From: Johannes Berg <johannes-cdvu00un1VgdHxzADdlk8Q@public.gmane.org>
To: "Eric W. Biederman" <ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org>
Cc: netdev <netdev-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
linux-wireless
<linux-wireless-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
Subject: Re: wireless vs. network namespaces
Date: Fri, 14 Sep 2007 19:59:10 +0200 [thread overview]
Message-ID: <1189792750.3974.43.camel@johannes.berg> (raw)
In-Reply-To: <m1bqc52ria.fsf-T1Yj925okcoyDheHMi7gv2pdwda3JcWeAL8bYrjMMd8@public.gmane.org>
[-- Attachment #1: Type: text/plain, Size: 3904 bytes --]
On Fri, 2007-09-14 at 09:31 -0600, Eric W. Biederman wrote:
> > Now that the network namespace work is in net-2.6.24, I'm wondering how
> > wireless will be handling this. Is there any benefit at all to a
> > wireless device supporting network namespaces?
>
> Good question. Network namespaces are designed as a general tool
> so if we can support network namespaces in the wireless stack without
> killing ourselves there should be value in it.
Right.
> > Should we, for now, set the new NETIF_F_NETNS_LOCAL flag for all
> > mac80211 devices?
> >
> > If we do want to support moving, then we'll have to make cfg80211
> > (preferably, though mac80211 might be easier at first) migrate *all*
> > virtual interfaces associated with the same wiphy because otherwise
> > we'll get into trouble when moving one virtual interface and then
> > somebody in the other namespace changes its operating channel.
>
> Ok. This appears at least to be an atomicity issue and possibly more.
Yeah, good point, it'd have to move them all at once.
> I don't currently understand the way the wireless interfaces interact
> well enough to make a judgement call.
>
> There are two basic usage models I can currently think of.
> 1) Super chroot. Where a group of processes has distinct mount,
> network, uts, ipc, and pid namespaces. So in this case on the
> inside we will only see processes that only belong to our own
> network namespace. So in this scenario you get whatever the person
> who sets up the environment gives you.
>
> If one of the network devices only allows access to a subset of
> the wireless networking (say just sending packets but not
> controlling the radio aspects) I can see and advantage in only
> having that device in the restricted network namespace.
Right now, there's no way to disallow that, but yes, I can see value in
it as well.
> 2) Advanced routing. Where someone is doing some weird thing like
> testing sending packets and receiving them on the same machine.
Not sure I see a point in that with wireless.
> Currently creation of a network namespace requires CAP_SYS_ADMIN
> and for device movement we only require CAP_NET_ADMIN. So these are
> all privileged operations. So the scenario you are concerned about
> may just be a "don't do that then".
Ok. Sounds good to me. All the radio config requires CAP_SYS_ADMIN as
well.
> If this doesn't give you enough information to make the call can
> you describe for me how the separation of wireless network interfaces
> work?
Well, basically what we have is one physical device that sends/receives
packets. We have multiple options then:
* some hardware (no drivers at this time) support multiple virtual
devices to associate to multiple different access points, each has a
different MAC address too
* more importantly, if you have an access point you can put any group
of associated stations into a sort of VLAN based on which encryption
keys they use for multicast traffic. Each of these VLANs shows up as
a local device as well.
* Then there's some things like having a monitor interface that sees
all traffic etc. but that's not too interesting.
* You could have an AP along with a WDS device to enable bridging
between multiple APs over wireless, not really interesting either in
this context
I can mainly see the first and the second points having value in
separation. With the first, pending drivers that have multi-MAC address
support you could give each namespace one device that can associate to
some different AP [1]. And then you could have VLANs on an AP where each
VLAN "ends" in a different namespace.
johannes
[1] though actually, right now, they couldn't associate to the same AP
without having weird bugs in mac80211... I have plans to fix this
though.
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 190 bytes --]
prev parent reply other threads:[~2007-09-14 17:59 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-09-14 9:51 wireless vs. network namespaces Johannes Berg
[not found] ` <1189763513.3974.26.camel-YfaajirXv214zXjbi5bjpg@public.gmane.org>
2007-09-14 15:31 ` Eric W. Biederman
[not found] ` <m1bqc52ria.fsf-T1Yj925okcoyDheHMi7gv2pdwda3JcWeAL8bYrjMMd8@public.gmane.org>
2007-09-14 17:59 ` Johannes Berg [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1189792750.3974.43.camel@johannes.berg \
--to=johannes-cdvu00un1vgdhxzaddlk8q@public.gmane.org \
--cc=ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org \
--cc=linux-wireless-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=netdev-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox