[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f02ae4bb-2e50-e096-7505-3928b16d4009@gmail.com>
Date: Sat, 27 Aug 2022 11:55:19 +0300
From: Leonard Crestez <cdleonard@...il.com>
To: Andrew Lunn <andrew@...n.ch>, Dmitry Safonov <dima@...sta.com>
Cc: David Ahern <dsahern@...nel.org>,
Andy Lutomirski <luto@...capital.net>,
Ard Biesheuvel <ardb@...nel.org>,
Bob Gilligan <gilligan@...sta.com>,
Dmitry Safonov <0x7f454c46@...il.com>,
Eric Biggers <ebiggers@...nel.org>,
Francesco Ruggeri <fruggeri@...sta.com>,
Herbert Xu <herbert@...dor.apana.org.au>,
Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>,
Ivan Delalande <colona@...sta.com>,
Jakub Kicinski <kuba@...nel.org>,
Paolo Abeni <pabeni@...hat.com>,
Salam Noureddine <noureddine@...sta.com>,
Shuah Khan <shuah@...nel.org>, netdev@...r.kernel.org,
linux-crypto@...r.kernel.org, linux-kernel@...r.kernel.org,
"David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>
Subject: Re: [PATCH 00/31] net/tcp: Add TCP-AO support
On 8/24/22 15:46, Andrew Lunn wrote:
>> I think it would make sense to push key validity times and the key selection
>> policy entirely in the kernel so that it can handle key rotation/expiration
>> by itself. This way userspace only has to configure the keys and doesn't
>> have to touch established connections at all.
>
> I know nothing aobut TCP-AO, nor much about kTLS. But doesn't kTLS
> have the same issue? Is there anything which can be learnt from kTLS?
> Maybe the same mechanisms can be used? No point inventing something
> new if you can copy/refactor working code?
>
>> My series has a "flags" field on the key struct where it can filter by IP,
>> prefix, ifindex and so on. It would be possible to add additional flags for
>> making the key only valid between certain times (by wall time).
>
> What out for wall clock time, it jumps around in funny ways. Plus the
> kernel has no idea what time zone the wall the wall clock is mounted
> on is in.
A close equivalent seems to exist in ipsec in the "xfrm_lifetime_cfg"
struct, specifically the soft/hard expires timers. These are optional
validity times for each xfrm_state which is equivalent to a "key".
I'm not familiar with how those are used but ipsec usually relies on
complex userspace daemons for managing xfrm states and policies and
those daemons should be capable of adding and removing keys based on
internal timers. Still, the linux kernel supports checking for key
validity on it's own.
--
Regards,
Leonard
Powered by blists - more mailing lists