Welcome! Log In Create A New Profile

Advanced

RE: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Eran Kornblau via nginx-devel
September 05, 2022 01:14AM
>
>
> -----Original Message-----
> From: Maxim Dounin <mdounin@mdounin.ru>
> Sent: Monday, 5 September 2022 3:53
> To: nginx-devel@nginx.org
> Subject: Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs
>
> Hello!
>
> On Wed, Aug 31, 2022 at 07:52:15PM +0400, Roman Arutyunyan wrote:
>
> > # HG changeset patch
> > # User Roman Arutyunyan <arut@nginx.com> # Date 1661436099 -14400
> > # Thu Aug 25 18:01:39 2022 +0400
> > # Node ID 4b856f1dff939e4eb9c131e17af061cf2c38cfac
> > # Parent 069a4813e8d6d7ec662d282a10f5f7062ebd817f
> > Core: support for reading PROXY protocol v2 TLVs.
>
> First of all, could you please provide details on the use case?
> I've seen requests for writing proxy protocol TLVs to upstream servers (see ticket #1639), but not yet seen any meaningful reading requests.
>
Hi,

Jumping in here regarding use cases, we have a couple of use cases for this in our live video system -

1. We support video ingest over Haivision's SRT protocol (a UDP-based transport protocol designed for video streaming).
SRT has a concept of 'stream id' (https://github.com/Haivision/srt/blob/master/docs/features/access-control.md) which we're using to
identify the incoming video stream (a bit like the stream name/tc url in RTMP).
In the implementation, we have separate components for handling the transport layer and the application/video layer.
For the transport, we implemented an SRT/TCP gateway (https://github.com/kaltura/nginx-srt-module),
while for the application layer, we are using a slightly modified version of Roman's nginx-ts-module.
The problem is how to propagate the SRT stream-id to the TCP upstream.
Currently, the solution we have for this is a poor man's proxy protocol - we send the stream-id on the TCP socket,
delimited by a newline, and our modified version of nginx-ts-module extracts it.

2. Another feature we have is RTMP output, which enables our customers to send their video streams to 3rd parties.
We wrote some custom module to translate the internal protocol we use for video transfer back to RTMP,
but, we also want to support RTMPS output (RTMP over SSL/TLS). We can extend our module to support SSL,
but that is probably not a small task... so, instead, we are using a local nginx 'stream' proxy that acts as a TCP->SSL gateway.
The problem is how to pass the host/port of the external RTMP endpoint over the internal TCP connection
(we want it to be dynamic - prefer not to use a set of predefined host names in the configuration).
The solution we have now is the same as above - we send the URL in the beginning of the TCP stream, and we extract it
using some tiny custom module - https://github.com/kaltura/nginx-srt-module/blob/master/src/ngx_stream_preread_str_module.c.

In my understanding, with this patch, we should be able to solve both scenarios in a more standard/elegant way.

Hope this help,

Thanks!

Eran

> > The TLV values are available in HTTP and Stream variables
> > $proxy_protocol_tlv_0xN, where N is a hexadecimal TLV type number with
> > no leading zeroes.
>
> I can't say I like the "hexadecimal TLV type number with no leading zeroes" approach, especially given that the specification uses leading zeroes in TLV types. With leading zeros might be better, to match specification.
>
> Also, it might worth the effort to actually add names for known types instead or in addition to numbers.
>
> Another question is PP2_TYPE_SSL, which is itself a complex structure and a list of multiple subtypes. Provided
>
> Given the above, not sure if the approach with early parsing and header-like list as in the patch is the good idea. Just preserving TLVs as is and parsing them all during variable evaluation might be easier and more efficient.
>
> Also, the idea of merging TLV values with identical types looks wrong to me, especially given that many TLSs are binary.
> Specification does not seem to define the behaviour here, unfortunately. As far as I understand, HAProxy itself still doesn't implement PPv2 parsing, so there is not reference implementation either. On the other hand, it should be easy enough to check all TLVs for duplicate by using a 256-bit bitmask and reject connections if there are any duplicates.
>
> >
> > diff --git a/src/core/ngx_proxy_protocol.c
> > b/src/core/ngx_proxy_protocol.c
> > --- a/src/core/ngx_proxy_protocol.c
> > +++ b/src/core/ngx_proxy_protocol.c
> > @@ -40,6 +40,12 @@ typedef struct {
> > } ngx_proxy_protocol_inet6_addrs_t;
> >
> >
> > +typedef struct {
> > + u_char type;
> > + u_char len[2];
> > +} ngx_proxy_protocol_tlv_t;
> > +
> > +
> > static u_char *ngx_proxy_protocol_read_addr(ngx_connection_t *c, u_char *p,
> > u_char *last, ngx_str_t *addr);
> > static u_char *ngx_proxy_protocol_read_port(u_char *p, u_char *last,
> > @@ -273,8 +279,11 @@ ngx_proxy_protocol_v2_read(ngx_connectio
> > size_t len;
> > socklen_t socklen;
> > ngx_uint_t version, command, family, transport;
> > + ngx_list_t *pp_tlv;
>
> tlvs?
>
> See above though, it probably doesn't make sense to parse TLVs here.
>
> > ngx_sockaddr_t src_sockaddr, dst_sockaddr;
> > + ngx_table_elt_t *t;
>
> Just in case, most ngx_table_elt_t variables are named "h", as in "header".
>
> [...]
>
> --
> Maxim Dounin
> https://eur02.safelinks.protection.outlook.com/?url=http%3A%2F%2Fmdounin.ru%2F&amp;data=05%7C01%7C%7C71b5ceb7d09644384d1708da8ed932e4%7C0c503748de3f4e2597e26819d53a42b6%7C1%7C0%7C637979360772824220%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;sdata=%2FrPlS2oVVwuMtoNTJv3iobQsr2sgBWQHb71bmLYEd6Y%3D&amp;reserved=0
> _______________________________________________
> nginx-devel mailing list -- nginx-devel@nginx.org To unsubscribe send an email to nginx-devel-leave@nginx.org
>
_______________________________________________
nginx-devel mailing list -- nginx-devel@nginx.org
To unsubscribe send an email to nginx-devel-leave@nginx.org
Subject Author Views Posted

[PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 973 August 31, 2022 11:54AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 196 September 01, 2022 05:48AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 201 September 04, 2022 08:54PM

RE: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Eran Kornblau via nginx-devel 200 September 05, 2022 01:14AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 193 September 05, 2022 09:24AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 251 September 05, 2022 12:00PM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 173 September 09, 2022 11:48AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 167 September 12, 2022 05:32PM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 190 September 13, 2022 11:04AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 197 September 19, 2022 10:48PM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 175 September 27, 2022 05:42AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 214 October 10, 2022 09:22PM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 164 October 11, 2022 09:02AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 168 October 11, 2022 04:56PM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 165 October 31, 2022 08:08AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 176 November 01, 2022 10:16AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Roman Arutyunyan 185 November 02, 2022 09:08AM

Re: [PATCH] Core: support for reading PROXY protocol v2 TLVs

Maxim Dounin 179 November 02, 2022 09:54PM



Sorry, you do not have permission to post/reply in this forum.

Online Users

Guests: 128
Record Number of Users: 8 on April 13, 2023
Record Number of Guests: 500 on July 15, 2024
Powered by nginx      Powered by FreeBSD      PHP Powered      Powered by MariaDB      ipv6 ready