All of lore.kernel.org
 help / color / mirror / Atom feed
From: Nicolas Dichtel <nicolas.dichtel@6wind.com>
To: Vlad Yasevich <vyasevich@gmail.com>
Cc: sri@us.ibm.com, linux-sctp@vger.kernel.org, netdev@vger.kernel.org
Subject: Re: [PATCH] sctp: check dst validity after IPsec operations
Date: Fri, 07 Sep 2012 12:24:46 +0000	[thread overview]
Message-ID: <5049E78E.6080908@6wind.com> (raw)
In-Reply-To: <5048D774.3020008@gmail.com>

Le 06/09/2012 19:03, Vlad Yasevich a écrit :
> On 09/06/2012 12:40 PM, Nicolas Dichtel wrote:
>> Le 06/09/2012 18:04, Vlad Yasevich a écrit :
>>> On 09/06/2012 01:40 PM, Nicolas Dichtel wrote:
>>>> dst stored in struct sctp_transport needs to be recalculated when
>>>> ipsec policy
>>>> are updated. We use flow_cache_genid for that.
>>>>
>>>> For example, if a SCTP connection is established and then an IPsec
>>>> policy is
>>>> set, the old SCTP flow will not be updated and thus will not use the new
>>>> IPsec policy.
>>>>
>>>> Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
>>>
>>> why doesn't this need to be done for TCP?  What makes SCTP special in
>>> this case?
>> Tests prove that the pb does not exist with TCP. I made the patch some
>> times ago, I will look again deeply to find the difference.
>>
>
> TCP appears to cache the flowi and uses that to re-route the packet.
> However, re-route still seems predicated on dst_check()...
Yes ... but I don't find the difference. Re-route is not done immediately in 
TCP, it takes few seconds.

>
>>>
>>> ip_queue_xmit does an __sk_dst_check() which is essentially what
>>> sctp_transport_dst_check() does.  That should determine if the
>>> currently cached
>>> route is valid or not.
>> The problem is that route will not be invalidated, because dst->check()
>> has no xfrm path so xfrm_dst_check() will never be called.
>>
>
> Shouldn't the cache be invalidated in this case?  If the cache is invalidated,
> that should cause a new lookup.  If the cache isn't invalidated, then any
> established connections that may now be impacted by the policy will not pick it up.
Yes, you're right. If I flush the cache manually (with the sysctl), route are 
correctly updated.
I will send a new proposal.


Regards,
Nicolas

WARNING: multiple messages have this Message-ID (diff)
From: Nicolas Dichtel <nicolas.dichtel@6wind.com>
To: Vlad Yasevich <vyasevich@gmail.com>
Cc: sri@us.ibm.com, linux-sctp@vger.kernel.org, netdev@vger.kernel.org
Subject: Re: [PATCH] sctp: check dst validity after IPsec operations
Date: Fri, 07 Sep 2012 14:24:46 +0200	[thread overview]
Message-ID: <5049E78E.6080908@6wind.com> (raw)
In-Reply-To: <5048D774.3020008@gmail.com>

Le 06/09/2012 19:03, Vlad Yasevich a écrit :
> On 09/06/2012 12:40 PM, Nicolas Dichtel wrote:
>> Le 06/09/2012 18:04, Vlad Yasevich a écrit :
>>> On 09/06/2012 01:40 PM, Nicolas Dichtel wrote:
>>>> dst stored in struct sctp_transport needs to be recalculated when
>>>> ipsec policy
>>>> are updated. We use flow_cache_genid for that.
>>>>
>>>> For example, if a SCTP connection is established and then an IPsec
>>>> policy is
>>>> set, the old SCTP flow will not be updated and thus will not use the new
>>>> IPsec policy.
>>>>
>>>> Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
>>>
>>> why doesn't this need to be done for TCP?  What makes SCTP special in
>>> this case?
>> Tests prove that the pb does not exist with TCP. I made the patch some
>> times ago, I will look again deeply to find the difference.
>>
>
> TCP appears to cache the flowi and uses that to re-route the packet.
> However, re-route still seems predicated on dst_check()...
Yes ... but I don't find the difference. Re-route is not done immediately in 
TCP, it takes few seconds.

>
>>>
>>> ip_queue_xmit does an __sk_dst_check() which is essentially what
>>> sctp_transport_dst_check() does.  That should determine if the
>>> currently cached
>>> route is valid or not.
>> The problem is that route will not be invalidated, because dst->check()
>> has no xfrm path so xfrm_dst_check() will never be called.
>>
>
> Shouldn't the cache be invalidated in this case?  If the cache is invalidated,
> that should cause a new lookup.  If the cache isn't invalidated, then any
> established connections that may now be impacted by the policy will not pick it up.
Yes, you're right. If I flush the cache manually (with the sysctl), route are 
correctly updated.
I will send a new proposal.


Regards,
Nicolas

  reply	other threads:[~2012-09-07 12:24 UTC|newest]

Thread overview: 104+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-09-06 15:47 [PATCH] sctp: check dst validity after IPsec operations Nicolas Dichtel
2012-09-06 17:40 ` Nicolas Dichtel
2012-09-06 16:04 ` Vlad Yasevich
2012-09-06 16:04   ` Vlad Yasevich
2012-09-06 16:40   ` Nicolas Dichtel
2012-09-06 16:40     ` Nicolas Dichtel
2012-09-06 17:03     ` Vlad Yasevich
2012-09-06 17:03       ` Vlad Yasevich
2012-09-07 12:24       ` Nicolas Dichtel [this message]
2012-09-07 12:24         ` Nicolas Dichtel
2012-09-07 12:07   ` Nicolas Dichtel
2012-09-07 12:07     ` Nicolas Dichtel
2012-09-06 18:10 ` David Miller
2012-09-06 18:10   ` David Miller
2012-09-07 13:47   ` Nicolas Dichtel
2012-09-07 13:47     ` Nicolas Dichtel
2012-09-07 13:55     ` [PATCH RFC net-next 0/2] Take care of xfrm policy when checking dst entries Nicolas Dichtel
2012-09-07 15:57       ` Nicolas Dichtel
2012-09-07 13:56       ` [PATCH 1/2] dst: take into account policy update on check() Nicolas Dichtel
2012-09-07 15:57         ` Nicolas Dichtel
2012-09-07 14:20         ` Vlad Yasevich
2012-09-07 14:20           ` Vlad Yasevich
2012-09-07 14:35         ` Eric Dumazet
2012-09-07 14:35           ` Eric Dumazet
2012-09-07 14:47           ` Nicolas Dichtel
2012-09-07 14:47             ` Nicolas Dichtel
2012-09-07 15:09             ` Eric Dumazet
2012-09-07 15:09               ` Eric Dumazet
2012-09-07 15:13               ` Nicolas Dichtel
2012-09-07 15:13                 ` Nicolas Dichtel
2012-09-07 15:21                 ` Eric Dumazet
2012-09-07 15:21                   ` Eric Dumazet
2012-09-07 18:48                   ` David Miller
2012-09-07 18:48                     ` David Miller
2012-09-07 18:48                 ` David Miller
2012-09-07 18:48                   ` David Miller
2012-09-10 12:47                   ` Nicolas Dichtel
2012-09-10 12:47                     ` Nicolas Dichtel
2012-09-10 13:10                     ` Eric Dumazet
2012-09-10 13:10                       ` Eric Dumazet
2012-09-10 13:22                   ` [PATCH net-next v2] Take care of xfrm policy when checking dst entries Nicolas Dichtel
2012-09-10 13:22                     ` Nicolas Dichtel
2012-09-10 13:22                     ` [PATCH net-next v2 1/4] netns: move net->ipv4.rt_genid to net->rt_genid Nicolas Dichtel
2012-09-10 13:22                       ` Nicolas Dichtel
2012-09-10 13:22                     ` [PATCH net-next v2 2/4] xfrm: invalidate dst on policy insertion/deletion Nicolas Dichtel
2012-09-10 13:22                       ` Nicolas Dichtel
2012-09-10 14:21                       ` Vlad Yasevich
2012-09-10 14:21                         ` Vlad Yasevich
2012-09-10 14:56                         ` Nicolas Dichtel
2012-09-10 14:56                           ` Nicolas Dichtel
2012-09-11  8:09                           ` [PATCH net-next v3 0/4] Take care of xfrm policy when checking dst entries Nicolas Dichtel
2012-09-11  8:09                             ` Nicolas Dichtel
2012-09-11  8:09                             ` [PATCH net-next v3 1/4] netns: move net->ipv4.rt_genid to net->rt_genid Nicolas Dichtel
2012-09-11  8:09                               ` Nicolas Dichtel
2012-09-11  8:09                             ` [PATCH net-next v3 2/4] xfrm: invalidate dst on policy insertion/deletion Nicolas Dichtel
2012-09-11  8:09                               ` Nicolas Dichtel
2012-09-11  8:09                             ` [PATCH net-next v3 3/4] ipv6: use net->rt_genid to check dst validity Nicolas Dichtel
2012-09-11  8:09                               ` Nicolas Dichtel
2012-09-11  8:09                             ` [PATCH net-next v3 4/4] ipv6: use DST_* macro to set obselete field Nicolas Dichtel
2012-09-11  8:09                               ` Nicolas Dichtel
2012-09-12  7:40                               ` Eric Dumazet
2012-09-12  7:40                                 ` Eric Dumazet
2012-09-17 16:49                             ` [PATCH net-next v3 0/4] Take care of xfrm policy when checking dst entries David Miller
2012-09-17 16:49                               ` David Miller
2012-09-17 18:14                               ` Vlad Yasevich
2012-09-17 18:14                                 ` Vlad Yasevich
2012-09-17 18:25                                 ` David Miller
2012-09-17 18:25                                   ` David Miller
2012-09-17 19:52                                   ` Nicolas Dichtel
2012-09-17 19:52                                     ` Nicolas Dichtel
2012-09-17 19:54                                     ` David Miller
2012-09-17 19:54                                       ` David Miller
2012-09-18 20:08                                       ` David Miller
2012-09-18 20:08                                         ` David Miller
2012-09-10 13:22                     ` [PATCH net-next v2 3/4] ipv6: use net->rt_genid to check dst validity Nicolas Dichtel
2012-09-10 13:22                       ` Nicolas Dichtel
2012-09-10 14:29                       ` Vlad Yasevich
2012-09-10 14:29                         ` Vlad Yasevich
2012-09-10 14:34                         ` Nicolas Dichtel
2012-09-10 14:34                           ` Nicolas Dichtel
2012-09-10 14:43                           ` Vlad Yasevich
2012-09-10 14:43                             ` Vlad Yasevich
2012-09-10 14:44                             ` Nicolas Dichtel
2012-09-10 14:44                               ` Nicolas Dichtel
2012-09-10 13:22                     ` [PATCH net-next v2 4/4] ipv6: use DST_* macro to set obselete field Nicolas Dichtel
2012-09-10 13:22                       ` Nicolas Dichtel
2012-09-10 14:35                     ` [PATCH net-next v2] Take care of xfrm policy when checking dst entries Vlad Yasevich
2012-09-10 14:35                       ` Vlad Yasevich
2012-09-10 14:38                       ` Nicolas Dichtel
2012-09-10 14:38                         ` Nicolas Dichtel
2012-09-10 17:18                       ` David Miller
2012-09-10 17:18                         ` David Miller
2012-09-10 17:59                         ` Vlad Yasevich
2012-09-10 17:59                           ` Vlad Yasevich
2012-09-10 18:01                           ` David Miller
2012-09-10 18:01                             ` David Miller
2012-09-22 16:49                             ` Jan Engelhardt
2012-09-22 16:49                               ` Jan Engelhardt
2012-09-07 14:51           ` [PATCH 1/2] dst: take into account policy update on check() Vlad Yasevich
2012-09-07 14:51             ` Vlad Yasevich
2012-09-07 15:08             ` Eric Dumazet
2012-09-07 15:08               ` Eric Dumazet
2012-09-07 13:56       ` [PATCH 2/2] ipv6: remove rt6i_flow_cache_genid field in rt6_info Nicolas Dichtel
2012-09-07 15:57         ` Nicolas Dichtel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5049E78E.6080908@6wind.com \
    --to=nicolas.dichtel@6wind.com \
    --cc=linux-sctp@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=sri@us.ibm.com \
    --cc=vyasevich@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.