top | item 23766751

Show HN: ip2unix – Turn IP sockets into Unix domain sockets

94 points| aszlig | 5 years ago |github.com

23 comments

order

Tepix|5 years ago

This is very clever. Last time i ran benchmarks (several years ago), UNIX domain sockets were twice as fast as IP sockets so that's another reason to use them.

easytiger|5 years ago

Isn't a TCP socket fastpathed on loopback ranges anyway?

steigr|5 years ago

I do not see an advantage over socat, which can listen on _TCP_-sockets (among 20 other „socket“ inputs) and forward them into unix-sockets. Please tell me? :-/

aszlig|5 years ago

As others have mentioned, socat acts more like a router between different socket types/protocols but it doesn't change the behaviour of the program in question.

So for example if you have a service listening to TCP port 1234, you could do something like this:

socat UNIX-LISTEN:foo.sock TCP:localhost:1234

Now the service will still listen to port 1234 and you now have another socket that redirects to the other. This not only comes with a bit of overhead, but port 1234 is still reachable.

While using packet filtering on that port might lower the attack surface a bit, this won't prevent other (possibly compromised) services/users on the system to access port 1234.

Sure you could also filter based on uid, but IMHO it's better if that port isn't accessible in the first place.

toast0|5 years ago

From the documentation, it seems this utility uses LD_PRELOAD to change IP socket calls into Unix socket calls; which seems useful if you want to do namespaced and access controlled process to process communication with programs that don't already know how to use unix sockets.

socat as a TCP to unix socket proxy is doing a different job.

rhn_mk1|5 years ago

You don't have to firewall the superfluous open IP socket any more.

floatboth|5 years ago

Very nice!

// "LD_PRELOAD" should've been in the submission title to avoid the "socat" questions

kevincox|5 years ago

This is really cool. I run a lot of different services on my home server and don't trust them to the internet. Everything is accessed via a reverse proxy with authentication that I trust.

While listening on localhost is some level of security it still means that lateral movement is possible if one of the services is compromised. It also means that if I give give someone else a user account or similarly run any less trusted code then they can access all of the services without authentication.

I'm going to look into this an apply this so that these services aren't accessible by other users.

forty|5 years ago

very interesting. A docker integration would be fun too (something like "docker run -p /tmp/socket:8080 ...") :)

aszlig|5 years ago

I'm not very familiar with Docker, but wouldn't something like "docker run some_image ip2unix -r /tmp/socket:8080 ..." work?

tenebrisalietum|5 years ago

So how do I access a unix socket in my browser? Be nice if "unix://file/path.html" worked.

aszlig|5 years ago

You could map different ports to specific socket file names and use a dummy address, eg. like this:

ip2unix -r out,addr=127.1.1.1,path=foo-%p.sock firefox --new-instance

Whenever you then head over to something like http://127.1.1.1:9000/, the browser will try to connect to foo-9000.sock.

caf|5 years ago

Do any programs get confused when they call getsockname() and the result is an AF_UNIX they weren't expecting?

aszlig|5 years ago

If programs call getsockname() the result is not a sockaddr_un, but instead sockaddr_in(6) is used from the original call to bind(). If the socket was implicitly bound, a random[1] address is generated.

Things are a bit trickier if it gets to getpeername(), since we want to have somewhat stable addresses. This is done by querying SO_PEERCRED and encoding[2] the pid for IPv4 or pid, uid and gid for IPv6 into the address.

In summary: Programs shouldn't get confused, but if they do, it's certainly a bug in ip2unix. Feel free to open an issue :-)

[1]: https://github.com/nixcloud/ip2unix/blob/d7d297ed68cdadc65dc...

[2]: https://github.com/nixcloud/ip2unix/blob/d7d297ed68cdadc65dc...

lykr0n|5 years ago

Now that's cool. Functional and simple to use.

eiro|5 years ago

is there a benefit over socat?

Mic92|5 years ago

It is faster because socat creates additional copies/context switches when forwarding data. This tool changes the bind syscall so it becomes a unix socket in the first place.