From: Benjamin Poirier <benjamin.poirier@gmail.com>
To: bridge@lists.linux-foundation.org
Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: EAPOL bridging
Date: Sun, 17 Oct 2010 14:06:28 -0400 [thread overview]
Message-ID: <4CBB3B24.2000106@gmail.com> (raw)
Hello,
I have some trouble bridging EAPOL frames. I'd like to do this to allow
wired 802.1x authentication from within a kvm virtual machine. I have
the following setup:
kvm -- tap0 -- br0 -- eth1 -- 802.1x authenticator (switch) -- more network
and it doesn't work. I've added a few logging rules to ebtables. I only
see an EAPOL frame going through the INPUT chain of tap0. It seems to be
dropped by the bridge. The EAPOL frame is an ethernet link local
multicast frame with destination address 01-80-C2-00-00-03, "IEEE Std
802.1X PAE address".
I've looked at http://standards.ieee.org/regauth/groupmac/tutorial.html,
which says that frames with a destination in the range 01-80-C2-00-00-00
to 01-80-C2-00-00-0F should not be forwarded by standard conformant
bridges. I've also looked at net/bridge/br_input.c and br_handle_frame()
seems quite intent on "bending" the standard when STP is disabled, but
only for 01-80-C2-00-00-00. However there are more applications that use
similar addresses, EAPOL included:
http://standards.ieee.org/regauth/groupmac/Standard_Group_MAC_Address_assignments.pdf
Given the current state of affairs, would it be acceptable to make the
code more permissive by forwarding all the range of reserved group
addresses when STP is disabled? If not, what would be the way to go
about enabling 802.1x authentication from within a virtual machine?
BTW, it seems this issue has been raised before,
https://lists.linux-foundation.org/pipermail/bridge/2007-November/005629.html
with the conclusion that
> Despite what the standards say, many users are using bridging code for invisible
> firewalls etc, and in those cases they want STP and EAPOL frames to be forwarded.
Thanks,
-Ben
next reply other threads:[~2010-10-17 18:06 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-10-17 18:06 Benjamin Poirier [this message]
2010-10-18 16:38 ` [Bridge] EAPOL bridging Stephen Hemminger
2010-10-19 2:09 ` [PATCH] bridge: Forward reserved group addresses if !STP Benjamin Poirier
2010-10-19 3:28 ` Stephen Hemminger
2010-10-21 11:29 ` David Miller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4CBB3B24.2000106@gmail.com \
--to=benjamin.poirier@gmail.com \
--cc=bridge@lists.linux-foundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).