-
Notifications
You must be signed in to change notification settings - Fork 18
icmp: workaround for gvisor's fake ICMP echo #142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: n2
Are you sure you want to change the base?
Conversation
Thanks. I wonder if this forceful default handling of ICMP is a bug on gvisor upstream despite having set a ICMP handler? It was working as I'd expect it to in previous (believe a year or so ago) gvisor version. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR introduces a workaround for gvisor's fake ICMP echo by modifying the ICMP packet types and recalculating checksums for both ICMPv6 and ICMPv4 before processing.
- Adds a new ICMPHackTarget and associated Action method for intercepting and modifying ICMP packets.
- Implements restore functions to revert the experimental packet type changes and adjusts the outbound handler to invoke the hack.
Comments suppressed due to low confidence (2)
intra/netstack/icmp.go:36
- [nitpick] Consider replacing the magic number 200 with a clearly named constant (e.g., ICMPv6ExperimentalType) for improved readability and maintenance.
icmp6Hdr.SetType(200)
intra/netstack/icmp.go:56
- [nitpick] Replace the magic number 253 with a named constant (e.g., ICMPv4ExperimentalType) to enhance clarity and consistency.
icmp4Hdr.SetType(253)
🤔Will current handler work if these lines are deleted? |
I have a theory that these lines were written for inbound ICMP echo requests (packet sockets can receive them). @kevinGC |
Sorry, what's the specific question? I'm missing some context and not sure what 'fake' means in the title here. I don't remember any recent changes to ICMP handling. If you've set a custom handler for ICMP packets and the stack is still doing its own ICMP handling, I think that's because ICMP handling is tightly coupled to the ipv4 and ipv6 packages. Nobody has tried to split them AFAIK, so there's no easy way to turn off just ICMP. Packet sockets should get ICMP messages regardless of the code in the ipv4 and ipv6 packages; it happens earlier in packaet processing (around nic.go:DeliverLinkPacket). BTW @nybidari is the gVisor networking lead these days. |
Netstack replies to ICMP messages on its own and does not wait on the Handler set via I should note that Netstack we use is setup with Spoofing and is Promiscuous (ref), in addition to being the default gateway (
This happens even today. The Handler does get those packets, but Netstack replies to those packets before the Handler has had the chance. Like @Lanius-collaris points out, ICMP is handled internally (here) before being delivered to the Handler (here?)? For us, it is enough if ICMP requests ( |
"packet sockets" here mean sockets created with
I have tried and succeeded. 😆 |
Not working. I'm trying inserting code in other positions.