netdev
[Top] [All Lists]

Re: IPsec xfrm resolution

To: Patrick McHardy <kaber@xxxxxxxxx>
Subject: Re: IPsec xfrm resolution
From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
Date: Sun, 20 Feb 2005 17:57:20 +1100
Cc: Maillist netdev <netdev@xxxxxxxxxxx>
In-reply-to: <4217A0DA.7050409@xxxxxxxxx>
References: <42152841.5000707@xxxxxxxxx> <20050218100854.GA19427@xxxxxxxxxxxxxxxxxxx> <4216D6B4.5070901@xxxxxxxxx> <20050219092314.GA8153@xxxxxxxxxxxxxxxxxxx> <42173125.3040505@xxxxxxxxx> <20050219183202.GA10773@xxxxxxxxxxxxxxxxxxx> <421789AF.4020705@xxxxxxxxx> <20050219190333.GA22166@xxxxxxxxxxxxxxxxxxx> <4217993D.4070107@xxxxxxxxx> <4217A0DA.7050409@xxxxxxxxx>
Sender: netdev-bounce@xxxxxxxxxxx
User-agent: Mutt/1.5.6+20040722i
On Sat, Feb 19, 2005 at 09:26:02PM +0100, Patrick McHardy wrote:
> 
> How about this patch ? It ignores "optional" for missing tunnel mode 
> SAs, symetric
> to input.

Actually, I've been convinced by your earlier argument :)

I now think that IPCOMP users like racoon/openswan should simply
not set the optional flag on the sending policy.  It only needs
to be set on the receiving side.

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@xxxxxxxxxxxxxxxxxxx>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

<Prev in Thread] Current Thread [Next in Thread>