[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090122073946.GB12395@gondor.apana.org.au>
Date: Thu, 22 Jan 2009 18:39:46 +1100
From: Herbert Xu <herbert@...dor.apana.org.au>
To: Timo Teräs <timo.teras@....fi>
Cc: David Miller <davem@...emloft.net>, netdev@...r.kernel.org
Subject: Re: [PATCH] af_key: parse and send SADB_X_EXT_NAT_T_OA extension
On Thu, Jan 22, 2009 at 08:54:02AM +0200, Timo Teräs wrote:
>
> That ipsec-tools feature works on *BSD. Works on Linux too
> as kernel does not (yet) use that for anything except reporting
> it back. Other OSes might use it already to e.g. fix-up the
> packet checksums in transport mode SAs; I believe Linux just
> recalculates the checksum.
Right, the reason nobody has noticed is because transport mode
NAT-T is inherently insecure (and difficult to deploy if you have
multiple peers behind one gateway) so nobody uses it in the field.
So I think there is even less reason to do this for af_key.
If you don't have the time to convert racoon, couldn't you look
at one of the *swans and use that as the basis of your work?
> The future patch I have in my mind I've been talking about,
> does make use of NAT-OA. So that's why I noticed it only
> just now. Btw, could someone comment on the idea of passing
> NAT-OA to neighbour cache and make xfrm use it when choosing
> which xfrm state to use?
I'm concerned about using NAT-OA for anything policy related
because it is impossible to authenticate or verify.
Cheers,
--
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@...dor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists