Hi Neale,

Sure, it sounds ok. If I end up having trouble integrating with the new
APIs I can revisit the issue and figure out if there's some enhancement
needed at that point.

Thanks,
-Matt



On Mon, May 27, 2019 at 7:01 AM Neale Ranns (nranns) <nra...@cisco.com>
wrote:

>
>
> Hi Matt,
>
>
>
> I’m glad the change is not a problem for you.
>
>
>
> The trouble with passing partial rather than full information in the
> update, is that I cannot always tell what’s being updated. Consider the 3
> phase re-key, the user is adding another receive SA, how can I tell if
> that’s the addition of a new SA or the replacement of the existing SA (as
> it would in the one phase re-key). I’d need more flags to say ‘this is an
> addition update not a replace’ – and I think it starts getting more
> complicated.
>
> The control plane needs to maintain all the data required to programme
> VPP, so it can replay should VPP crash, so having download the full update
> each time is fine IMO.
>
> Does that sound reasonable?
>
>
>
> Regards,
>
> neale
>
>
>
> *De : *Matthew Smith <mgsm...@netgate.com>
> *Date : *mercredi 22 mai 2019 à 17:50
> *À : *"Neale Ranns (nranns)" <nra...@cisco.com>
> *Cc : *"vpp-dev@lists.fd.io" <vpp-dev@lists.fd.io>
> *Objet : *Re: [vpp-dev] RFC: IPSec Tunnel remodel
>
>
>
> Hi Neale,
>
>
>
> We (Netgate/TNSR) use strongswan for IKE with a module that connects to
> the VPP binary API to manage IPsec tunnel interfaces.
>
>
>
> The API changes mostly look fine from my perspective. It won't be that
> much different than what we do now. Currently we create an IPsec tunnel
> interface before any IKE negotiation has taken place and populate dummy
> values for SPIs and other fields that are not known yet. Then as the IKE
> daemon negotiates SAs, we create them in VPP and associate them to the
> tunnel interface. This means that for our purposes, there is not a change
> from making 1 API call to 4 calls. We currently make 5 calls in the process
> of getting a tunnel operational (create tunnel interface, create SA * 2,
> set SA on tunnel * 2).
>
>
>
> One addition to your patch that would be useful is support for setting a
> new SA on a tunnel interface in only one direction at a time. The IKE
> daemon executes callbacks to install the inbound and outbound SAs
> separately and it's easier to be able to handle each of them as their own
> atomic operation than it is to store the data for a new SA for some amount
> of time until you find that the SA for the other direction has been added
> and then propagate both of them into VPP at the same time. If it were
> possible to send a ipsec_tunnel_protect_update message where tunnel.sa_out
> ==~0 causes only the inbound SA to be updated or tunnel.n_sa_in == 0 causes
> only the outbound SAs to be updated, this would make transitioning to the
> new calls more straightforward. At least for me :)
>
>
>
> Thanks,
>
> -Matt
>
>
>
>
>
> On Mon, May 20, 2019 at 11:59 AM Neale Ranns via Lists.Fd.Io <nranns=
> cisco....@lists.fd.io> wrote:
>
>
> Hi VPP-IPSec-ers,
>
> I'd like to gauge comments on this article:
>   https://wiki.fd.io/view/VPP/IPSec
> and the proposal for the IPSec tunnel re-model.
> The associated patch is:
>   https://gerrit.fd.io/r/#/c/18956/
>
> thanks,
> Neale
>
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
>
> View/Reply Online (#13097): https://lists.fd.io/g/vpp-dev/message/13097
> Mute This Topic: https://lists.fd.io/mt/31687572/675725
> Group Owner: vpp-dev+ow...@lists.fd.io
> Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [mgsm...@netgate.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
>
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#13175): https://lists.fd.io/g/vpp-dev/message/13175
Mute This Topic: https://lists.fd.io/mt/31687572/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to