[PATCH] Core: support for reading PROXY protocol v2 TLVs
Maxim Dounin
mdounin at mdounin.ru
Tue Nov 1 14:14:02 UTC 2022
Hello!
On Mon, Oct 31, 2022 at 04:07:00PM +0400, Roman Arutyunyan wrote:
> While testing the feature, it became clear that 107 bytes as maximum PROXY
> protocol header size may not be enough. This limit came from v1 and stayed
> unchanged when v2 was added. With this limit, there are only 79 bytes left for
> TLVs in case of IPv4 and 55 bytes in case of IPv6.
>
> Attached is a patch that increases buffer size up to 65K while reading PROXY
> protocl header. Writing is not changed since only v1 is supported.
[...]
> # HG changeset patch
> # User Roman Arutyunyan <arut at nginx.com>
> # Date 1667216033 -14400
> # Mon Oct 31 15:33:53 2022 +0400
> # Node ID 8c99314f90eccc2ad5aaf4b3de5368e964c4ffe0
> # Parent 81b4326daac70d6de70abbc3fe36d4f6e3da54a2
> Increased maximum read PROXY protocol header size.
>
> Maximum size for reading the PROXY protocol header is increased to 65536 to
> accommodate a bigger number of TLVs, which are supported since cca4c8a715de.
>
> Maximum size for writing the PROXY protocol header is not changed since only
> version 1 is currently supported.
>
> diff --git a/src/core/ngx_proxy_protocol.c b/src/core/ngx_proxy_protocol.c
> --- a/src/core/ngx_proxy_protocol.c
> +++ b/src/core/ngx_proxy_protocol.c
> @@ -281,7 +281,7 @@ ngx_proxy_protocol_write(ngx_connection_
> {
> ngx_uint_t port, lport;
>
> - if (last - buf < NGX_PROXY_PROTOCOL_MAX_HEADER) {
> + if (last - buf < NGX_PROXY_PROTOCOL_V1_MAX_HEADER) {
> return NULL;
> }
>
> diff --git a/src/core/ngx_proxy_protocol.h b/src/core/ngx_proxy_protocol.h
> --- a/src/core/ngx_proxy_protocol.h
> +++ b/src/core/ngx_proxy_protocol.h
> @@ -13,7 +13,8 @@
> #include <ngx_core.h>
>
>
> -#define NGX_PROXY_PROTOCOL_MAX_HEADER 107
> +#define NGX_PROXY_PROTOCOL_V1_MAX_HEADER 107
> +#define NGX_PROXY_PROTOCOL_MAX_HEADER 65536
>
>
> struct ngx_proxy_protocol_s {
> diff --git a/src/http/ngx_http_request.c b/src/http/ngx_http_request.c
> --- a/src/http/ngx_http_request.c
> +++ b/src/http/ngx_http_request.c
> @@ -641,7 +641,7 @@ ngx_http_alloc_request(ngx_connection_t
> static void
> ngx_http_ssl_handshake(ngx_event_t *rev)
> {
> - u_char *p, buf[NGX_PROXY_PROTOCOL_MAX_HEADER + 1];
> + u_char *p;
> size_t size;
> ssize_t n;
> ngx_err_t err;
> @@ -651,6 +651,7 @@ ngx_http_ssl_handshake(ngx_event_t *rev)
> ngx_http_ssl_srv_conf_t *sscf;
> ngx_http_core_loc_conf_t *clcf;
> ngx_http_core_srv_conf_t *cscf;
> + static u_char buf[NGX_PROXY_PROTOCOL_MAX_HEADER + 1];
>
I'm somewhat sceptical about the idea of allocation of up to 3
global 64k buffers, especially given that the protocol requires
atomic sending of the header, which means it cannot reliably
exceed 1500 bytes in most configurations.
Further, the maximum size of the proxy protocol header in non-SSL
case is still limited by client_header_buffer_size, which is 1024
bytes by default. Assuming there will be headers which does not
fit into 1k buffer, it is not clear why these will magically work
in case of SSL, but will require client_header_buffer_size tuning
otherwise.
Might be some dynamically allocated buffer, sized after
client_header_buffer_size, like in non-SSL case, would be a better
idea?
(It also might make sense to avoid assuming atomicity, which
clearly cannot be guaranteed if the header is larger than MTU.
This will also require dynamically allocated per-connection
buffers.)
Alternatively, we can consider using some larger-than-now on-stack
buffers, something like 4k should be acceptable given we use such
buffers in other places anyway. It should be enough for most
proxy protocol headers.
[...]
--
Maxim Dounin
http://mdounin.ru/
More information about the nginx-devel
mailing list