Re: [PATCH ipsec-next 00/11] xfrm: remove xfrm_mode indirections

2019-03-28 Thread Benedict Wong
Hi Florian, I ran the Android unit tests on these patches, based off ipsec-next, and am encountering some new errors. I'll take another look to try and isolate which patches might be causing the failures. Best Regards, Benedict Wong On Wed, Mar 27, 2019 at 6:30 PM Florian Westphal

[xfrm, backport request] Request backport of e2612cd496e7 - set-mark backwards compatibility

2019-02-05 Thread Benedict Wong
I propose backporting commit e2612cd496e7 ("xfrm: Make set-mark default behavior backward compatible") to 4.19 and 4.20 kernels to fix a backwards compatibility bug introduced in 9b42c1f179a6 (“xfrm: Extend the output_mark to support input direction and masking”). The fix is small, relatively simp

[PATCH v2 iproute2 0/1] Hide keys for state output - changelog

2019-01-18 Thread Benedict Wong
Changes v1 -> v2: Corrected stylistic nits: - Line break locations in ipxfrm.c - Usage and man pages updated to reflect deleteall and list parameters are no longer optional, as they have been individualized. Benedict Wong (1): xfrm: add option to hide keys in state output ip/ipxfr

[PATCH v2 iproute2 1/1] xfrm: add option to hide keys in state output

2019-01-18 Thread Benedict Wong
exposing keys. Signed-off-by: Benedict Wong --- ip/ipxfrm.c| 49 +- ip/xfrm.h | 5 +++-- ip/xfrm_monitor.c | 7 +-- ip/xfrm_state.c| 27 - man/man8/ip-xfrm.8 | 15 +- 5 files changed, 71

Re: [PATCH iproute2] xfrm: add option to hide keys in state output

2019-01-15 Thread Benedict Wong
Friendly ping for review. If there are no concerns, I think this would be useful especially in the logging/bugreport use cases. On Mon, Jan 7, 2019 at 3:10 PM Benedict Wong wrote: > > (Accidentally sent previously as direct reply. Re-sending as reply-all) > > > ... would not it b

Re: [PATCH ipsec, resend 1/1] xfrm: Make set-mark default behavior backward compatible

2019-01-15 Thread Benedict Wong
> > > > Tested with additions to Android's kernel unit test suite: > > https://android-review.googlesource.com/c/kernel/tests/+/860150 > > > > Fixes: 9b42c1f179a6 ("xfrm: Extend the output_mark to support input > > direction and masking") Signed-off-

[PATCH ipsec, resend 1/1] xfrm: Make set-mark default behavior backward compatible

2019-01-14 Thread Benedict Wong
tests/+/860150 Fixes: 9b42c1f179a6 ("xfrm: Extend the output_mark to support input direction and masking") Signed-off-by: Benedict Wong --- net/xfrm/xfrm_policy.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c ind

[PATCH ipsec, resend 0/1] xfrm: set-mark default behavior changes

2019-01-14 Thread Benedict Wong
cceptable as is. Benedict Wong (1): xfrm: Make set-mark default behavior backward compatible net/xfrm/xfrm_policy.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) -- 2.20.1.97.g81188d93c3-goog

Re: [PATCH ipsec, resend 0/1] xfrm: set-mark default behavior changes

2019-01-14 Thread Benedict Wong
sert wrote: > > On Fri, Jan 11, 2019 at 12:14:11PM -0800, Benedict Wong wrote: > > A behavior change introduced in 9b42c1f179a6 (“xfrm: Extend the > > output_mark to support input direction and masking”) results in a > > change in: > > > > 1. Default outbound

[PATCH ipsec, resend 1/1] xfrm: Make set-mark default behavior backward compatible

2019-01-11 Thread Benedict Wong
tests/+/860150 Fixes: 9b42c1f179a6 ("xfrm: Extend the output_mark to support input direction and masking") Signed-off-by: Benedict Wong --- net/xfrm/xfrm_policy.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c ind

[PATCH ipsec, resend 0/1] xfrm: set-mark default behavior changes

2019-01-11 Thread Benedict Wong
s 1 and 3 imply a configuration that output mark was not designed to support. The only valid use case for this seems to be the loopback case (as IP addresses would apply bidirectionally). As such, we believe that this behavioral change is acceptable as is. Benedict Wong (1): xfrm: Make set-mark d

[PATCH ipsec 0/1] xfrm: set-mark default behavior changes

2019-01-08 Thread Benedict Wong
s 1 and 3 imply a configuration that output mark was not designed to support. The only valid use case for this seems to be the loopback case (as IP addresses would apply bidirectionally). As such, we believe that this behavioral change is acceptable as is. Benedict Wong (1): xfrm: Make set-mark d

[PATCH ipsec 1/1] xfrm: Make set-mark default behavior backward compatible

2019-01-08 Thread Benedict Wong
tests/+/860150 Fixes: 9b42c1f179a6 ("xfrm: Extend the output_mark to support input direction and masking") Signed-off-by: Benedict Wong --- net/xfrm/xfrm_policy.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c ind

Re: [PATCH iproute2] xfrm: add option to hide keys in state output

2019-01-07 Thread Benedict Wong
n, Jan 7, 2019 at 2:23 PM Florian Fainelli wrote: > > On 1/7/19 1:31 PM, Benedict Wong wrote: > > ip xfrm state show currently dumps keys unconditionally. This limits its > > use in logging, as security information can be leaked. > > > > This patch adds a nokeys option

[PATCH iproute2] xfrm: add option to hide keys in state output

2019-01-07 Thread Benedict Wong
exposing keys. Signed-off-by: Benedict Wong --- ip/ipxfrm.c| 45 + ip/xfrm.h | 5 +++-- ip/xfrm_monitor.c | 7 +-- ip/xfrm_state.c| 27 ++- man/man8/ip-xfrm.8 | 15 ++- 5 files changed, 69

Re: [RFC iproute2] xfrm: add option to hide keys in state output

2019-01-07 Thread Benedict Wong
Noted. Should I wait until xfrm is converted to JSON output formatting? Or if there are no structural and stylistic issues, should I re-send this as a patch? On Fri, Jan 4, 2019 at 4:21 PM Stephen Hemminger wrote: > > On Fri, 4 Jan 2019 15:19:10 -0800 > Benedict Wong wrote: >

[RFC ipsec 1/1] xfrm: Make set-mark default behavior backward compatible

2019-01-04 Thread Benedict Wong
tests/+/860150 Fixes: 9b42c1f179a6 ("xfrm: Extend the output_mark to support input direction and masking") Signed-off-by: Benedict Wong --- net/xfrm/xfrm_policy.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c ind

[RFC ipsec 0/1] xfrm: set-mark default behavior changes

2019-01-04 Thread Benedict Wong
s 1 and 3 imply a configuration that output mark was not designed to support. The only valid use case for this seems to be the loopback case (as IP addresses would apply bidirectionally). As such, we believe that this behavioral change is acceptable as is. Benedict Wong (1): xfrm: Make set-mark d

[RFC iproute2] xfrm: add option to hide keys in state output

2019-01-04 Thread Benedict Wong
exposing keys. Signed-off-by: Benedict Wong --- ip/ipxfrm.c| 45 + ip/xfrm.h | 5 +++-- ip/xfrm_monitor.c | 7 +-- ip/xfrm_state.c| 27 ++- man/man8/ip-xfrm.8 | 15 ++- 5 files changed, 69

[PATCH v2 ipsec] Clear secpath on loopback_xmit

2018-10-08 Thread Benedict Wong
t;[IPsec]: Strengthen policy checks") Signed-off-by: Benedict Wong --- drivers/net/loopback.c | 4 1 file changed, 4 insertions(+) diff --git a/drivers/net/loopback.c b/drivers/net/loopback.c index 30612497643c..a6bf54df94bd 100644 --- a/drivers/net/loopback.c +++ b/drivers/net/loopba

[PATCH ipsec-next] Clear secpath on loopback_xmit

2018-10-05 Thread Benedict Wong
the secpath, without a matching inbound policy. Clearing the secpath ensures that all states added to the secpath are exclusively from the inbound processing. Tests: xfrm tunnel mode tests added for loopback: https://android-review.googlesource.com/c/kernel/tests/+/777328 Signed-off-by: Benedict W

[PATCH ipsec-next] xfrm: Return detailed errors from xfrmi_newlink

2018-07-25 Thread Benedict Wong
the Android Kernel Networking Tests, with additional xfrmi_newlink tests here: https://android-review.googlesource.com/c/kernel/tests/+/715755 Signed-off-by: Benedict Wong --- net/xfrm/xfrm_interface.c | 32 1 file changed, 20 insertions(+), 12 deletions(-) diff

[PATCH ipsec-next] xfrm: Remove xfrmi interface ID from flowi

2018-07-19 Thread Benedict Wong
Networking Tests: https://android.googlesource.com/kernel/tests/+/master/net/test Signed-off-by: Benedict Wong --- include/net/dst.h | 14 ++ include/net/flow.h| 9 include/net/xfrm.h| 2 +- net/xfrm/xfrm_interface.c | 4 +- net/xfrm/xfrm_policy.c| 98

[RFC ipsec-next] xfrm: Remove xfrmi interface ID from flowi

2018-07-17 Thread Benedict Wong
Networking Tests: https://android.googlesource.com/kernel/tests/+/master/net/test Signed-off-by: Benedict Wong --- include/net/dst.h | 14 ++ include/net/flow.h| 7 --- include/net/xfrm.h| 2 +- net/xfrm/xfrm_interface.c | 4 +- net/xfrm/xfrm_policy.c| 98

Re: [PATCH RFC v2 ipsec-next 0/3] Virtual xfrm interfaces

2018-06-20 Thread Benedict Wong
encapsulation - Inbound decapsulation - Rekey - ICMP error path - Netfilter rejections of outbound paths. -- Benedict Wong On Tue, Jun 12, 2018 at 12:56 AM Steffen Klassert wrote: > > This patchset introduces new virtual xfrm interfaces. > The design of virtual xfrm interfaces inter