Yar Tikhiy wrote:


If what you are suggesting is that we pass into ipfw an 'offset'
into the packet as well as the packet, then yes I like that idea,
but I didn't see Andre suggest it.

Do you consider only ideas by Andre? ;-)  By Andre's opinion I
meant this:

        Please have the ipfw code examine the vlan tag in the mbuf instead of
        fiddling with the mbuf contents.

At the moment I plan the ipfw code to be unaware of vlan headers.
the plan is:
 Add an argument to ipfw which is the offset in the packet where
 the IP header may be found. Change the L2 users of ipfw to
 leave the packet alone, but calculate the correct offset to pass to
 ipfw. IPFW will make no assumptions as to what packet contents come
 before the offset. Bridge and L2 callers of ipfw will
 set the offset to non-0 values where the IP callers will set it to
 0. The non IP callers may make some MAC information available to the
 ipfw code my some separate method, as it does at the moment. How this
 is done will depend if we want to support Q-n-Q, and if so, how much..



-- Andre

If we want ipfw to know of L2, then examining the VLAN tag in it
is OK.  If not really, then ipfw (or any pfil filter) can get just
the offset of IP.

What vlan tag? what if it's from an interface with no VLAN capacity..
What we need to do is make a convention so that vlan tags are always created at the lowest layer, even if HW vlan tagging is not supported, so that all packets look as if they have come from HW capable packets, and add code so that all non WH capable interfaces interpret Van tags at the lowest level, that way vlan packets always look the same.

[...]


Pardon, but you seem to mistake me for Max Laier. :-)  OTOH this is
a good chance for me to ask you a similar question: Did you recieve
my mail on m_copym() usage in the kernel?  I can resend it to you
if you didn't. ;-)  Honestly, I'd appreciate much if you dropped a
line on the topic.


sure.. My reader may have misfiled it under spam..

send it again..

There is also work in progress to introduce nested VLANs AKA Q-n-Q.
They seem to present a challenge to the scheme you are implementing.
not a permanent problem.. it could be modified to handle it.
but I'll take it into account in the next version if
you think it is a required feature.. what is the maximum
nesting level?

Infinity.  Why to introduce such a hard limit?


Because an infinite limit complicates things?

>  Well, 802.1ad allows
just two tags: the customer (C) tag and the service (S) tag, but
each gets its own ethertype.  C-TAG's is 81-00 while S-TAG's is
88-a8.  I don't think we support the different ethertypes yet, so
Q-n-Q is just the nesting of type 81-00 tags.  (802.1ad appears a
funny reading: it's essentially a patch against the 802.1q text!)
Cisco and Juniper boxes seem to have a limit of two tags as well.
While they may have a reason to (all those ASICs, you know,) we
don't have it.  Allowing for only two tags will tempt us into
duplicating code instead of developing fair algos and interfaces.


yes but algorythmically doing something we may never be required
to do may lead to unneeded code slowdown. I guess we can look at it
and decide.


_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to