Differences

This shows you the differences between two versions of the page.

Link to this comparison view

ep:labs:04:contents:tasks:ex1 [2022/10/29 14:31]
vlad.stefanescu [01. [30p] Primer / Reminder]
ep:labs:04:contents:tasks:ex1 [2025/02/11 23:36] (current)
cezar.craciunoiu
Line 1: Line 1:
-==== 01. [30pPrimer / Reminder ​====+==== 01. [10pMemory usage ====
  
-<note tip> +Open {{:ep:​labs:​ep2017_l2_ex02.txt|ex01.py}} and take look at the codeWhat is the difference between the methods ​//do_append()// and //do_allocate()//? 
-//Pro tip #1//since you'll be using **man** ​lot in this exercise, add this to your //.bashrc// or //.zshrc//+
-<code bash> +
-# color schemes for man pages +
-man() +
-    LESS_TERMCAP_mb=$'​\e[1;​34m' ​  \ +
-    LESS_TERMCAP_md=$'​\e[1;​32m' ​  \ +
-    LESS_TERMCAP_so=$'​\e[1;​33m' ​  \ +
-    LESS_TERMCAP_us=$'​\e[1;​4;​31m'​ \ +
-    LESS_TERMCAP_me=$'​\e[0m' ​     \ +
-    LESS_TERMCAP_se=$'​\e[0m' ​     \ +
-    LESS_TERMCAP_ue=$'​\e[0m' ​     \ +
-    command man "​$@"​ +
-+
-</code>+
  
-Source ​the file and test that it works+Use //vmstat// to monitor ​the memory usage while performing the following experiments. In the main method, call: 
-</note>+  * The //​do_append//​ method on it's own (see //​Experiment 1//)
 +  * The //​do_allocate//​ method on it's own (see //​Experiment 2//). 
 +  * Both methods as shown in the //​Experiment 3// area in the code. 
 +  * Both methods as shown in the //​Experiment 4// area in the code.
  
-=== [10p] Task A - tcpdump ===+Offer an interpretation for the obtained results and change the code in //​do_append()//​ so that the memory usage will be the same when performing //​Experiment 3// or //​Experiment 4//. \\
  
-**tcpdump** is a network traffic monitoring tool. At its core, it uses **libpcap** which in turn uses a technology called **Extended Berkley Packet Filter (eBPF)**. +HINTSPython GC; Reference cycle
- +
-**BPF** was first proposed around 1995 when filtering mechanisms (and firewalls) were still a novel concept and were based on interpreters. **BPF** (now referred to as Classic BPF - **cBPF**) was the initial version of a Motorola inspired virtual ISA (i.e.had no hardware implementation -- think **CHIP-8**). **eBPF** is basically still **BPF** but more compatible with 64-bit architectures so that Just In Time (JIT) translators have an easier time running the code. +
- +
-At first, the whole idea was to compile packet filtering programs and attach them to sockets in kernelspace. These programs would filter out packets that userspace processes would not be interested in. Consequently,​ this would reduce the quantity of data copied over the kernelspace/​userspace boundary, only to ultimately be discarded. +
- +
-Today, **eBPF** is used heavily for system profiling by companies such as Netflix and Facebook. Linux has had a kernel VM capable of running and statically analyzing **eBPF** code since around 2006. **tcpdump** is one of the few examples that still use it for its original purpose. Ask your assistant if you want to know more about **eBPF** tracing (not part of the lab, don't panic!) +
- +
-== The Task == +
- +
-Use **tcpdump** to output outgoing **NTP** queries and incoming **http(s)** responses. Use the ''​-d''​ flag to see an **objdump** of the filter program'​s code. +
- +
-Complete the **tcpdump** command in order to satisfy the following formatting requirements:​ +
-  * print the packet number +
-  * print the elapsed time (in nanoseconds) since the first packet was captured +
-  * print the content of each packet (without l2 header) in hex and ASCII +
-  * do not resolve IP addresses to names +
- +
-How to test: +
-<code bash> +
-$ ntpdate -q ro.pool.ntp.org +
-$ curl ocw.cs.pub.ro +
-</​code>​ +
- +
-<note tip> +
-**tpcdump** can list the available interfaces if run with ''​-D''​. In addition to your network interfaces, you may also see a **Bluetooth** device or the **dbus-system** (depending on your desktop). +
- +
-If you don't specify the interface with ''​-i'',​ the first entry in the printed list will be used by default. This may not always be your active network interface but in stead, your **docker** bridge (for example). +
-</​note>​+
  
 <​solution -hidden> <​solution -hidden>
-<​code>​ +  * **Experiment 1,2:** There is not much difference in terms of memory usage between Experiment 1 and 2. 
-$ tcpdump -d '(udp dst port 123or (tcp src port 80) or (tcp src port 443)'​ +  * **Experiment 3:** The //​do_append//​ method starts using memory. After it finished running, since there is no reference for the generated array, the allocated memory is unallocated ​(reference counting garbage collector). Then the next method, ​//​do_allocate//,​ starts running and using memory. 
-$ sudo tcpdump -# --nano -ttttt -n -X '(udp dst port 123) or (tcp src port 80) or (tcp src port 443)'​ +  * **Experiment 4:** After the first method ends, since in this case there is a reference for the generated array, the memory is not unallocated. When the second method starts running, the amount of memory that it uses is added to the amount already used by the first method. If the used memory is taking up almost all the available free memory of the system, you can notice: swpd increasing, buff decreasing, cache decreasing, and si, so, bi, bo activity.
-</code> +
-</​solution>​+
  
-=== [20p] Task B - iptables ===+Notice the increased number of interrupts and context switches. These are caused by time.sleep().
  
-**iptables** is a configuration tool for the kernel packet filter. 
- 
-The system as a whole provides many functionalities that are grouped by **tables**: //filter, nat, mangle, raw, security//. If you want to alter a packet header, you place a rule in the //mangle// table. If you want to mask the private IP address of an internal host with the external IP address of the default gateway, you place a rule in the //nat// table. Depending on the table you choose, you will gain or lose access to some chains. If not specified, the default is the //filter// table. 
- 
-**Chains** are basically lists of rules. The five built-in chains are //​PREROUTING,​ FORWARD, POSTROUTING,​ INPUT, OUTPUT//. Each of these corresponds to certain locations in the network stack where packets trigger **Netfilter hooks** ([[https://​elixir.bootlin.com/​linux/​latest/​source/​net/​ipv4/​ip_input.c#​L540|here]] is the //​PREROUTING//​ kernel hook as an example -- not that hard to add one, right?) For a selected chain, the order in which the rules are evaluated is determined primarily by the priority of their tables and secondarily by the user's discretionary arrangement (i.e.: order in which rules are inserted). 
- 
-{{ :​ep:​labs:​04:​contents:​tasks:​iptables_path.png?​800 |}} 
-<​html>​ 
-<​center>​ 
-<​b>​Figure 1:</​b>​ Netfilter hooks; each has a subset of associated tables. Tables categorize the actions (i.e.: targets) taken when a match occurs. E.g: NAT cannot be performed on the FORWARD chain. When multiple rules exist on the same chain, their processing order is primarily determined by the priority of the table they are defined in. 
-</​center>​ 
-</​html>​ 
- 
-A **rule** consists of two entities: a sequence of match criteria and a jump target. 
- 
-The **jump target** represents an action to be taken. You are most likely familiar with the built-in actions such as //ACCEPT// or //DROP//. These actions decide the ultimate fate of the packet and are final (i.e.: rule iteration stops when these are invoked). However, there are also extended actions (see ''​man iptables-extensions(8)''​) that are not terminal verdicts and can be used for various tasks such as auditing, forced checksum recalculation or removal of Explicit Congestion Notification (ECN) bits. 
- 
-The **match criteria** of every rule are checked to determine if the jump target is applied. The way this is designed is very elegant: every type of feature (e.g.: l3 IP address vs l4 port) that you can check has a match callback function defined in the kernel. If you want, you can write your own such function in a Linux Kernel Module (LKM) and thus extend the functionality of **iptables** ([[https://​inai.de/​documents/​Netfilter_Modules.pdf|Writing Netfilter Modules]] with code example). However, you will need to implement a userspace shared library counterpart. When you start an **iptables** process, it searches in ///​usr/​lib/​xtables/​ // and automatically loads certain shared libraries (note: this path can be overwritten or extended using the //​XTABLES_LIBDIR//​ environment variable). Each library there must do three things: 
-  * define **iptables** flags for the new criteria that you want to include. 
-  * define help messages for when ''​**iptables** %%--%%help''​ is called (its help message is an amalgamation of each library'​s help snippet). 
-  * provide an initialization function for the structure containing the rule parameters; this structure will end up in the kernel'​s rule chain. 
-So when you want to test the efficiency of the **iptables** rule evaluation process, keep in mind that each rule may imply the invocation of multiple callbacks such as [[https://​elixir.bootlin.com/​linux/​latest/​source/​net/​netfilter/​xt_tcpudp.c#​L66|this]]. 
- 
-== The Task (1) == 
- 
-Write an **iptables** rule according to the following specifications:​ 
-  * **chain:** OUTPUT 
-  * **match rule:** TCP packets originating from ephemeral ports bound to a socket created by root 
-  * **target:** enable kernel logging of matched packets with the //"EP: "// prefix 
- 
-How to test: 
-<code bash> 
-$ sudo curl www.google.com 
-$ sudo dmesg 
-</​code>​ 
- 
-<note tip> 
- 
-**multiport**,​ **owner** modules 
- 
-<code bash> 
-$ man 8 iptables-extensions 
-</​code>​ 
-</​note>​ 
- 
-<​solution -hidden> 
-<code bash> 
-# "​--log-prefix"​ must come after "-j LOG" 
-$ sudo iptables ​              \ 
-        -m multiport -m owner \ 
-        -I OUTPUT ​            \ 
-        -p tcp                \ 
-        --sports 1024:​65535 ​  \ 
-        --uid-owner root      \ 
-        -j LOG                \ 
-        --log-prefix 'EP: ' 
-</​code>​ 
 </​solution>​ </​solution>​
- 
-== The Task (2) == 
- 
-Write an **iptables** rule according to the following specifications:​ 
-  * **chain:** OUTPUT 
-  * **match rule:** **BPF** program that filters UDP traffic to port 53 (try [[https://​www.gnu.org/​software/​bash/​manual/​html_node/​Command-Substitution.html|bash command substitution]]) 
-  * **target:** set **TTL** to 1 (initially) 
- 
-Continue __appending__ the same rule with incremented **TTL** value until the **DNS** request goes through. 
- 
-How to test: 
-<code bash> 
-$ dig +short fep.grid.pub.ro @8.8.8.8 
-</​code>​ 
- 
-<note tip> 
-**bpf** module 
- 
-<code bash> 
-$ man 8 iptables-extensions nfbpf_compile 
-</​code>​ 
- 
----- 
- 
-If you are working on Ubuntu, there is a chance that **nfbpf_compile** did not come with the **iptables** package (oh Canonical... maybe there'​s something in the //​Universe//​ repos?). \\ 
-Anyway, you can still install it manually: 
- 
-<code bash> 
-$ sudo apt install libpcap-dev 
-$ wget https://​raw.githubusercontent.com/​netgroup-polito/​iptables/​master/​utils/​nfbpf_compile.c 
-$ gcc -o nfbpf_compile nfbpf_compile.c -lpcap 
-</​code>​ 
- 
-Also, use this [[https://​www.mankier.com/​8/​nfbpf_compile|man page]] rather than installing it separately. 
-</​note>​ 
  
 <​solution -hidden> <​solution -hidden>
-<​code ​bash+<​code ​python
-$ sudo iptables ​                                        \ +def do_append(size):​ 
-        -m bpf                                          \ +  ​result = [] 
-        -t mangle ​                                      \ +  ​result.append(result) 
-        -A OUTPUT ​                                      \ +  for i in range(size):​ 
-        ​--bytecode ​"$(nfbpf_compile 'udp dst port 53')" \ +    ​message= ​"some unique object %d" % i, * 1000 
-        -j TTL                                          \ +    ​result.append(message) 
-        ​--ttl-set 1+    time.sleep(0.0001) 
 +  ​return result
 </​code>​ </​code>​
- 
-NOTE: If they don't specify the //mangle// table, the default (//​filter//​) will be used. **iptables** will say //"ok, all your arguments are fine... I'll send the structure to kernelspace"//​ but it will still fail! They will get this message: 
- 
-<​code>​ 
-iptables: Invalid argument. Run `dmesg'​ for more information. 
-</​code>​ 
- 
-Whenever you upload a rule into the kernel, the appropriate module can also //​optionally//​ implement a rule check callback, in addition to the match callback. This rule check callback will verify that the structure received from **iptables** is correct (it doesn'​t trust a userspace process, obviously). If an error occurs, it will print an error message to the kernel log. 
- 
-Let the students check the kernel log! They had to do this for the previous task, so they have no reason to cry for help here. They will get: 
- 
-<code bash> 
-$ sudo dmesg 
-... 
-[   ​36.960234] x_tables: ip_tables: TTL target: only valid in mangle table, not filter 
-</​code>​ 
- 
-If they ask (they won'​t),​ **Xtables** (read cross-tables) is the backend of the **iptables** and more recently **nftables** (just reached v1.0 after ~13y) infrastructure. 
- 
 </​solution>​ </​solution>​
- 
-== The Task (3) == 
- 
-Give an example when **iptables** is unable to catch a packet. 
- 
-<​solution -hidden> 
-DHCPDISCOVER message. Interface has no IP address so it's placed in promiscuous mode (PF_PACKET) and the network stack is bypassed; the packet is put directly on the wire. In the past, it was possible to set 0.0.0.0 as a temporary IP while getting a lease, but not anymore! 
-</​solution>​ 
- 
ep/labs/04/contents/tasks/ex1.1667043079.txt.gz · Last modified: 2022/10/29 14:31 by vlad.stefanescu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0