[Openswan dev] [RFC 4301] PFP Support and Kernel SAD Selectors
Michael Richardson
mcr at xelerance.com
Tue Jan 8 20:46:27 EST 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>>>>> "Tyler" == Tyler Hicks <tyhicks at ou.edu> writes:
Tyler> RFC 4301 introduces the idea of using incoming packet
Tyler> information when creating new SAD entries. The Linux IPsec
Tyler> implementation does not currently include PFP support and I
Tyler> thought it may be needed in openswan's ikev2 branch.
PFP = Populate From Packet.
The way to do this is to have the kernel send a copy of the header
that caused the ACQUIRE along with the acquire, and then to latch the
connection into a %hold.
netkey doesn't do %hold right now, which is a serious concern if you
are going to have any kind of dynamic SAs.
Tyler> I am curious to hear if anyone is working on PFP support for
Tyler> openswan? Thanks!
There are going to be changes at the user-level as to how the policy
is done. I have no plans to write any code anytime soon.
- --
] Bear: "Me, I'm just the shape of a bear." | firewalls [
] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[
]mcr at xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
]panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Finger me for keys
iQEVAwUBR4QnbYCLcPvd0N1lAQI9awgAtujtngTCt9TFnN//qC1waZZrE7vHjlM1
kFPPJsY9C7Q4HRgmtYxs8cRawP2eVzhfMlYQIXBB26W6y8ws3it1BYBPYuhKs6HA
zfh/MmoD88MXsg0jIbpqKTglna8PGB/t15QvWSKMQCcJL0w+j3IufdxIQWgTPwaR
e67p8e8Q4okOfiWip/0sbX5tAkf4RvQQjZPZAxQ0zdEihkC6ec5uE8CO4YyT+YLO
Nqd8FY+OgK3gvzPNFl1uIthyFYaaroY0DGyfJXjdIrGUDFN16sWBCpWKGOY1Sa35
CU6sge5AqXcBnfK9I6PKVix9D8+Mjiuc0D9r4+ZfYRonx19q1p9U7Q==
=W/Ni
-----END PGP SIGNATURE-----
More information about the Dev
mailing list