Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VAULT-33008: ipv6: always display RFC-5952 §4 conformant addresses #29228

Open
wants to merge 16 commits into
base: main
Choose a base branch
from

Conversation

ryancragun
Copy link
Collaborator

@ryancragun ryancragun commented Dec 18, 2024

Description

USGv60 requires implementing §4.1.1 of the NISTv6-r1 profile1 for
IPv6-Only capabilities. This section requires that whenever Vault
displays IPv6 addresses (including CLI output, Web UI, logs, etc.) that
all IPv6 addresses must conform to RFC-5952 §4 text representation
recommendations2.

These recommendations do not prevent us from accepting RFC-42413 IPv6
addresses, however, whenever these same addresses are displayed they
must conform to the strict RFC-5952 §4 guidelines.

This PR implements handling of IPv6 address conformance in our
vault server routine. We handle conformance normalization for all
server, http_proxy, listener, seal, storage and telemetry
configuration where an input could contain an IPv6 address, whether
configured via an HCL file or via corresponding environment variables.

The approach I've taken is to handle conformance normalization at
parse time to ensure that all log output and subsequent usage
inside of Vaults various subsystems always reference a conformant
address, that way we don't need concern ourselves with conformance
later. This approach ought to be backwards compatible to prior loose
address configuration requirements, with the understanding that
going forward all IPv6 representation will be strict regardless of
what has been configured.

In many cases I've updated our various parser functions to call the
new configutil.NormalizeAddr() to apply conformance normalization.
Others required no changes because they rely on standard library URL
string output, which always displays IPv6 URLs in a conformant way.

Not included in this changes is any other vault exec mode other than
server. Client, operator commands, agent mode, proxy mode, etc. will
be included in subsequent changes if necessary.

Signed-off-by: Ryan Cragun [email protected]

TODO only if you're a HashiCorp employee

  • Backport Labels: If this fix needs to be backported, use the appropriate backport/ label that matches the desired release branch. Note that in the CE repo, the latest release branch will look like backport/x.x.x, but older release branches will be backport/ent/x.x.x+ent.
    • LTS: If this fixes a critical security vulnerability or severity 1 bug, it will also need to be backported to the current LTS versions of Vault. To ensure this, use all available enterprise labels.
  • ENT Breakage: If this PR either 1) removes a public function OR 2) changes the signature
    of a public function, even if that change is in a CE file, double check that
    applying the patch for this PR to the ENT repo and running tests doesn't
    break any tests. Sometimes ENT only tests rely on public functions in CE
    files.
  • Jira: If this change has an associated Jira, it's referenced either
    in the PR description, commit message, or branch name.
  • RFC: If this change has an associated RFC, please link it in the description.
  • ENT PR: If this change has an associated ENT PR, please link it in the
    description. Also, make sure the changelog is in this PR, not in your ENT PR.

@ryancragun ryancragun requested a review from a team as a code owner December 18, 2024 21:25
@github-actions github-actions bot added the hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed label Dec 18, 2024
Copy link

github-actions bot commented Dec 18, 2024

CI Results:
All Go tests succeeded! ✅

Copy link

github-actions bot commented Dec 18, 2024

Build Results:
Build failed for these jobs: test:failure. Please refer to this workflow to learn more: https://github.com/hashicorp/vault/actions/runs/12714369807

@ryancragun ryancragun force-pushed the ryan/vault-33009 branch 2 times, most recently from f499d57 to 477e93b Compare December 18, 2024 23:10
// If the addr is a URL, IP Address, or host:port address that includes an IPv6
// address, the normalized copy will be conformant with RFC-5942 §4
// See: https://rfc-editor.org/rfc/rfc5952.html
func NormalizeAddr(u string) string {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I know you're not looking for nits here, but I couldn't help myself! 😆

Everything about this (description, commit message, etc.) mentions ipv6, but the methods and file names do not reflect that. Would it make sense to make these more ipv6-oriented? IMO that'd make it clearer that this is specifically for ipv6 normalization? I realize this detail is also documented in godocs, but it feels right to make the "interface" more self-documenting...

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree that the name makes more sense to be more specific about what kinds of addresses it's normalizing. What about
NormalizeAddressIfIPV6 or similar?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe I'm missing something but it looks like this function is designed to take any type of address and if it happens to contain an IPv6 address, then that gets normalized to be RFC-5942 compliant, so from that perspective, I agree with how it's currently named. Otherwise, if we name everything it might be normalizing, the name becomes enormous and unwieldy. If we just call out IPv6 and nothing else, then that's slightly misleading, since it's handling other types of addresses too. I like it the way it is 👌

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My thought is that it doesn't touch non-IPv6 addresses, so I would prefer that called out, and why I thought maybe NormalizeAddressIfIPV6 would fit better. I wouldn't love NormalizeIPV6Address for the reasons you called out, Josh, it doesn't touch non-IPv6 addresses.

All that being said, this is far from a hill I want to die on, and it's totally not too bad/confusing the way it is now :)

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My thought is that it doesn't touch non-IPv6 addresses

It does though. There's a branch in one of the if statements that deals with IPv4 addresses. @ryancragun can correct me if I'm wrong, but my read through of this function suggests that its intent is you can pass any type of address to it, whether it's IPv4, IPv6, host:port pair, whatever, and it will always do the right thing.

Copy link
Collaborator Author

@ryancragun ryancragun Jan 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@VioletHynes was correct in that the branch that touches IPv4 can just return the input, which I've done, so we don't actually change anything in ipv4 land.

Regarding the function name, my thinking was that we can safely pass any sort of address to it and receive a normalized version it, regardless of the address type or format. At the moment it only really normalizes addresses that are IPv6 but the name leaves it open to changing in the future if necessary.

Obviously my preference is implicit in the naming choice I made but I definitely don't care. Whatever group consensus is is fine with me.

VioletHynes
VioletHynes previously approved these changes Jan 9, 2025
Copy link
Contributor

@VioletHynes VioletHynes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks great! I've got a few comments that I'd consider non-blocking (other than the make fmt) since the tests assure me that this thing works as we expect. However, I think there are probably some clarity improvements we should make before we merge this.

I really appreciate all of the attention to detail on the tests here.

changelog/29228.txt Outdated Show resolved Hide resolved
command/operator_migrate_test.go Outdated Show resolved Hide resolved
// can be URLs, IP addresses, or host:port addresses, when configured with an
// an IPv6 address, the normalized to be conformant with RFC-5942 §4
// See: https://rfc-editor.org/rfc/rfc5952.html
func TestMergeKMSEnvConfigAddrConformance(t *testing.T) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really appreciate all of the tests added for this functionality. Thank you!

// If the addr is a URL, IP Address, or host:port address that includes an IPv6
// address, the normalized copy will be conformant with RFC-5942 §4
// See: https://rfc-editor.org/rfc/rfc5952.html
func NormalizeAddr(u string) string {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree that the name makes more sense to be more specific about what kinds of addresses it's normalizing. What about
NormalizeAddressIfIPV6 or similar?

internalshared/configutil/normalize.go Show resolved Hide resolved
// If the addr is a URL, IP Address, or host:port address that includes an IPv6
// address, the normalized copy will be conformant with RFC-5942 §4
// See: https://rfc-editor.org/rfc/rfc5952.html
func NormalizeAddr(u string) string {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd like if we chose different variable name than u here. Maybe addressToNormalize?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I decided to go with address here as it was certainly better than u (a relic of the genesis of the func when it only took URLs) but less typey than addressToNormalize.

internalshared/configutil/normalize.go Outdated Show resolved Hide resolved
raskchanky
raskchanky previously approved these changes Jan 9, 2025
Copy link
Contributor

@raskchanky raskchanky left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Dang, this is a lot. Thanks so much for doing this Ryan! I left a thousand nit comments, mostly with formatting complaints that will likely be fixed by running make fmt but I like the approach you've taken. :shipit:

command/server.go Outdated Show resolved Hide resolved
command/server/config.go Outdated Show resolved Hide resolved
@@ -934,33 +936,49 @@ func ParseStorage(result *Config, list *ast.ObjectList, name string) error {
}

m := make(map[string]string)
for key, val := range config {
valStr, ok := val.(string)
for k, v := range config {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wow, nice job removing the variable shadowing here. That was subtle.

command/server/config.go Outdated Show resolved Hide resolved
command/server/config.go Outdated Show resolved Hide resolved
internalshared/configutil/kms_test.go Outdated Show resolved Hide resolved
if err := os.Setenv(envName, envVal); err != nil {
t.Errorf("error setting environment vars for test: %s", err)
}
t.Setenv(envName, envVal)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So much better, thank you 🙌

// If the addr is a URL, IP Address, or host:port address that includes an IPv6
// address, the normalized copy will be conformant with RFC-5942 §4
// See: https://rfc-editor.org/rfc/rfc5952.html
func NormalizeAddr(u string) string {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe I'm missing something but it looks like this function is designed to take any type of address and if it happens to contain an IPv6 address, then that gets normalized to be RFC-5942 compliant, so from that perspective, I agree with how it's currently named. Otherwise, if we name everything it might be normalizing, the name becomes enormous and unwieldy. If we just call out IPv6 and nothing else, then that's slightly misleading, since it's handling other types of addresses too. I like it the way it is 👌

require.Equal(t, tc.expected, NormalizeAddr(tc.addr))
})
}
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I appreciate how comprehensive this is, thank you 🙌

internalshared/configutil/telemetry.go Outdated Show resolved Hide resolved
USGv6[0] requires implementing §4.1.1 of the NISTv6-r1 profile[1] for
IPv6-Only capabilities. This section requires that whenever Vault
displays IPv6 addresses (including CLI output, Web UI, logs, etc.) that
_all_ IPv6 addresses must conform to RFC-5952 §4 text representation
recommendations[2].

These recommendations do not prevent us from accepting RFC-4241 IPv6
addresses, however, whenever these same addresses are displayed they
must conform to the strict RFC-5952 §4 guidelines.

This PR implements handling of IPv6 address conformance in our
`vault server` routine. We handling conformance normalization in all
server, http_proxy, listener, seal, storage and telemetry
configuration where an input could contain an IPv6 address, whether
configued via an HCL file or via corresponding environment variables.

The approach I've taken is to handle conformance normalization at
parse time to ensure that all output log output and subsequent usage
inside of Vaults various subsystems always reference a conformant
address, that way we don't need concern ourselves with conformance
later. This approach ought to be backwards compatible to prior loose
address configuration requirements, with the understanding that
goinging forward all IPv6 representation will be strict regardless of
what has been configured.

In many cases I've updated our various parser functions to call the
new `configutil.NormalizeAddr()` to apply conformance normalization.
Others required no changes because they rely on standard library URL
string output, which always displays IPv6 URLs in a conformant way.

Not included in this changes is any other vault exec mode other than
server. Client, operator commands, agent mode, proxy mode, etc. will
be included in subsequent changes if necessary.

[0]: https://www.nist.gov/publications/usgv6-profile
[1]: https://www.nist.gov/publications/nist-ipv6-profile
[2]: https://www.rfc-editor.org/rfc/rfc5952.html#section-4
[3]: https://www.rfc-editor.org/rfc/rfc4291

Signed-off-by: Ryan Cragun <[email protected]>
Signed-off-by: Ryan Cragun <[email protected]>
Signed-off-by: Ryan Cragun <[email protected]>
Always use the type when verifying storage and seals. We'll also update
an older test that didn't use real storage types during migration to use
real storage types.

Signed-off-by: Ryan Cragun <[email protected]>
Signed-off-by: Ryan Cragun <[email protected]>
Signed-off-by: Ryan Cragun <[email protected]>
Signed-off-by: Ryan Cragun <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed pr/no-milestone
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants