Thanks, all, for the patience as I finally got back to this.

On 2/24/2017 11:05 AM, Sander Hoentjen wrote:
>
> On 02/20/2017 07:48 PM, William A Rowe Jr wrote:
>> On Sat, Feb 18, 2017 at 4:25 PM, Daniel Ruggeri <drugg...@apache.org> wrote:
>>> On 2017-02-15 09:07 (-0600), William A Rowe Jr <wr...@rowe-clan.net> wrote:
>>>> On Wed, Feb 15, 2017 at 9:02 AM, Sander Hoentjen <san...@hoentjen.eu> 
>>>> wrote:
>>>>> mod_remote ip has:
>>>>>     /* mod_proxy creates outgoing connections - we don't want those */
>>>>>     if (!remoteip_is_server_port(c->local_addr->port)) {
>>>>>         return DECLINED;
>>>>>     }
>>>>> I am guessing something similar is needed for h2 connections?
>>>> I suspect that the mod_remoteip logic is wrong, that it should be guarding
>>>> against any subordinate connections and examining only explicitly 
>>>> configured
>>>> ports / origin IPs. the PROXY protocol is not part of the HTTP protocol and
>>>> incompatible with it, so the trust list logic isn't directly compatible 
>>>> (this is
>>>> clearly explained in the PROXY pseudo-RFC.)
>>>>
>>> Hi, Bill. That is what the module is doing. The original authors wrote it 
>>> to have a list of virtual hosts it is explicitly enabled for and explicitly 
>>> disabled for. I added a third list for optional vhosts. In the 
>>> pre_connection hook, it checks to see if the connection's local_addr (which 
>>> should normally be the server's IP) is explicitly configured to enable 
>>> PROXY handling. It then checks to see if the local port is a server port.
>>>
>>> Looking at the logs shared, 192.168.122.249:84 is the server IP:Port combo 
>>> and is also the local IP:Port from mod_h2. If h2 sets the master of this 
>>> connection, then we could skip the whole ordeal with this patch:
>>>
>>> Index: modules/metadata/mod_remoteip.c
>>> ===================================================================
>>> --- modules/metadata/mod_remoteip.c     (revision 1781701)
>>> +++ modules/metadata/mod_remoteip.c     (working copy)
>>> @@ -862,6 +862,10 @@
>>>      remoteip_conn_config_t *conn_conf;
>>>      int optional;
>>>
>>> +    if (c->master != NULL) {
>>> +        return DECLINED;
>>> +    }
>>> +
>>>      conf = ap_get_module_config(ap_server_conf->module_config,
>>>                                  &remoteip_module);
>>>
>>> .. but I don't know if that potentially means we are looking at the wrong 
>>> connection.
> First I'll say that with the "Optional" mode it worked, just not with On
> I just tried this patch and as far as I have tested this seems to work
> fine in On mode, as well as in Optional. I do see some other issue, but
> that is probably in my own code, I'll try to track that down later.

This is good news and about what I was expecting to happen. I will add
this to the commit I've got coming that incorporates a lot of Ruediger's
feedback.

>> That should be close, but need to ensure c->master is initialized for
>> http as well
>> where there is no master/subordinate.
> I am not sure what this means, how should I test this?

Hi, Bill - also hoping for a bit more input. Since PROXY protocol is not
tied to any particular layer 7 protocol, I don't think we'd have to
verify it is initialized for HTTP - just that there is no master at all.
At least, that's my understanding so I appreciate any corrections.


>> If the 'optional' (unwise) feature were removed, the decision to
>> inject the filter before
>> the http or h2 filter would be trivial, it would step out of the way
>> after the first-pass
>> (and perhaps not need to live on the filter stack at all - if we do a
>> fixed read against
>> the core filter - we hopefully know the number of bytes affected early
>> and can then
>> do a second read to complete the v1 vs v2 read?) --- all before we are
>> in a multiple
>> pipeline state.

I don't think that is the case because the module was also written to
support PROXY header consumption in a name-based virtual host context,
too, where ServerName abc may require it but ServerName xyz does not.
Agreed, if it were simply all or nothing (either it's enabled on this
connection or not), we could avoid some of these gymnastics but I think
that use case as well as the Optional use case requires it.


>> If we move to a conn_rec oriented one-shot nothing happens during the request
>> phase at all.
>>
>> By looking at the protocol filter stack, we should be able to glean
>> whether we are
>> talking to the core filter, or an 'unexpected' non-network filter, right?
>>
> I myself have no use-case at the moment for the "Optional" mode, maybe
> others do.

Sure, to clarify, the Optional use case came from a member on one of our
cousin projects (Tomcat) Chris Schultz as well as my own use cases. It
is useful for internally accessing the site from behind the
loadbalancer. When there is a publicly addressed upstream loadbalancer
(Amazon ELB or just HAProxy itself) talking to RFC1918 addressed or
non-routeable backend httpd servers, it becomes impossible to enable
internal communication on the RFC1918 space to the backend instances.
If the goal is to monitor or probe the site and (httpd proxy) backends
internally for health, this *can* be done by duplicating the virtual
hosts. Depending on the complexity of the virtual hosts, what resources
those virtual hosts have (proxies and whatnot) and their general size,
this could result in a fairly unmanageable httpd configuration having a
vhost that requires PROXY header and a second one on a different port or
IP that does not.
It gets even more complicated when you are aiming to do management
tasks. If you have balancers configured at the vhost as intended, you
can only manage those balancers from the vhost they live in. Further,
you may want to view server statistics, check info about the ldap cache,
etc but permit access to those things only from a trusted network in
addition to the user credentials protecting it.
So for those examples, aside from creating an internal HAProxy to
provide the header, it's not really possible to access the site
internally when "On". With "Optional" it's possible to keep the same
number of vhosts and enable the various management handlers and restrict
them to the RFC1918 space (plus any other authnz mechanisms). The other
obvious option would be to enable those handlers to the public Internet,
but that's bad juju :-)

-- 
Daniel Ruggeri

Reply via email to