netdev
[Top] [All Lists]

automatic keying works! Re: off by one error in 3des cbc keying

To: kuznet@xxxxxxxxxxxxx
Subject: automatic keying works! Re: off by one error in 3des cbc keying
From: bert hubert <ahu@xxxxxxx>
Date: Wed, 13 Nov 2002 09:55:17 +0100
Cc: "David S. Miller" <davem@xxxxxxxxxx>, gem@xxxxxxxxxxx, netdev@xxxxxxxxxxx
In-reply-to: <200211130109.EAA10034@sex.inr.ac.ru>
Mail-followup-to: bert hubert <ahu@xxxxxxx>, kuznet@xxxxxxxxxxxxx, "David S. Miller" <davem@xxxxxxxxxx>, gem@xxxxxxxxxxx, netdev@xxxxxxxxxxx
References: <20021112.143636.55033627.davem@redhat.com> <200211130109.EAA10034@sex.inr.ac.ru>
Sender: netdev-bounce@xxxxxxxxxxx
User-agent: Mutt/1.3.28i
On Wed, Nov 13, 2002 at 04:09:26AM +0300, kuznet@xxxxxxxxxxxxx wrote:
> Hello!
> 
> >    The problem with expiration remains unsolved.
> 
> Patch #2. Bert, this is supposed to fix the first strange phenomenon
> in your experiment. But I still do not know what will happen after that.
> Please, check.

Resolves strange larvals, thanks. Patch #1 works fine but changes nothing
for linux-linux IPSEC, if both have the patch. Scenario I see now:

Initial setup is wonderful, 10.0.0.11 and 10.0.0.216 setup SAs.

At the soft expiration, both ends renegotiate and UPDATE their *incoming*
SA, using pk_sendupdate which calls pfkey_send_update in libipsec.

The outgoing SA however is updated using pk_sendadd which calls
pfkey_send_add, which Linux hates because there is already an SA there.

I changed it to call pfkey_sendupdate and then everything works as intended.
You spotted this problem earlier, by the way.

This brings us to the point that everything I try works. Key rollover is now
completely seamless. My patch to racoon is really ugly as it now also uses
UPDATE to add the initial outbound SA, I can improve it if you want?

Regards,

bert

-- 
http://www.PowerDNS.com          Versatile DNS Software & Services
http://lartc.org           Linux Advanced Routing & Traffic Control HOWTO


<Prev in Thread] Current Thread [Next in Thread>