netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 0/3] xfrm: ESP Traffic Flow Confidentiality padding (v2)
@ 2010-12-07 10:29 Martin Willi
  2010-12-07 10:29 ` [PATCH 1/3] xfrm: Add Traffic Flow Confidentiality padding XFRM attribute Martin Willi
                   ` (2 more replies)
  0 siblings, 3 replies; 8+ messages in thread
From: Martin Willi @ 2010-12-07 10:29 UTC (permalink / raw)
  To: Herbert Xu; +Cc: linux-crypto, netdev

The following patchset adds Traffic Flow Confidentiality padding. The
first patch introduces a new Netlink XFRM attribute to configure TFC via
userspace. Patch two and three implement the padding logic in IPv4 and
IPv6 ESP. Padding is always done using the RFC4303 format an is clamped
to the PMTU.

Changes from v1:
  - Always clamp padding length to never exceed PMTU
  - Remove XFRM_TFC_PMTU flag, use USHRT_MAX padding length instead
  - Remove ESPv2 padding fallback due to the concerns from Herbert
  - Keep the existing ESP padlen field, as we don't mangle ESP padding

I've kept the currently unused flags in the XFRM attribute to implement
ESPv2 fallback or other extensions in the future without changing the ABI.

Martin Willi (3):
      xfrm: Add Traffic Flow Confidentiality padding XFRM attribute
      xfrm: Traffic Flow Confidentiality for IPv4 ESP
      xfrm: Traffic Flow Confidentiality for IPv6 ESP

 include/linux/xfrm.h |    6 ++++++
 include/net/xfrm.h   |    1 +
 net/ipv4/esp4.c      |   33 +++++++++++++++++++++++++--------
 net/ipv6/esp6.c      |   33 +++++++++++++++++++++++++--------
 net/xfrm/xfrm_user.c |   16 ++++++++++++++--
 5 files changed, 71 insertions(+), 18 deletions(-)


^ permalink raw reply	[flat|nested] 8+ messages in thread
* [PATCH 0/3] xfrm: ESP Traffic Flow Confidentiality padding (v3)
@ 2010-12-08 14:37 Martin Willi
  2010-12-08 14:37 ` [PATCH 1/3] xfrm: Add Traffic Flow Confidentiality padding XFRM attribute Martin Willi
  0 siblings, 1 reply; 8+ messages in thread
From: Martin Willi @ 2010-12-08 14:37 UTC (permalink / raw)
  To: Herbert Xu; +Cc: linux-crypto, netdev

The following patchset adds Traffic Flow Confidentiality padding. The
first patch introduces a new Netlink XFRM attribute to configure TFC via
userspace. Patch two and three implement the padding logic in IPv4 and
IPv6 ESP. Padding is always done using the RFC4303 format an is clamped
to the PMTU.

Changes from v2:
  - Remove unused flag field in attribute, use a plain u32 as attribute payload
  - Reject installation of TFC padding on non-tunnel SAs

Martin Willi (3):
      xfrm: Add Traffic Flow Confidentiality padding XFRM attribute
      xfrm: Traffic Flow Confidentiality for IPv4 ESP
      xfrm: Traffic Flow Confidentiality for IPv6 ESP

 include/linux/xfrm.h |    1 +
 include/net/xfrm.h   |    1 +
 net/ipv4/esp4.c      |   32 ++++++++++++++++++++++++--------
 net/ipv6/esp6.c      |   32 ++++++++++++++++++++++++--------
 net/xfrm/xfrm_user.c |   19 +++++++++++++++++--
 5 files changed, 67 insertions(+), 18 deletions(-)

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2010-12-08 14:39 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-12-07 10:29 [PATCH 0/3] xfrm: ESP Traffic Flow Confidentiality padding (v2) Martin Willi
2010-12-07 10:29 ` [PATCH 1/3] xfrm: Add Traffic Flow Confidentiality padding XFRM attribute Martin Willi
2010-12-07 10:29 ` [PATCH 2/3] xfrm: Traffic Flow Confidentiality for IPv4 ESP Martin Willi
2010-12-08  8:49   ` Herbert Xu
2010-12-08  9:20     ` Martin Willi
2010-12-08  9:24       ` Herbert Xu
2010-12-07 10:29 ` [PATCH 3/3] xfrm: Traffic Flow Confidentiality for IPv6 ESP Martin Willi
  -- strict thread matches above, loose matches on Subject: below --
2010-12-08 14:37 [PATCH 0/3] xfrm: ESP Traffic Flow Confidentiality padding (v3) Martin Willi
2010-12-08 14:37 ` [PATCH 1/3] xfrm: Add Traffic Flow Confidentiality padding XFRM attribute Martin Willi

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).