Bug 6791 - ports in SA should not be zeroed when protocol is specified
Summary: ports in SA should not be zeroed when protocol is specified
Status: REJECTED INVALID
Alias: None
Product: Networking
Classification: Unclassified
Component: IPV4 (show other bugs)
Hardware: i386 Linux
: P2 normal
Assignee: Herbert Xu
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-07-04 06:51 UTC by Jiri Klimes
Modified: 2006-08-15 18:44 UTC (History)
0 users

See Also:
Kernel Version: 2.6.17 and all previous
Subsystem:
Regression: ---
Bisected commit-id:


Attachments

Description Jiri Klimes 2006-07-04 06:51:51 UTC
Problem Description:
Security assotiations manipulation is defined by RFC2367 - PFKEY API.

However this specification has some drawbacks and unnecessary limitations.
(Maybe RFC2367 would deserve updating as it is rather old.)

Specifically there is a need for an IPsec SA which supports simultaneously TCP
and UDP. Such behaviour can be required by many applications and is e.g.
neccessary for authenticating in 3G according to 3GPP TS 33.203.
Current implementation of PFkey in linux (af_key.c) nethertheless doesn't
support usage of ports as SA selectors and moreover, if a protocol is specified,
the ports are zeroed.

I have found that a bug on this issue has been reported against solaris and has
been corrected - see bugID 6258318
(http://bugs.opensolaris.org/bugdatabase/view_bug.do?bug_id=6258318)
So, I would appreciate to have similar behaviour in linux as well to be competitive.
Comment 1 Andrew Morton 2006-07-04 15:39:44 UTC

Begin forwarded message:

Date: Tue, 4 Jul 2006 06:54:01 -0700
From: bugme-daemon@bugzilla.kernel.org
To: bugme-new@lists.osdl.org
Subject: [Bugme-new] [Bug 6791] New: ports in SA should not be zeroed when protocol is specified


http://bugzilla.kernel.org/show_bug.cgi?id=6791

           Summary: ports in SA should not be zeroed when protocol is
                    specified
    Kernel Version: 2.6.17 and all previous
            Status: NEW
          Severity: normal
             Owner: shemminger@osdl.org
         Submitter: klimes@centrum.cz


Problem Description:
Security assotiations manipulation is defined by RFC2367 - PFKEY API.

However this specification has some drawbacks and unnecessary limitations.
(Maybe RFC2367 would deserve updating as it is rather old.)

Specifically there is a need for an IPsec SA which supports simultaneously TCP
and UDP. Such behaviour can be required by many applications and is e.g.
neccessary for authenticating in 3G according to 3GPP TS 33.203.
Current implementation of PFkey in linux (af_key.c) nethertheless doesn't
support usage of ports as SA selectors and moreover, if a protocol is specified,
the ports are zeroed.

I have found that a bug on this issue has been reported against solaris and has
been corrected - see bugID 6258318
(http://bugs.opensolaris.org/bugdatabase/view_bug.do?bug_id=6258318)
So, I would appreciate to have similar behaviour in linux as well to be competitive.

------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

Comment 2 Herbert Xu 2006-07-11 01:06:00 UTC
The xfrm interface can already do this so please use that on Linux instead of PFKEY.

Extending PFKEY is possible but it'd be as unportable as using xfrm.  Since we
want people to use xfrm in general there is no point in extending PFKEY at this
point in time.

If there is any movement in terms of an updated PFKEY standard then we can
reconsider this.

Cheers,
Comment 3 Herbert Xu 2006-07-11 01:11:39 UTC
Actually I just noticed that in the policy part of af_key.c we preserve the port
numbers as is.  This is all you need for selecting traffic by ports.  The port
numbers in the SA selector doesn't actually matter.

Note You need to log in before you can comment on or make changes to this bug.