| To: | Patrick McHardy <kaber@xxxxxxxxx> |
|---|---|
| Subject: | Re: [XFRM] Allow transport SAs even when there is no policy |
| From: | Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx> |
| Date: | Wed, 20 Oct 2004 07:25:29 +1000 |
| Cc: | "David S. Miller" <davem@xxxxxxxxxx>, netdev@xxxxxxxxxxx, ipsec-tools-devel@xxxxxxxxxxxxxxxxxxxxx |
| In-reply-to: | <417521A2.4010500@xxxxxxxxx> |
| References: | <4172943B.8050904@xxxxxxxxx> <20041017212317.GA28615@xxxxxxxxxxxxxxxxxxx> <4172F1AB.4020305@xxxxxxxxx> <20041017231258.GA29294@xxxxxxxxxxxxxxxxxxx> <417428CF.2050802@xxxxxxxxx> <20041018214326.GA6589@xxxxxxxxxxxxxxxxxxx> <417521A2.4010500@xxxxxxxxx> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Mutt/1.5.6+20040722i |
On Tue, Oct 19, 2004 at 04:16:02PM +0200, Patrick McHardy wrote: > > Looks good. So you agree we should also apply my patch to > xfrm_policy_lookup (attached again with less confusing subject) ? It makes > packets with a secpath fall through to __xfrm_policy_check when the policy > list is empty, so the default policy is always the same. This will break > setups with keying daemons that don't add forward policies for tunnel mode > SAs. Agreed. Thanks. -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@xxxxxxxxxxxxxxxxxxx> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt |
| Previous by Date: | [ANNOUNCE] iproute2 2.6.9-041019, Stephen Hemminger |
|---|---|
| Next by Date: | Re: [Ipsec-tools-devel] Re: [PATCH 2.6]: Check against correct policy list in ip_forward/ip6_forward, Herbert Xu |
| Previous by Thread: | Re: [XFRM] Allow transport SAs even when there is no policy, Patrick McHardy |
| Next by Thread: | Re: [XFRM] Allow transport SAs even when there is no policy, David S. Miller |
| Indexes: | [Date] [Thread] [Top] [All Lists] |