netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Sabrina Dubroca <sd@queasysnail.net>
To: Antonio Quartulli <antonio@openvpn.net>
Cc: netdev@vger.kernel.org, kuba@kernel.org, pabeni@redhat.com,
	ryazanov.s.a@gmail.com, edumazet@google.com, andrew@lunn.ch
Subject: Re: [PATCH net-next v6 12/25] ovpn: implement packet processing
Date: Wed, 11 Sep 2024 15:30:13 +0200	[thread overview]
Message-ID: <ZuGbZTinqmoBsc6C@hog> (raw)
In-Reply-To: <af164160-6402-45f9-8ef3-d5a3ffd43452@openvpn.net>

2024-09-11, 14:52:10 +0200, Antonio Quartulli wrote:
> On 10/09/2024 15:04, Sabrina Dubroca wrote:
> > 2024-09-06, 15:19:08 +0200, Antonio Quartulli wrote:
> > > Therefore, how about having an array large enough to store all key IDs (max
> > > ID is 7):
> > 
> > Right, I forgot about that. For 8 keys, sure, array sounds ok. MACsec
> > has only 4 and I also implemented it as an array
> > (include/net/macsec.h: macsec_{tx,rx}_sc, sa array).
> 
> thanks for the pointer!
> 
> > 
> > > * array index is the key ID (fast lookup on RX);
> > > * upon SET_KEY we store the provided keys and erase the rest;
> > 
> > I'm not sure about erasing the rest. If you're installing the
> > secondary ("next primary") key, you can't just erase the current
> > primary? ("erase the rest" also means you'd only ever have one key in
> > the array, which contradicts your last item in this list)
> Yeah, my point is wrong.
> I fooled myself assuming SET_KEY would install two keys each time, but this
> is not the case, so we can't "erase everything else".
> 
> What we can do is:
> * if SET_KEY wants to install a key in PRIMARY, then we erase the key marked
> as "primary" and we mark the new one as such
> * if SET_KEY wants to install a key in SECONDARY, then we erase the key
> without any mark.

Ok, then the DEL_KEY op would not really be needed.

> 
> This way we simulate writing into slots.
> 
> > 
> > > * upon SET_KEY we store in a new field the index/ID of the PRIMARY (fast
> > > lookup on TX), namely primary_id;
> 
> FTR: this is what "marking as primary" means
> 
> > > * upon SWAP we just save in primary_id the "other" index/ID;
> > 
> > I'm confused by these two. Both SET_KEY and SWAP modify the primary_id?
> 
> Yes.
> SET_KEY may want to install a key in the primary slot: in that case the new
> key has to be marked as primary immediately.
> This normally happens only upon first SET_KEY after connection, when no
> other key exists.
> 
> SWAP will switch primary_id to the other key ID.
> 
> makes sense?

Yes, thanks, that fixes up all my confusion around setting primary_id.

> > > * at any given time we will have only two keys in the array.
> > 
> > This needs to be enforced in the SET_KEY implementation, otherwise
> > SWAP will have inconsistent effects.
> 
> yap. I hope what I wrote above about SET_KEY helps clarifying this part.
> 
> > 
> > 
> > > It's pretty much like your option 1 and 2, but using an array
> > > indexed by key ID.
> > 
> > Are you decoupling TX and RX keys (so that they can be installed
> > independently) in this proposal? I can't really tell, the array could
> > be key pairs or separate.
> 
> I would not decouple TX and RX keys.
> Each array item should be the same as what we are now storing into each slot
> (struct ovpn_crypto_key_slot *).
> I could use two arrays, instead of an array of slots, but that means
> changing way more logic and I don't see the benefit.

Avoid changing both keys every time when a link has very asymmetric
traffic. And the concept of a primary/secondary key makes no sense on
receive, all you need is keyids, and there's no need to swap slots,
which avoids the "key not available during SWAP" issue
entirely. Primary key only makes sense on TX.

But I'm guessing the keypair concept is also baked deep into openvpn.


> > > The concept of slot is a bit lost, but it is not important as long as we can
> > > keep the API and its semantics the same.
> > 
> > Would it be a problem for userspace to keep track of key IDs, and use
> > that (instead of slots) to communicate with the kernel? Make
> > setkey/delkey be based on keyid, and replace swap with a set_tx
> > operation which updates the current keyid for TX. That would seem like
> > a better API, especially for the per-ID array you're proposing
> > here. The concept of slots would be almost completely lost (only
> > "current tx key" is left, which is similar to the "primary slot").
> > (it becomes almost identical to the way MACsec does things, except
> > possibly that in MACsec the TX and RX keys are not paired at all, so
> > you can install/delete a TX key without touching any RX key)
> > 
> 
> unfortunately changing userspace that way is not currently viable.
> There are more components (and documentation) that attach to this slot
> abstraction.

I thought that might be the case. Too bad, it means we have to keep
the slots API and the kernel will be stuck with it forever (even if
some day userspace can manage key ids instead of slots).

> Hence my proposal to keep the API the same, but rework the internal for
> better implementation.

Yeah, that makes sense if you have that constraint imposed by the
existing userspace.

> 
> > 
> > Maybe you can also rework the current code to look a bit like this
> > array-based proposal, and not give up the notion of slots, if that's
> > something strongly built into the core of openvpn:
> > 
> > - primary/secondary in ovpn_crypto_state become slots[2]
> > - add a one-bit "primary" reference, used to look into the slots array
> > - swap just flips that "primary" bit
> > - TX uses slots[primary]
> > - RX keeps inspecting both slots (now slot[0] and slot[1] instead of
> >    primary/secondary) looking for the correct keyid
> > - setkey/delkey still operate on primary/secondary, but need to figure
> >    out whether slot[0] or slot[1] is primary/secondary based on
> >    ->primary
> > 
> > It's almost identical to the current code (and API), except you don't
> > need to reassign any pointers to swap keys, so it should avoid the
> > rekey issue.
> 
> This approach sounds very close to what I was aiming for, but simpler
> because we have slots[2] instead of slots[8] (which means that primary_id
> can be just 'one-bit').

Yes.

> The only downside is that upon RX we have to check both keys.
> However I don't think this is an issue as we have just 2 keys at most.
> 
> I could even optimize the lookup by starting always from the primary key, as
> that's the one being used most of the time by the sender.

Nice.

> Ok, I will go with this approach you summarized here at the end.

Ok. I think it should be a pretty minimal set of changes on top of the
existing code, especially if you hide the primary/secondary accesses
in inline helpers.

-- 
Sabrina


  reply	other threads:[~2024-09-11 13:30 UTC|newest]

Thread overview: 58+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-08-27 12:07 [PATCH net-next v6 00/25] Introducing OpenVPN Data Channel Offload Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 01/25] netlink: add NLA_POLICY_MAX_LEN macro Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 02/25] rtnetlink: don't crash on unregister if no dellink exists Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 03/25] net: introduce OpenVPN Data Channel Offload (ovpn) Antonio Quartulli
2024-09-05 14:38   ` Sabrina Dubroca
2024-09-06 12:26     ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 04/25] ovpn: add basic netlink support Antonio Quartulli
2024-09-06 19:26   ` Simon Horman
2024-09-09  8:35     ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 05/25] ovpn: add basic interface creation/destruction/management routines Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 06/25] ovpn: implement interface creation/destruction via netlink Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 07/25] ovpn: keep carrier always on Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 08/25] ovpn: introduce the ovpn_peer object Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 09/25] ovpn: introduce the ovpn_socket object Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 10/25] ovpn: implement basic TX path (UDP) Antonio Quartulli
2024-08-30 17:02   ` Sabrina Dubroca
2024-09-02 12:03     ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 11/25] ovpn: implement basic RX " Antonio Quartulli
2024-09-02 11:22   ` Sabrina Dubroca
2024-09-02 12:24     ` Antonio Quartulli
2024-09-06 19:18   ` Simon Horman
2024-09-09  8:37     ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 12/25] ovpn: implement packet processing Antonio Quartulli
2024-09-02 14:42   ` Sabrina Dubroca
2024-09-04 12:07     ` Antonio Quartulli
2024-09-04 15:01       ` Sabrina Dubroca
2024-09-06 13:19         ` Antonio Quartulli
2024-09-10 13:04           ` Sabrina Dubroca
2024-09-11 12:52             ` Antonio Quartulli
2024-09-11 13:30               ` Sabrina Dubroca [this message]
2024-09-12  8:33                 ` Antonio Quartulli
2024-09-22 19:51                   ` Sergey Ryazanov
2024-09-23 12:48                     ` Antonio Quartulli
2024-09-06 19:29   ` Simon Horman
2024-09-09  8:38     ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 13/25] ovpn: store tunnel and transport statistics Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 14/25] ovpn: implement TCP transport Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 15/25] ovpn: implement multi-peer support Antonio Quartulli
2024-09-03 14:40   ` Sabrina Dubroca
2024-09-04 10:10     ` Sabrina Dubroca
2024-09-06 13:26       ` Antonio Quartulli
2024-09-05  8:02     ` Antonio Quartulli
2024-09-05 10:47       ` Sabrina Dubroca
2024-09-09  9:12         ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 16/25] ovpn: implement peer lookup logic Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 17/25] ovpn: implement keepalive mechanism Antonio Quartulli
2024-09-03 15:17   ` Sabrina Dubroca
2024-09-09  9:17     ` Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 18/25] ovpn: add support for updating local UDP endpoint Antonio Quartulli
2024-08-27 12:07 ` [PATCH net-next v6 19/25] ovpn: add support for peer floating Antonio Quartulli
2024-09-05  9:55   ` Sabrina Dubroca
2024-09-09  8:52     ` Antonio Quartulli
2024-08-27 12:08 ` [PATCH net-next v6 20/25] ovpn: implement peer add/dump/delete via netlink Antonio Quartulli
2024-08-27 12:08 ` [PATCH net-next v6 21/25] ovpn: implement key add/del/swap " Antonio Quartulli
2024-08-27 12:08 ` [PATCH net-next v6 22/25] ovpn: kill key and notify userspace in case of IV exhaustion Antonio Quartulli
2024-08-27 12:08 ` [PATCH net-next v6 23/25] ovpn: notify userspace when a peer is deleted Antonio Quartulli
2024-08-27 12:08 ` [PATCH net-next v6 24/25] ovpn: add basic ethtool support Antonio Quartulli
2024-08-27 12:08 ` [PATCH net-next v6 25/25] testing/selftest: add test tool and scripts for ovpn module Antonio Quartulli

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ZuGbZTinqmoBsc6C@hog \
    --to=sd@queasysnail.net \
    --cc=andrew@lunn.ch \
    --cc=antonio@openvpn.net \
    --cc=edumazet@google.com \
    --cc=kuba@kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=ryazanov.s.a@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).