lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <AFA62E3B-313C-4ECD-BA28-3543635136EE@inf-net.nl>
Date:	Wed, 14 Aug 2013 08:40:46 +0200
From:	Teco Boot <teco@...-net.nl>
To:	David Miller <davem@...emloft.net>
Cc:	hannes@...essinduktion.org, netdev@...r.kernel.org,
	David Lamparter <equinox@...c24.net>,
	Lorenzo Colitti <lorenzo@...gle.com>,
	Dave Taht <dave.taht@...il.com>, Ole Troan <ot@...co.com>
Subject: Re: [PATCH net] ipv6: don't stop backtracking in fib6_lookup_1 if subtree does not match

Thanks for status update.

For the record: yes, source address dependent routing has my interest. I'm not feeling lonely at all.
There is a draft for this: http://tools.ietf.org/html/draft-troan-homenet-sadr-00
Most (if not all) Linux implementations use the IP RULES hack to implement.
Lorenzo Colitti heard from David Lamparter the: "Linux IPv6 source routing code (the mythical CONFIG_IPV6_SUBTREES?) to work on 3.8": http://www.ietf.org/mail-archive/web/homenet/current/msg02964.html
Few follow-ups were posted, also by David: http://www.ietf.org/mail-archive/web/homenet/current/msg02966.html
This triggered me using that code. But it was broken !!! Discussed this with Matthieu Boutier and Juliusz Chroboczek, they faced same problem and therefore also used the IP RULES hack in their implementation. http://www.ietf.org/id/draft-boutier-homenet-source-specific-routing-00.txt
So I reported the bug. David Lamparter worked on a fix, Hannes completed it. So far so good.
Also, Dave Taht reported the issue and made us aware on lots of patches making the IP RULES hack less painful. 
http://www.ietf.org/mail-archive/web/homenet/current/msg03019.html

FYI, I tested the patch from Hannes on current Ubuntu with 3.8.0.28. Due to other "fixes" this kernel is broken. Bad to make this available to Ubuntu users. So yes, I understand fixes must be tested before getting into stable. Therefore I double-checked this IPV6_SUBTREES fix. 

Now we have to decide what to do. Wait to get the fix in the wild for some time and continue with the IP RULES hack, implemented in today's experimental SADR implementations. Or start using the more elegant IPV6_SUBTREES method. I vote for the latter. I cannot see a reason for delay. Current situation is bad enough.

What can I do to make progress? Spam Linus?

Thanks, Teco


Op 13 aug. 2013, om 10:15 heeft David Miller <davem@...emloft.net> het volgende geschreven:

> From: Teco Boot <teco@...-net.nl>
> Date: Tue, 13 Aug 2013 10:02:08 +0200
> 
>> It is an important element in my work for v6 multi-homed networks
>> (IETF Homenet WG).
> 
> You are one person.  -stable inclusion is decided based how important the
> fix is to everyone in both good (fixes a bug) and bad (might cause a
> regression) terms.
> 
> So "this is important for my work" is never a good reason for a patch
> to be included into -stable.
> 
> To convince us, you're going to have to present an argument that
> exists outside the very limited scope of your own self-interests.
> And "other people might/will use my important work in the future"
> is not sufficient either.
> 
> Thanks.
> 

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ