Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔗 Dial directly without using the resolved IP from net.ResolveTCPAddr #100

Closed
wants to merge 1 commit into from
Closed

Conversation

database64128
Copy link

@database64128 database64128 commented Nov 30, 2020

  • Use net.LookupIP instead. It returns all resolved IP addresses.
  • net.ResolveTCPAddr and net.ResolveUDPAddr use forResolve, which always prefers IPv4 for hostnames. See https://github.com/golang/go/blob/master/src/net/ipsock.go#L70-L73. For TCP changing to Dial directly restores the correct default behavior under dual-stack network conditions.

@google-cla
Copy link

google-cla bot commented Nov 30, 2020

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed (or fixed any issues), please reply here with @googlebot I signed it! and we'll verify it.


What to do if you already signed the CLA

Individual signers
Corporate signers

ℹ️ Googlers: Go here for more info.

1 similar comment
@google-cla
Copy link

google-cla bot commented Nov 30, 2020

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed (or fixed any issues), please reply here with @googlebot I signed it! and we'll verify it.


What to do if you already signed the CLA

Individual signers
Corporate signers

ℹ️ Googlers: Go here for more info.

@database64128 database64128 changed the title 🔗 Dial/WriteTo directly without using the resolved IP from net.ResolveTCP/UDPAddr 🔗 Dial directly without using the resolved IP from net.ResolveTCPAddr Nov 30, 2020
- Use `net.LookupIP` instead. It returns all resolved IP addresses.
- `net.ResolveTCPAddr` and `net.ResolveUDPAddr` use `forResolve`, which always prefers IPv4 for hostnames. For TCP changing to `Dial` directly restores the correct default behavior under dual-stack network conditions.
@database64128
Copy link
Author

@googlebot I signed it!

@bemasc
Copy link

bemasc commented Dec 7, 2020

Thanks @database64128; this does look like an improved behavior. Are you using outline-ss-server with SOCKS5 named destinations? We haven't optimized for this case because the Outline clients never use this mode; instead, the client always performs DNS resolution through the proxy and then specifies an explicit IPv4 destination.

}

tgtTCPConn, err := net.DialTCP("tcp", nil, tgtTCPAddr)
tgtConn, err := net.Dial("tcp", tgtAddr.String())
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unfortunately I don't think this is safe. In a DNS rebinding attack, the domain could initially resolve to a harmless destination, and then quickly be changed to resolve to a forbidden IP before being re-resolved by this call.

AFAIK, the only way to get proper dual-stack behavior is therefore to replicate the dual-stack/happy-eyeballs logic.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another solution would be to change the destination IP restriction to an opt-in setting. It's a lot easier to implement, maintain, and in my opinion, a lot better. By aligning our behavior with other popular Shadowsocks server implementations, there won't be any surprises to new users.

I often find myself in the need of accessing the private network of the server hosting an Outline server. Due to the restriction, I have to set up another non-Outline Shadowsocks server or resort to other VPN solutions. I'm pretty sure many other users also find it frustrating: #46.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Opening up local host and network access is a major security flaw. The fact that other implementation are vulnerable by default means that they should change. Outline will stick to the safer setting.

We can consider having an opt-in way of enabling access to the local network. Note, however, that that's also a significant vulnerability when you are on cloud, since you can often access metadata services. On DO you would be able to retrieve the tags for the droplet and retrieve the secret for the management API.

This feels like an advanced need for advanced users that could complicate the product and increase risk. We will probably not add to the Outline Manager, but we could consider an allow list in the outline-ss-server config.

@database64128
Copy link
Author

Are you using outline-ss-server with SOCKS5 named destinations?

Yes. I mostly use shadowsocks-rust and v2ray-core as my shadowsocks client.

bemasc pushed a commit that referenced this pull request Jan 27, 2021
When connecting to a TCP destination by name, go's implicit resolution
behavior tries all available addresses until it finds one that works
(fallback), with a preference for IPv6 if possible (happy eyeballs).
This is better than our current behavior (pick one IPv4 address).

The Outline client doesn't rely on named destinations, but other
Shadowsocks clients do.

This is an alternative to #100.

This change has one key difference from the previous behavior: IP
validation is enforced after the connection is established, not before.
A hostile user cannot use this to send data to a private service, but
they might be able to detect the existence of that service based on
how long the server waits before closing the connection.
}

tgtTCPConn, err := net.DialTCP("tcp", nil, tgtTCPAddr)
tgtConn, err := net.Dial("tcp", tgtAddr.String())
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Opening up local host and network access is a major security flaw. The fact that other implementation are vulnerable by default means that they should change. Outline will stick to the safer setting.

We can consider having an opt-in way of enabling access to the local network. Note, however, that that's also a significant vulnerability when you are on cloud, since you can often access metadata services. On DO you would be able to retrieve the tags for the droplet and retrieve the secret for the management API.

This feels like an advanced need for advanced users that could complicate the product and increase risk. We will probably not add to the Outline Manager, but we could consider an allow list in the outline-ss-server config.

@bemasc
Copy link

bemasc commented Jan 28, 2021

Thanks for this suggestion, @database64128. We found a safe way to implement this and have merged it (#101). Try it out, and let us know if it's working for you!

@bemasc bemasc closed this Jan 28, 2021
@database64128 database64128 deleted the dial-hostname branch September 14, 2021 08:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants