netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: IPsec xfrm resolution
       [not found]       ` <20050217091137.GA9476@gondor.apana.org.au>
@ 2005-02-17 23:26         ` Patrick McHardy
  2005-02-18 10:08           ` Herbert Xu
  0 siblings, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-02-17 23:26 UTC (permalink / raw)
  To: Herbert Xu; +Cc: Maillist netdev

Herbert Xu wrote:

>On Thu, Feb 17, 2005 at 08:48:15AM +0100, Patrick McHardy wrote:
>
>>sorry for the delay, I haven't made much progress yet. The old patch was
>>crap, I started over again. So far I've been mostly looking into a better
>>wake-up mechanism for SADB changes than the brute-force approach currently
>>taken with km_waitq. All incomplete bundles are waiting on exactly one
>>SA at a time. Keying daemons need to specify the sequence number for SAs
>>installed in response to an acquire request, finding everything waiting
>>on this SA is easy. But it could also be added manually by the user, in
>>which case the larval state SA continues to exist. I'm not sure if we need
>>to cover this case. A different problem is finding everything waiting on a
>>SA when SAs turn invalid to send back an ICMP error without waiting for a
>>timeout. Adding a wait list to larval state SAs would be ok (if useful),
>>but adding a list to every state would be a big mess. So it seems we can't
>>do much better than km_waitq. SPD changes are fortunately pretty easy,
>>when policies are inserted we do nothing, packets should always use the
>>policy that was active for them at the time of the first lookup. When the
>>policy that was selected is removed we simply drop the packets.
>>I appreciate any comments you might have, I'll try to come up with some code
>>in the next days.
>>
>
>Thanks for the update.  I think there's another aspect of the problem
>that we can tackle first.
>
>To me there are two parts to the puzzle.  We've got packets whose flow
>resolves to an incomplete bundle and we've got sockets whose dst is an
>incomplete bundle.
>
>Whatever solution we come up with needs to resolve both problems.
>
>First of all the sockets shouldn't wait for the larval states to
>materialise.  The reason is that the information they need from
>the bundle (such as the MTU) is either already available or
>can be provided through a best-effort guess such that the socket
>can handle a change later on when the larval state is filled in.
>
>To do this we need to be able to generate xfrm_dst bundles with
>larval states.  This shouldn't be difficult.
>
Yes, this part is simple. There's one thing I think we need to do
slightly different from what you describe. The current behaviour is
to resolve one SA at a time, we should keep it this way because we
may need an early SA in the bundle for a different policy to resolve
a follow-up SA for nested tunnels with different peers where the
second peer is only reachable through a tunnel to the first peer.
I'm not sure if this actually works, but it also saves traffic when
resolving a SA fails. So in addition to larval state SAs we also add
XFRM_STATE_VOID SAs initialized to the parameters contained in the
template to the bundle.

I'm not sure yet how to deal with optional SAs. We shouldn't add
incomplete optional tunnel mode SAs to the bundle because then we
can't determine the output device, but if we don't nothing will
trigger resolving of optional SAs following a non-optional SA that
needs to be resolved.

>If we apply the same strategy to the packets (by giving them bundles
>with larval states in them) then we can defer the waiting from the
>route loop-up stage to the dst output stage.  There the packet can
>be placed on a queue similar to arp_queue.
>
>At this point we can come back and revisit the problem that you've
>pointed out.  I haven't thought about it very much so this might
>sound silly: We could either key the packets by the larval SA so that
>when that larval SA is updated through UPDATESA or GETSPI/UPDATESA
>we process the packets.  Or we could key the packets by its flow so
>that the creation of any SA matching that flow causes them to be
>processed.
>
I thought about adding the queue to the xfrm_dst and adding a dummy
xfrm_state with a selector that matches only the current flow. This
allows us to cache incomplete bundles, more easily find all packets
affected by SADB changes and only resolve the bundle once for the
entire queue. The downside is that we could potentially get a lot of
bundles.

Finding all queues affected by ADDSA/UPDATESA is not easy. A SA
installed in response to an acquire request doesn't need to match
the one requested, so theoretically states waiting on different
larval states SAs might be able to use it. I don't think we have
much choice other than looking at all incomplete bundles (or
one per flow) on SADB changes.

>Feel free to move the discussion to netdev so that others can voice
>their thoughts.
>
Thanks for your input.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-17 23:26         ` IPsec xfrm resolution Patrick McHardy
@ 2005-02-18 10:08           ` Herbert Xu
  2005-02-19  6:03             ` Patrick McHardy
  0 siblings, 1 reply; 16+ messages in thread
From: Herbert Xu @ 2005-02-18 10:08 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: Maillist netdev

On Fri, Feb 18, 2005 at 12:26:57AM +0100, Patrick McHardy wrote:
>
> Yes, this part is simple. There's one thing I think we need to do
> slightly different from what you describe. The current behaviour is
> to resolve one SA at a time, we should keep it this way because we
> may need an early SA in the bundle for a different policy to resolve
> a follow-up SA for nested tunnels with different peers where the
> second peer is only reachable through a tunnel to the first peer.

Agreed.  This doesn't stop us from creating the bundle object of course.
 
> I'm not sure yet how to deal with optional SAs. We shouldn't add
> incomplete optional tunnel mode SAs to the bundle because then we
> can't determine the output device, but if we don't nothing will
> trigger resolving of optional SAs following a non-optional SA that
> needs to be resolved.

I don't get it.  Can't you just add it into the bundle but ignore it
for dst->output and other calculations until it's either realised or
removed?

> I thought about adding the queue to the xfrm_dst and adding a dummy
> xfrm_state with a selector that matches only the current flow. This

The inner flow is probably not the best key for this.  How about
keying it using the outer remote address on the template? The SAs
have a bydst hash which makes this easy to look up.

So we would attach each packet to a queue shared by all SAs to a
specific (outer) remote address.
 
> Finding all queues affected by ADDSA/UPDATESA is not easy. A SA
> installed in response to an acquire request doesn't need to match
> the one requested, so theoretically states waiting on different
> larval states SAs might be able to use it. I don't think we have
> much choice other than looking at all incomplete bundles (or
> one per flow) on SADB changes.

If you key it on the remote address then you only have to look up
those.

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-18 10:08           ` Herbert Xu
@ 2005-02-19  6:03             ` Patrick McHardy
  2005-02-19  9:23               ` Herbert Xu
  0 siblings, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-02-19  6:03 UTC (permalink / raw)
  To: Herbert Xu; +Cc: Maillist netdev

Herbert Xu wrote:

>On Fri, Feb 18, 2005 at 12:26:57AM +0100, Patrick McHardy wrote:
>  
>
>>I'm not sure yet how to deal with optional SAs. We shouldn't add
>>incomplete optional tunnel mode SAs to the bundle because then we
>>can't determine the output device, but if we don't nothing will
>>trigger resolving of optional SAs following a non-optional SA that
>>needs to be resolved.
>>    
>>
>
>I don't get it.  Can't you just add it into the bundle but ignore it
>for dst->output and other calculations until it's either realised or
>removed?
>  
>
An optional tunnel mode SA might change peer/dev/rt_gateway/rt_type if
successfully resolved. This introduces a couple of problems:

- MTU estimatation impossible
- netfilter LOCAL_OUT hook sees incorrect output device
- strict source routing check done with incorrect rt_gateway

Simply ignoring these SAs if they are not available when the bundle is
created looks like the easiest solution to me.

>>I thought about adding the queue to the xfrm_dst and adding a dummy
>>xfrm_state with a selector that matches only the current flow. This
>>    
>>
>
>The inner flow is probably not the best key for this.  How about
>keying it using the outer remote address on the template? The SAs
>have a bydst hash which makes this easy to look up.
>
>So we would attach each packet to a queue shared by all SAs to a
>specific (outer) remote address.
>  
>
That sounds reasonable. The selector initialized to the inner flow is
meant for cacheing the incomplete bundle at the policy. We can have
multiple SAs with equal family/reqid/saddr/daddr/mode/proto differing
only be SPI and selector. If we use a selector selecting more than the
inner flow we could create a conflict with an already existing cached
bundle.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19  6:03             ` Patrick McHardy
@ 2005-02-19  9:23               ` Herbert Xu
  2005-02-19 12:29                 ` Patrick McHardy
  2005-03-18  4:32                 ` David S. Miller
  0 siblings, 2 replies; 16+ messages in thread
From: Herbert Xu @ 2005-02-19  9:23 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: Maillist netdev

On Sat, Feb 19, 2005 at 07:03:32AM +0100, Patrick McHardy wrote:
>
> An optional tunnel mode SA might change peer/dev/rt_gateway/rt_type if
> successfully resolved. This introduces a couple of problems:
> 
> - MTU estimatation impossible

This is OK for two reasons:

1) The application must be able to react to MTU changes anyway.
2) The most common use for optional SAs is IPCOMP which has zero overhead.

Actually, 2) gives us the real reason why we must include optional SAs.
Even though we can skip the compression of a tunnel mode IPCOMP SA, we
must perform the IPIP encapsulation.

> - netfilter LOCAL_OUT hook sees incorrect output device
> - strict source routing check done with incorrect rt_gateway

Once you take the above into account these turn out to be non-issues.
If the optional SA is transport mode, then the route is identical with
or without it.  If it's tunnel mode, then we must perform the IPIP
encapsulation regardless.

> That sounds reasonable. The selector initialized to the inner flow is
> meant for cacheing the incomplete bundle at the policy. We can have
> multiple SAs with equal family/reqid/saddr/daddr/mode/proto differing
> only be SPI and selector. If we use a selector selecting more than the
> inner flow we could create a conflict with an already existing cached
> bundle.

Agreed.

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19  9:23               ` Herbert Xu
@ 2005-02-19 12:29                 ` Patrick McHardy
  2005-02-19 18:32                   ` Herbert Xu
  2005-03-18  4:32                 ` David S. Miller
  1 sibling, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-02-19 12:29 UTC (permalink / raw)
  To: Herbert Xu; +Cc: Maillist netdev

Herbert Xu wrote:

>On Sat, Feb 19, 2005 at 07:03:32AM +0100, Patrick McHardy wrote:
>  
>
>>- netfilter LOCAL_OUT hook sees incorrect output device
>>- strict source routing check done with incorrect rt_gateway
>>    
>>
>
>Once you take the above into account these turn out to be non-issues.
>If the optional SA is transport mode, then the route is identical with
>or without it.  If it's tunnel mode, then we must perform the IPIP
>encapsulation regardless.
>
This is not what happens currently. If an optional IPCOMP SA is missing
it is skipped entirely. It is also legal to configure an optional
ah/esp tunnel, although we don't accept such packets if the SA isn't
present.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19 12:29                 ` Patrick McHardy
@ 2005-02-19 18:32                   ` Herbert Xu
  2005-02-19 18:47                     ` Patrick McHardy
  0 siblings, 1 reply; 16+ messages in thread
From: Herbert Xu @ 2005-02-19 18:32 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: Maillist netdev

On Sat, Feb 19, 2005 at 01:29:25PM +0100, Patrick McHardy wrote:
>
> This is not what happens currently. If an optional IPCOMP SA is missing
> it is skipped entirely. It is also legal to configure an optional
> ah/esp tunnel, although we don't accept such packets if the SA isn't
> present.

That's a bug.  How can you forward packets properly if the tunnel mode
SA is missing?

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19 18:32                   ` Herbert Xu
@ 2005-02-19 18:47                     ` Patrick McHardy
  2005-02-19 19:03                       ` Herbert Xu
  0 siblings, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-02-19 18:47 UTC (permalink / raw)
  To: Herbert Xu; +Cc: Maillist netdev

Herbert Xu wrote:

>On Sat, Feb 19, 2005 at 01:29:25PM +0100, Patrick McHardy wrote:
>  
>
>>This is not what happens currently. If an optional IPCOMP SA is missing
>>it is skipped entirely. It is also legal to configure an optional
>>ah/esp tunnel, although we don't accept such packets if the SA isn't
>>present.
>>    
>>
>
>That's a bug.  How can you forward packets properly if the tunnel mode
>SA is missing?
>
Using normal routing. What meaning would "optional" have otherwise ?
If the encapsulation has to be done, the user shouldn't mark the SA
as optional in my opinion.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19 18:47                     ` Patrick McHardy
@ 2005-02-19 19:03                       ` Herbert Xu
  2005-02-19 19:53                         ` Patrick McHardy
  0 siblings, 1 reply; 16+ messages in thread
From: Herbert Xu @ 2005-02-19 19:03 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: Maillist netdev

On Sat, Feb 19, 2005 at 07:47:11PM +0100, Patrick McHardy wrote:
>
> >That's a bug.  How can you forward packets properly if the tunnel mode
> >SA is missing?
>
> Using normal routing. What meaning would "optional" have otherwise ?
> If the encapsulation has to be done, the user shouldn't mark the SA
> as optional in my opinion.

In that case you can't mark IPCOMP SAs as optional in this scenario
which is the most common application of optional:

IPCOMP(tunnel) -- ESP(transport)
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19 19:03                       ` Herbert Xu
@ 2005-02-19 19:53                         ` Patrick McHardy
  2005-02-19 20:26                           ` Patrick McHardy
  0 siblings, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-02-19 19:53 UTC (permalink / raw)
  To: Herbert Xu; +Cc: Maillist netdev

Herbert Xu wrote:

>On Sat, Feb 19, 2005 at 07:47:11PM +0100, Patrick McHardy wrote:
>  
>
>>>That's a bug.  How can you forward packets properly if the tunnel mode
>>>SA is missing?
>>>      
>>>
>>Using normal routing. What meaning would "optional" have otherwise ?
>>If the encapsulation has to be done, the user shouldn't mark the SA
>>as optional in my opinion.
>>    
>>
>
>In that case you can't mark IPCOMP SAs as optional in this scenario
>which is the most common application of optional:
>
>IPCOMP(tunnel) -- ESP(transport)
>  
>
I've checked KAME, it also skips IPSEC_LEVEL_USE SAs if they aren't present.
IPCOMP in tunnel mode is a special case. It wants to express more than just
"optional". It means to say "use SA if present and some things wrt. size 
apply,
otherwise use a similar SA with proto=IPIP". One of both has to be used, and
this is what "optional" can't express. The current method is to use the IPIP
SA automatically created with the IPCOMP SA when the compressed size exceeds
the uncompressed size, but it doesn't handle a missing SA. This suggests we
need to special-case tunnel mode IPCOMP in xfrm_tmpl_resolve() and either
ignore "optional" for IPIP tunnel mode SAs or create them on demand.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19 19:53                         ` Patrick McHardy
@ 2005-02-19 20:26                           ` Patrick McHardy
  2005-02-20  6:57                             ` Herbert Xu
  0 siblings, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-02-19 20:26 UTC (permalink / raw)
  To: Herbert Xu; +Cc: Maillist netdev

[-- Attachment #1: Type: text/plain, Size: 859 bytes --]

Patrick McHardy wrote:

> I've checked KAME, it also skips IPSEC_LEVEL_USE SAs if they aren't 
> present.
> IPCOMP in tunnel mode is a special case. It wants to express more than 
> just
> "optional". It means to say "use SA if present and some things wrt. 
> size apply,
> otherwise use a similar SA with proto=IPIP". One of both has to be 
> used, and
> this is what "optional" can't express. The current method is to use 
> the IPIP
> SA automatically created with the IPCOMP SA when the compressed size 
> exceeds
> the uncompressed size, but it doesn't handle a missing SA. This 
> suggests we
> need to special-case tunnel mode IPCOMP in xfrm_tmpl_resolve() and either
> ignore "optional" for IPIP tunnel mode SAs or create them on demand.

How about this patch ? It ignores "optional" for missing tunnel mode 
SAs, symetric
to input.

Regards
Patrick


[-- Attachment #2: x1 --]
[-- Type: text/plain, Size: 314 bytes --]

===== net/xfrm/xfrm_policy.c 1.66 vs edited =====
--- 1.66/net/xfrm/xfrm_policy.c	2005-02-16 00:16:04 +01:00
+++ edited/net/xfrm/xfrm_policy.c	2005-02-19 21:12:38 +01:00
@@ -656,7 +656,7 @@
 			xfrm_state_put(x);
 		}
 
-		if (!tmpl->optional)
+		if (!tmpl->optional || tmpl->mode)
 			goto fail;
 	}
 	return nx;

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19 20:26                           ` Patrick McHardy
@ 2005-02-20  6:57                             ` Herbert Xu
  0 siblings, 0 replies; 16+ messages in thread
From: Herbert Xu @ 2005-02-20  6:57 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: Maillist netdev

On Sat, Feb 19, 2005 at 09:26:02PM +0100, Patrick McHardy wrote:
> 
> How about this patch ? It ignores "optional" for missing tunnel mode 
> SAs, symetric
> to input.

Actually, I've been convinced by your earlier argument :)

I now think that IPCOMP users like racoon/openswan should simply
not set the optional flag on the sending policy.  It only needs
to be set on the receiving side.

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-02-19  9:23               ` Herbert Xu
  2005-02-19 12:29                 ` Patrick McHardy
@ 2005-03-18  4:32                 ` David S. Miller
  2005-03-18  6:24                   ` Herbert Xu
  2005-03-20 15:51                   ` Patrick McHardy
  1 sibling, 2 replies; 16+ messages in thread
From: David S. Miller @ 2005-03-18  4:32 UTC (permalink / raw)
  To: Herbert Xu; +Cc: kaber, netdev

On Sat, 19 Feb 2005 20:23:14 +1100
Herbert Xu <herbert@gondor.apana.org.au> wrote:

> 1) The application must be able to react to MTU changes anyway.

This would seem to be the case, but keep in mind that if
we're going through all this trouble to improve this
quality of implementation issue, we should really get this
right.

On a more practical side, let's use an example to drive home
a point.  Say you're using DNS-sec or something like that for
all outgoing connections, and you're using non-blocking sockets
for all of your stuff.

Every time I use TCP to talk to a unique host, we're going to
mis-estimate the MTU, get an entire send queue full of too-large
packets, then have to resegment the entire thing once the SA is
resolved.  We'll eat a retransmit every such connection as well.
And actually, we'll have to resend about 4 frames (depends upon
what the initial send cwnd is set to, it's usually 4 for ethernet
size MTUs).

Anyways, in truth I'm being very picky :-)  Is there any prototype
or beginnings of these ideas anywhere?

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-03-18  4:32                 ` David S. Miller
@ 2005-03-18  6:24                   ` Herbert Xu
  2005-03-20 15:51                   ` Patrick McHardy
  1 sibling, 0 replies; 16+ messages in thread
From: Herbert Xu @ 2005-03-18  6:24 UTC (permalink / raw)
  To: David S. Miller; +Cc: kaber, netdev

On Thu, Mar 17, 2005 at 08:32:31PM -0800, David S. Miller wrote:
> On Sat, 19 Feb 2005 20:23:14 +1100
> Herbert Xu <herbert@gondor.apana.org.au> wrote:
> 
> > 1) The application must be able to react to MTU changes anyway.
> 
> This would seem to be the case, but keep in mind that if
> we're going through all this trouble to improve this
> quality of implementation issue, we should really get this
> right.

Don't worry, further down in that thread we agreed that optional
SAs will simply not be added so the MTU estimate will be correct
unless it's changed by PMTU later on.
 
> Anyways, in truth I'm being very picky :-)  Is there any prototype
> or beginnings of these ideas anywhere?

Not yet.  However, once the MTU stuff is out of the way I would like
to work on this.

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-03-18  4:32                 ` David S. Miller
  2005-03-18  6:24                   ` Herbert Xu
@ 2005-03-20 15:51                   ` Patrick McHardy
  2005-03-20 20:38                     ` Herbert Xu
  1 sibling, 1 reply; 16+ messages in thread
From: Patrick McHardy @ 2005-03-20 15:51 UTC (permalink / raw)
  To: David S. Miller; +Cc: Herbert Xu, netdev

David S. Miller wrote:

> Anyways, in truth I'm being very picky :-)  Is there any prototype
> or beginnings of these ideas anywhere?

Not yet, I've put it on hold after clashing with Herbert's MTU work.
I'll have a few free days this week where I will continue to work
on this.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-03-20 15:51                   ` Patrick McHardy
@ 2005-03-20 20:38                     ` Herbert Xu
  2005-03-23  2:28                       ` Patrick McHardy
  0 siblings, 1 reply; 16+ messages in thread
From: Herbert Xu @ 2005-03-20 20:38 UTC (permalink / raw)
  To: Patrick McHardy; +Cc: David S. Miller, netdev

On Sun, Mar 20, 2005 at 04:51:23PM +0100, Patrick McHardy wrote:
>
> Not yet, I've put it on hold after clashing with Herbert's MTU work.
> I'll have a few free days this week where I will continue to work
> on this.

I've completed the first stage of the MTU work so please feel free to
send patches through.

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: IPsec xfrm resolution
  2005-03-20 20:38                     ` Herbert Xu
@ 2005-03-23  2:28                       ` Patrick McHardy
  0 siblings, 0 replies; 16+ messages in thread
From: Patrick McHardy @ 2005-03-23  2:28 UTC (permalink / raw)
  To: Herbert Xu; +Cc: David S. Miller, netdev

Herbert Xu wrote:
> On Sun, Mar 20, 2005 at 04:51:23PM +0100, Patrick McHardy wrote:
> 
>>Not yet, I've put it on hold after clashing with Herbert's MTU work.
>>I'll have a few free days this week where I will continue to work
>>on this.
> 
> I've completed the first stage of the MTU work so please feel free to
> send patches through.

I'll send something this weekend.

Regards
Patrick

^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2005-03-23  2:28 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <20050209085251.GA9030@gondor.apana.org.au>
     [not found] ` <420B9DF1.3020704@trash.net>
     [not found]   ` <20050210202810.GA1609@gondor.apana.org.au>
     [not found]     ` <42144C3F.2060501@trash.net>
     [not found]       ` <20050217091137.GA9476@gondor.apana.org.au>
2005-02-17 23:26         ` IPsec xfrm resolution Patrick McHardy
2005-02-18 10:08           ` Herbert Xu
2005-02-19  6:03             ` Patrick McHardy
2005-02-19  9:23               ` Herbert Xu
2005-02-19 12:29                 ` Patrick McHardy
2005-02-19 18:32                   ` Herbert Xu
2005-02-19 18:47                     ` Patrick McHardy
2005-02-19 19:03                       ` Herbert Xu
2005-02-19 19:53                         ` Patrick McHardy
2005-02-19 20:26                           ` Patrick McHardy
2005-02-20  6:57                             ` Herbert Xu
2005-03-18  4:32                 ` David S. Miller
2005-03-18  6:24                   ` Herbert Xu
2005-03-20 15:51                   ` Patrick McHardy
2005-03-20 20:38                     ` Herbert Xu
2005-03-23  2:28                       ` Patrick McHardy

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).