On Wed, 1 May 2013, Franco Fichtner wrote:

> Not sure if that's a fitting comparison; and I know too little OSPF
> to answer.  Let me try another route.  The logic consists of an array
> of application detection functions, which can be invoked via their
> respective IP types.

I don't like this approach at all - it leads to a proliferation (as
demonstrated by your already long list) of kernel-side parsers that
will be a maintenance, and possibly security, nightmare.

The last thing we want it a rotting pile of protocol parsing code like
wireshark.

> On May 1, 2013, at 1:14 AM, Ted Unangst <t...@tedunangst.com> wrote:
>
> > My thoughts on the matter have always been that it would be cool to
> > integrate bpf into pf (though other developers surely have other
> > opinions). Then you get filtering for as many protocols as you care to
> > write bpf matchers for.
> 
> You mean externalising the DPI?  People[1] have tried to work on such
> ideas, but the general drift is that there are not enough interested
> individuals in the field to drive "second tier" development for
> application detections.

So if there is not enough interest to develop app protocol detectors/
disectors in bpf then why should C be any different?

> I find C to be quite flexible and empowering
> if one doesn't overcomplicate[2].
>
> [2] https://github.com/fichtner/OpenDPI/blob/master/src/lib/protocols/ssl.c

That's complicated and scary code for a kernel, e.g. multiple opportunities
for unsigned overflow that don't seem to be checked for.

I agree with tedu - it safer and more flexible to write parsers in bpf.
If that isn't desirable then maybe we could consider some other automata
classifier, but I think it is a bad, bad idea to do it in C.

-d

Reply via email to