RFR(M): JDK-8061228 Allow JDWP socket connector to accept connections from certain ip addresses only
serguei.spitsyn at oracle.com
serguei.spitsyn at oracle.com
Tue May 9 21:42:41 UTC 2017
Hi Dmitry,
I'd like to resolve my questions before the upcoming design discussion
on Thu.
http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c.udiff.html
(0) The design description from the bug report tells:
> Than we change a negotiation protocol between JDWP and transport.
> We pass maximal supported version to transport initialization
routine and expect transport actual version to be returned.
The modified negotiation protocol adds extra complexity.
What is a motivation behind this?
Is it really necessary for the transport library to return an actual
version instead of rejecting the unmatched version?
I do not see it is really used in the webrev.15 implementation.
(1) The following change in the jdwp transport library will reject
theJDWPTRANSPORT_VERSION_1_0 as it is below
the version JDWPTRANSPORT_VERSION_1_1, but will except any version
above the JDWPTRANSPORT_VERSION_1_1
(with providing/returning the actual transport version):
jdwpTransport_OnLoad(JavaVM *vm, jdwpTransportCallback* cbTablePtr,
- jint version, jdwpTransportEnv** result)
+ jint version, void** env)
{
- if (version != JDWPTRANSPORT_VERSION_1_0) {
+ if (version < JDWPTRANSPORT_VERSION_1_1) {
return JNI_EVERSION;
}
Te following change will also prevent supporting the 1_0 version of the
transport library:
- interface.StartListening = &socketTransport_startListening;
+ interface.StartListening = NULL;
I'd suggest the following alternate change to the transport API allowing
to support
both old and new versions at the same time (it would simplify the
negotiation rules):
- Add new function:
jdwpTransportError AllowPeers(const char* peers);
- Keep the original StartListening function.
The function uses the allowed peers data if it was previously
cached by the AllowPeers().
- It seems, the alternate approach does not require adding the
extra_data with version.
But if there is still a real need to get the transport API version
then it'd better
to introduce a function named GetTransportVersion() or
JDWP_TransportVersion().
This would allow to encapsulate any extra_data that is necessary in
such a case.
(2) The following error messages miss the actual IP address or mask that
was found to be illegal:
383 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid ip
address for allow"); 392
RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask for
allow");
(3) A suggestion on the following:
377 uint32_t mask = 0xFFFFFFFF; 400 mask = 0xFFFFFFFF; // reset mask
I'd suggest a more explicit approach instead of the L400 for a better
clarity:
386 if (*s == '/') {
387 // netmask specified
388 s = mask_s2u(s + 1, &mask);
389 if (*(s-1) == '/') {
390 // Input is not consumed, something bad happens
391 _peers_cnt = 0;
392 RETURN_ERROR(JDWPTRANSPORT_ERROR_ILLEGAL_ARGUMENT, "invalid netmask
for allow");
393 }
394 } else { mask = 0xFFFFFFFF; }
http://cr.openjdk.java.net/%7Edsamersoff/JDK-8061228/webrev.15/src/jdk.jdwp.agent/share/native/libjdwp/transport.c.udiff.html
(4) Some confusion with the fragment and its comment:
+
+ /* Pass the latest supported version,
+ * expect actual transport version in t->extra_data->version
+ */
+ ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_1, &t);
+ if (ver == JNI_EVERSION) {
ver = (*onLoad)(jvm, &callback, JDWPTRANSPORT_VERSION_1_0, &t);
+ // Special handling for versionless transports
+ info->transportVersion = JDWPTRANSPORT_VERSION_1_0;
+ }
+ else {
+ info->transportVersion = (*t)->extra_data->version;
+ }
+
The term "latest supported version" is ambiguous in this context. Do you
mean, supported by the JDWP back-end or by the agent library? Also, it
is not clear in what circumstances the agent library would support the
version 1_0 only. The JDWP back-end is always coupled with the socket
transport library, isn't it? Is it because the libdt_shmem library can
be used on Windows or because a different native library path can be
used? Could you explain a little bit? As we see in (1) above the actual
transport version can be different from requested only if the requested
version is above the latest supported by the transport library.
Otherwise, the version is matched or the JNI_EVERSION is returned. The
subsequent call to the OnLoad function can succeed only if the library
supports just the version 1_0. (5) Memory allocation for the info->allow
field is needed only for the transport version 1_1:
+ if (allow != NULL) {
+ info->allow = jvmtiAllocate((int)strlen(allow)+1);
+ if (info->allow == NULL) {
+ serror = JDWP_ERROR(OUT_OF_MEMORY);
+ goto handleError;
+ }
+ (void)strcpy(info->allow, allow);
+ }
(6) There is no handling for the condition when the *allow* parameter is
passed but the transport version is 1_0 (which does not support the
*allow* parameter):
+ /* Interface version 1.0 doesn't support versioning, so we have to
+ * use global variable and set the version artifically.
+ * Use (*t)->extra_data->version directly when 1.0 is gone.
+ */
+ switch(info->transportVersion) {
+ case JDWPTRANSPORT_VERSION_1_0:
err = (*trans)->StartListening(trans, address, &retAddress);
+ break;
+ case JDWPTRANSPORT_VERSION_1_1:
+ err = (*trans)->StartListening11(trans, address, &retAddress,
info->allow);
+ break;
+ default:
+ err = JNI_EVERSION;
+ }
Thanks, Serguei On 3/29/17 08:10, Dmitry Samersoff wrote:
> Robbin,
>
>> One follow-up issue is that if you start suspended
>> and than connect with
>> an unallowed client the JVM starts and executes the program.
> Fixed.
>
> see http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.15
>
> -Dmitry
>
> On 2017-03-16 15:59, Robbin Ehn wrote:
>> Hi Dmitry, thanks for the update.
>>
>> One follow-up issue is that if you start suspended and than connect with
>> an unallowed client the JVM starts and executes the program.
>> Simple program prints "Hello".
>>
>> [rehn at rehn-ws vanilla-hs]$ java
>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=y,address=*:9999,allow=1.2.3.0/32
>> -cp . H
>> Listening for transport dt_socket at address: 9999
>> ERROR: Peer not allowed to connect
>> Listening for transport dt_socket at address: 9999
>> Hello
>>
>> I think it would be good if the VM stayed suspended when an unallowed
>> client connects.
>>
>> Thanks, Robbin
>>
>> On 03/13/2017 08:07 PM, Dmitry Samersoff wrote:
>>> Robbin,
>>>
>>> Please, see:
>>>
>>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.11
>>>
>>>> 1:
>>>> So connecting with an unallowed client terminates the VM.
>>> Fixed.
>>>
>>>> 2:
>>>> Starting with an bad allow filter terminates the VM when connecting a
>>>> client.
>>> Moved allowed parameter (and parser call) to StartListening.
>>>
>>> -Dmitry
>>>
>>>
>>> On 2017-03-10 15:56, Robbin Ehn wrote:
>>>> Hi Dmitry,
>>>>
>>>> I took a look at this, I have two practical issues:
>>>>
>>>> 1:
>>>> [rehn at rehn-ws dev]$ java
>>>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:9999,allow=6.6.6.6
>>>>
>>>> -cp runs ForEver
>>>> Listening for transport dt_socket at address: 9999
>>>> ERROR: transport error 202: peer not allowed to connect: Success
>>>> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
>>>> error [transport.c:358]
>>>>
>>>> So connecting with an unallowed client terminates the VM.
>>>>
>>>> 2:
>>>> [rehn at rehn-ws dev]$ java
>>>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=*:9999,allow=6.BAD.6.6
>>>>
>>>> -cp runs ForEver
>>>> Listening for transport dt_socket at address: 9999
>>>> ERROR: transport error 202: unable to parse list of allowed peers:
>>>> Success
>>>> JDWP exit error JVMTI_ERROR_NONE(0): could not connect, timeout or fatal
>>>> error [transport.c:358]
>>>>
>>>> Starting with an bad allow filter terminates the VM when connecting a
>>>> client.
>>>>
>>>>
>>>> Connecting with an unallowed ip/port should not terminate the VM and we
>>>> should verify allow filter directly at startup.
>>>>
>>>> Thanks
>>>>
>>>> /Robbin
>>>>
>>>> On 02/28/2017 10:41 AM, Dmitry Samersoff wrote:
>>>>> Everybody,
>>>>>
>>>>> Please review:
>>>>>
>>>>> http://cr.openjdk.java.net/~dsamersoff/JDK-8061228/webrev.10/
>>>>>
>>>>> These changes introduce new parameter[1] of the socket transport -
>>>>> allow. Users can explicitly specify a list of hosts that allowed to
>>>>> connect to jdwp server and it's the second part of JDWP hardening[2].
>>>>>
>>>>> No restrictions are applied by default now but I'll file a separate CR
>>>>> to restrict list of allowed peers to localhost by default.
>>>>>
>>>>> Also these changes implement versioning for jdwp transport and therefor
>>>>> simplify feature development of jdwp.
>>>>>
>>>>>
>>>>> 1. Example command line:
>>>>>
>>>>> -agentlib:jdwp=transport=dt_socket,server=y,suspend=n,
>>>>> address=*,allow="127.0.0.0/8;192.168.0.0/24"
>>>>>
>>>>> Possible values for allow parameter:
>>>>> * - accept connections from everywhere.
>>>>> N.N.N.N - accept connections from this IP address only
>>>>> N.N.N.N/nn - accept connections from particular ip subnet
>>>>>
>>>>>
>>>>>
>>>>> 2. JDK-8052136 JDWP hardening
>>>>>
>>>>> -Dmitry
>>>>>
>>>
>
More information about the serviceability-dev
mailing list