| To: | hadi@xxxxxxxxxx |
|---|---|
| Subject: | Re: [Ipsec-tools-devel] Re: IPSEC: on behavior of acquire |
| From: | Aidas Kasparas <a.kasparas@xxxxxx> |
| Date: | Mon, 04 Apr 2005 17:20:59 +0300 |
| Cc: | ipsec-tools-devel@xxxxxxxxxxxxxxxxxxxxx, netdev <netdev@xxxxxxxxxxx>, nakam@xxxxxxxxxxxxxx |
| In-reply-to: | <1112620159.1087.486.camel@jzny.localdomain> |
| References: | <1112405303.1096.37.camel@jzny.localdomain> <424E454D.4090402@gmc.lt> <1112477326.1088.321.camel@jzny.localdomain> <424FA946.70809@gmc.lt> <1112538566.1096.391.camel@jzny.localdomain> <425067D9.9050603@gmc.lt> <1112618007.1096.465.camel@jzny.localdomain> <42513A2F.7020504@gmc.lt> <1112620159.1087.486.camel@jzny.localdomain> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Debian Thunderbird 1.0 (X11/20050116) |
|
jamal wrote: On Mon, 2005-04-04 at 08:59, Aidas Kasparas wrote: OK, if you have a chain with sevaral hops, then probably there is no better way than signal from other end that it got something. The thing we do not agree is how this should be managed and supervised. I would like to provide an analogy too. You have a telenet application. You try to connect to some host:port. Your telnet application just makes connect(2) syscall and do not cares how kernel establishes that connection. What MAC address to send packet to, how and when to retransmit syn packet if the ack was not received in timely fashion, and so on, so on, so on. If kernel does his job fine, then we have connected socket on which to communicate further. If it does not, or there are some problems on the target host or network in between, then we will not have that connected socket - syscall will return an error. With ipsec system the situation is quite similar, just kernel and userspace have swaped places. Kernel told the userspace to update larval SA. Userspace works on that. If it has negotiated keys for that SA with KE at remote site, fine, userspace will update SA. If there are problems, and key negotiation is not possible -- these SA will not get updated and eventually will die. But single signal to userspace is sufficient for that process to be performed. Yes, kernel can check state of SA every time some packet has to use that SA. But to make noise by asking "please negotiate the SA which you're supposed to be negotiating already" ... IMHO it is contrproductive.
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: [BUG] overflow in net/ipv4/route.c rt_check_expire(), Robert Olsson |
|---|---|
| Next by Date: | Re: [PATCH] Fix SELinux for removal of i_sock, Stephen Smalley |
| Previous by Thread: | Re: [Ipsec-tools-devel] Re: IPSEC: on behavior of acquire, jamal |
| Next by Thread: | Fw: [Bugme-new] [Bug 4434] New: Tulip based NIC card causes hard lock up of PC, Andrew Morton |
| Indexes: | [Date] [Thread] [Top] [All Lists] |