The blog.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 

166 lines
6.0 KiB

  1. ---
  2. title: Isolated IP Management
  3. description: >
  4. For routers, a management interface should always work, even if the
  5. firewall is broken, or the IP address conflicts with other interfaces.
  6. Isolating the interface to a vnet jail and using unix domain sockets fixes
  7. this problem.
  8. posted: !!timestamp '2023-08-17'
  9. created: !!timestamp '2023-08-17'
  10. time: 12:00 PM
  11. tags:
  12. - FreeBSD
  13. - jails
  14. ---
  15. The latest iteration of my home firewall has a spare interface. Many
  16. switches these days have a dedicated management interface, and I wanted
  17. something similar for my firewall. I want an interface that I can plug in,
  18. get an IP via DHCP, and I can ssh into and it'll "just work" even if
  19. there's a misconfiguration, or an IP conflict.
  20. On FreeBSD,
  21. [vnet jails](https://wiki.freebsd.org/Jails#VNET-based_networking_for_Jails)
  22. are a way to isolate an interface such that it won't interfere (or receive
  23. interference) from other interfaces. Some may have just used epair and
  24. assigned IPs, but this could cause conflict, while using a unix domain
  25. socket keeps things isolated, and FreeBSD ships w/ everything needed to
  26. make this work. A package like `socat` isn't needed.
  27. Configuring the host was straight forward, make a directory for the socket:
  28. ```
  29. mkdir /var/mgmt
  30. ```
  31. And then add a line to `/etc/inetd.conf` to listen to incoming connections
  32. on the socket and launch `sshd`:
  33. ```
  34. /var/mgmt/mgmt.ssh.sock stream unix nowait root /usr/sbin/sshd sshd -i
  35. ```
  36. The `-i` option to `sshd` tells it to run in "`inetd`" mode, which means that
  37. the stdin and stdout of the process is the socket to use for communication.
  38. The next harder part was getting a jail configured that would accept
  39. incoming connections and forward them to the unix domain socket.
  40. First the jail configuration, which goes in `/etc/jail.conf` or similar
  41. location:
  42. ```
  43. mgmt {
  44. host.hostname = mgmt; # Hostname
  45. vnet ="new";
  46. vnet.interface="mgmt0";
  47. path = "/usr/jails/mgmt/root"; # Path to the jail
  48. mount.fstab="/usr/jails/mgmt/fstab"; # mount spec
  49. mount.devfs; # Mount devfs inside the jail
  50. devfs_ruleset = "101";
  51. exec.start = "/bin/sh /etc/rc"; # Start command
  52. exec.stop = "/bin/sh /etc/rc.shutdown"; # Stop command
  53. }
  54. ```
  55. There isn't anything special in this. It's pretty standard jail
  56. configuration, the differences are the vnet configuration, and the
  57. `devfs_ruleset`.
  58. The `devfs_ruleset` is necessary in order to expose the bpf interface
  59. used by dhclient. This required the following lines in `/etc/devfs.rules`:
  60. ```
  61. [mydevfsrules_jail=100]
  62. add include $devfsrules_hide_all
  63. add include $devfsrules_unhide_basic
  64. add include $devfsrules_unhide_login
  65. [devfsrules_jail_dhcp=101]
  66. add include $mydevfsrules_jail
  67. add path 'bpf*' unhide
  68. ```
  69. Note that after adding the above lines, you need to run:
  70. ```
  71. service devfs start
  72. ```
  73. to load the rules (per
  74. [devfs(8)](https://man.freebsd.org/cgi/man.cgi?query=devfs&apropos=0&sektion=8&manpath=FreeBSD+13.2-RELEASE+and+Ports&arch=default&format=html)
  75. man page).
  76. Note: I learned my mistake not to number my blocks immediately after
  77. the standard defaults (from `/etc/defaults/devfs.rules`). I had done that
  78. befure but there's now a conflict, so I skip ahead a bit to get a unique range.
  79. Now I needed to make a number of directories for the jail:
  80. ```
  81. mkdir -p /usr/jails/mgmt/root
  82. mkdir -p /usr/jails/mgmt/etc
  83. mkdir -p /usr/jails/mgmt/var/mgmt
  84. mkdir -p /usr/jails/mgmt/tmp
  85. ```
  86. I needed to setup the `fstab` for the jail:
  87. ```
  88. # Device Mountpoint FStype Options Dump Pass#
  89. / /usr/jail/mgmt/root nullfs ro 0 0
  90. /usr/jail/mgmt/etc /usr/jail/mgmt/root/etc nullfs rw 0 0
  91. /usr/jail/mgmt/var /usr/jail/mgmt/root/var nullfs rw 0 0
  92. /var/mgmt /usr/jail/mgmt/root/var/mgmt nullfs ro 0 0
  93. /usr/jail/mgmt/tmp /usr/jail/mgmt/root/tmp nullfs rw 0 0
  94. ```
  95. This is a little bit more tricky, It first `nullfs` mounts the root system.
  96. I'm using ZFS boot environments, so this is a pretty clean FreeBSD install
  97. without much host specific data. It then mounts some jail specific directories
  98. for `etc`, `tmp` and `var` and finally mounts the shared directory w/ the
  99. unix domain socket to the host system. Also note that a couple of the mounts
  100. are read-only to prevent the jail from modifying the system.
  101. The `etc` directory was populated from the system `etc` via:
  102. ```
  103. tar -cf - -C /etc . | tar -xf - -C /usr/jails/mgmt/etc
  104. ```
  105. Then the jail was configured, first `/usr/jails/mgmt/etc/rc.conf`:
  106. ```
  107. hostname="mgmt.funkthat.com"
  108. sendmail_enable="NONE"
  109. sendmail_submit_enable="NO"
  110. sendmail_outbound_enable="NO"
  111. sendmail_msp_queue_enable="NO"
  112. # Management port
  113. ifconfig_mgmt0="DHCP"
  114. # necessary as devd can't be run in a jail
  115. synchronous_dhclient="YES"
  116. inetd_enable="YES" # Run the network daemon dispatcher (YES/NO).
  117. ```
  118. The key part of this configuration that took me a while to figure out was
  119. the `synchronous_dhclient` line. It used to be that `netif` would start
  120. dhclient, but in order to better handle USB ethernet devices and other
  121. removable interfaces, it was moved to `devd`. The only problem is that
  122. `devd` hasn't been jail'ified, and you can't run it to get things like
  123. link notifications that would normally launch dhclient. Setting this to
  124. yes, makes sure it gets launched when the jail starts.
  125. And then the following line was added to `/usr/jails/mgmt/etc/inetd.conf`:
  126. ```
  127. ssh stream tcp nowait root /usr/bin/nc nc -N -U /var/mgmt/mgmt.ssh.sock
  128. ```
  129. This is the part that will forward incoming connections to the ssh port
  130. on to the unix domain socket.
  131. Now that everything is configured, a simple `jail -c mgmt` will get
  132. the jail running and accepting connections.
  133. This was testing and deployed on a FreeBSD 14-CURRENT build as of August
  134. 8th, 2023, or more specifically, from `main-n264621-09c20a29328`, but it
  135. should work on all currently supported FreeBSD releases.