal host with the external IP address of the default gateway, you place a rule in the //nat// table. Depending on the table you choose, you will gain or lose access to some chains. If not specified, the default is the //filter// table. 
- 
-**Chains** are basically lists of rules. The five built-in chains are //​PREROUTING,​ FORWARD, POSTROUTING,​ INPUT, OUTPUT//. Each of these corresponds to certain locations in the network stack where packets trigger **Netfilter hooks** ([[https://​elixir.bootlin.com/​linux/​latest/​source/​net/​ipv4/​ip_input.c#​L540|here]] is the //​PREROUTING//​ kernel hook as an example -- not that hard to add one, right?) For a selected chain, the order in which the rules are evaluated is determined primarily by the priority of their tables and secondarily by the user's discretionary arrangement (i.e.: order in which rules are inserted). 
- 
-{{ :​ep:​labs:​04:​contents:​tasks:​iptables_path.png?​800 |}} 
- 
-A **rule** consists of two entities: a sequence of match criteria and a jump target. 
- 
-The **jump target** represents an action to be taken. You are most likely familiar with the built-in actions such as //ACCEPT// or //DROP//. These actions decide the ultimate fate of the packet and are final (i.e.: rule iteration stops when these are invoked). However, there are also extended actions (see ''​man iptables-extensions(8)''​) that are not terminal verdicts and can be used for various tasks such as auditing, forced checksum recalculation or removal of Explicit Congestion Notification (ECN) bits. 
- 
-The **match criteria** of every rule are checked to determine if the jump target is applied. The way this is designed is very elegant: every type of feature (e.g.: l3 IP address vs l4 port) that you can check has a match callback function defined in the kernel. If you want, you can write your own such function in a Linux Kernel Module (LKM) and thus extend the functionality of **iptables** ([[https://​inai.de/​documents/​Netfilter_Modules.pdf|Writing Netfilter Modules]] with code example). However, you will need to implement a userspace shared library counterpart. When you start an **iptables** process, it searches in ///​usr/​lib/​xtables/​ // and automatically loads certain shared libraries (note: this path can be overwritten or extended using the //​XTABLES_LIBDIR//​ environment variable). Each library there must do three things: 
-  * define **iptables** flags for the new criteria that you want to include. 
-  * define help messages for when ''​**iptables** %%--%%help''​ is called (its help message is an amalgamation of each library'​s help snippet). 
-  * provide an initialization function for the structure containing the rule parameters; this structure will end up in the kernel'​s rule chain. 
-So when you want to test the efficiency of the **iptables** rule evaluation process, keep in mind that each rule may imply the invocation of multiple callbacks. 
- 
-== The Task (1) == 
- 
-Write an **iptables** rule according to the following specifications:​ 
-  * **chain:** OUTPUT 
-  * **match rule:** TCP packets originating from ephemeral ports bound to a socket created by root 
-  * **target:** enable kernel logging of matched packets with the //"EP: "// prefix 
- 
-How to test: 
-<code bash> 
-$ sudo curl www.google.com 
-$ sudo dmesg 
-</​code>​ 
- 
-<note tip> 
-<code bash> 
-$ man 8 iptables-extensions 
-</​code>​ 
-</​note>​ 
- 
-<​solution -hidden> 
-<code bash> 
-# "​--log-prefix"​ must come after "-j LOG" 
-$ sudo iptables ​              \ 
-        -m multiport -m owner \ 
-        -I OUTPUT ​            \ 
-        -p tcp                \ 
-        --sports 1024:​65535 ​  \ 
-        --uid-owner root      \ 
-        -j LOG                \ 
-        --log-prefix 'EP: ' 
-</​code>​ 
 </​solution>​ </​solution>​
- 
-== The Task (2) == 
- 
-Write an **iptables** rule according to the following specifications:​ 
-  * **chain:** OUTPUT 
-  * **match rule:** **BPF** program that filters UDP traffic to port 53 (try [[https://​www.gnu.org/​software/​bash/​manual/​html_node/​Command-Substitution.html|bash command substitution]]) 
-  * **target:** set **TTL** to 1 (initially) 
- 
-Continue __appending__ the same rule with incremented **TTL** value until the **DNS** request goes through. 
- 
-How to test: 
-<code bash> 
-$ dig +short fep.grid.pub.ro @8.8.8.8 
-</​code>​ 
- 
-<note tip> 
-<code bash> 
-$ man 8 iptables-extensions nfbpf_compile 
-</​code>​ 
-</​note>​ 
  
 <​solution -hidden> <​solution -hidden>
-<​code ​bash+<​code ​python
-$ sudo iptables ​                                        \ +def do_append(size):​ 
-        -m bpf                                          \ +  ​result = [] 
-        -t mangle ​                                      \ +  ​result.append(result) 
-        -A OUTPUT ​                                      \ +  for i in range(size):​ 
-        ​--bytecode ​"$(nfbpf_compile 'udp dst port 53')" \ +    ​message= ​"some unique object %d" % i, * 1000 
-        -j TTL                                          \ +    ​result.append(message) 
-        ​--ttl-set 1+    time.sleep(0.0001) 
 +  ​return result
 </​code>​ </​code>​
- 
-NOTE: If they don't specify the //mangle// table, the default (//​filter//​) will be used. **iptables** will say //"ok, all your arguments are fine... I'll send the structure to kernelspace"//​ but it will still fail! They will get this message: 
- 
-<​code>​ 
-iptables: Invalid argument. Run `dmesg'​ for more information. 
-</​code>​ 
- 
-Whenever you upload a rule into the kernel, the appropriate module can also //​optionally//​ implement a rule check callback, in addition to the match callback. This rule check callback will verify that the structure received from **iptables** is correct (it doesn'​t trust a userspace process, obviously). If an error occurs, it will print an error message to the kernel log. 
- 
-Let the students check the kernel log! They had to do this for the previous task, so they have no reason to cry for help here. They will get: 
- 
-<code bash> 
-$ sudo dmesg 
-... 
-[   ​36.960234] x_tables: ip_tables: TTL target: only valid in mangle table, not filter 
-</​code>​ 
- 
-If they ask (they won'​t),​ **Xtables** (read cross-tables) is the backend of the **iptables** and more recently **nftables** (just reached v1.0 after ~13y) infrastructure. 
- 
 </​solution>​ </​solution>​
- 
-== The Task (3) == 
- 
-Give an example when **iptables** is unable to catch a packet. 
- 
-<​solution -hidden> 
-DHCPDISCOVER message. Interface has no IP address so it's placed in promiscuous mode (PF_PACKET) and the network stack is bypassed; the packet is put directly on the wire. In the past, it was possible to set 0.0.0.0 as a temporary IP while getting a lease, but not anymore! 
-</​solution>​ 
- 
ep/labs/04/contents/tasks/ex1.1632771482.txt.gz · Last modified: 2021/09/27 22:38 by radu.mantu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0