Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp594965imi; Thu, 21 Jul 2022 07:16:18 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tkrbZ5QHu/yD3MwaahzATleRlHIpTxx+mag2Zz/iZaz4qRvn0x0RPvOZN4yd1aPYWTXRl6 X-Received: by 2002:a17:906:84f0:b0:72b:72b6:c7b2 with SMTP id zp16-20020a17090684f000b0072b72b6c7b2mr40117542ejb.642.1658412978323; Thu, 21 Jul 2022 07:16:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658412978; cv=none; d=google.com; s=arc-20160816; b=IfRWaddT69xaS3d7tYSx1fx7llilHAHcRnUBRdcfvDXnAwuIXc+CnZLRguFaA29Q3t Jgm5HyKNjH/AJLjVrw4FxIOGZqcLx81xveAFX+PWO83/xahJT3XI71FbifIr5FZk7V5Q TPIThfS7EP1sWOciiRh6DsudSXO9t8g2lckI78SfGQnyOS3CaC0GBXHdxlup5qofHz6r 5KTp0My7IrNreVqziJ2ACX5IBhvH/rrhYd1dTDsfgW+X8foh4Cuv7iu/sm1gYoi3GbyP A/xcqk+DM77e+dv0+ejBo8wrNBCbODsiF6s+lDeO/rS9XyGVvdcqeI/6bLg47aRMLadE LQ7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=AO1GlvcSPQHdOPNES0k1UPLRvC6PrOllsEsT128vMLI=; b=lGKDUvj/EGPAXK9KF8xLNz8Sci1SU8pII5+bkORGK3oBjiUifGb4DAMOauOBPYuyIu G0M5FvsyWmInYVubYNzvsMymujl9qfR8cn7gRmYEUSB0yVrkFGN6S7FZzQroRjlZpSem ZQA/UgzR36fe+Q7NCrCEM73RH3AQEVNh/iyQhVLL99Q2ZzHTedlT5YWnGEuxWr+C5OZP Fxq8sgurIDV18E5NgM0C0/rY3Anf4lRJyJ+l/rl1oAApWcpYffumvlxTFjmrQLzXwMH9 UpdCnHojXtUPtf91vqDiw2R13qg3XiS9nN6k1dkF7t9YFqCtWjCjYOM0vxSYhfzwIN7J LlVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=pehk5KzD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sc34-20020a1709078a2200b0072f1b3ebaafsi3121471ejc.136.2022.07.21.07.15.53; Thu, 21 Jul 2022 07:16:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=pehk5KzD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231230AbiGUOIk (ORCPT + 99 others); Thu, 21 Jul 2022 10:08:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47994 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229729AbiGUOIj (ORCPT ); Thu, 21 Jul 2022 10:08:39 -0400 Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3559546DA6; Thu, 21 Jul 2022 07:08:38 -0700 (PDT) Received: by mail-wr1-x42c.google.com with SMTP id d8so2452491wrp.6; Thu, 21 Jul 2022 07:08:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AO1GlvcSPQHdOPNES0k1UPLRvC6PrOllsEsT128vMLI=; b=pehk5KzD58O/08ENd7lSRD4mx7T9HMiPOXsm6nLxCxgGJzKWLxnOuWb9/36V2baHhC jdOihHICyJYRsw386pYSSlQhr7jbegBgeaigTEOSl+oV16j7x62rM4lY1XO6vHv1X4PA Bee6VGr8GyjQOv4NL2KxJmBXWJFiRgmH0k/o27hOdUjYwUeRRWJfr+iPlybacat0VmQF iybUQWFJGRd38Us9mVSQkHfNq1AhNaHLM3Ug8K2I9xBzjsYZAQBNMPK1oZu29p2BsNp2 1x6Q3Ojh/zNVWIbIngRkNrRoLL4FCWDNEtPRTk99Aos+HoeUsmWsKAO/lAMR7D/Vs4n1 UT5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AO1GlvcSPQHdOPNES0k1UPLRvC6PrOllsEsT128vMLI=; b=XDkPoVkB7Bf5Htle17FrMq56gWgmsXfwTEjnWHg1s67/qlSwLAJueSpoy7J6rnYXw+ g8lcTo4rGfPJmeGA16XSin1URB5n/3IaSWCpNYz2utOwk8h4bPPsrU5G24z+qWUAFtwd WOZ6kLJhnviLL0BFy4Z5PT0sodii6EeAEycmSKhhjGaIsxtycU2E0zHUoR/r6o+SGjUQ zmCI96TGfJvNL3oIPYJ2STLw6/hGIgjiLd+y/gOWR1cEnyK3BDJkzQD9Ct9/9Lzr9YyZ uAxI7dRt7/QAdVuRBeNWFuKqQwd2487prVbNm/A0PDUliqDhNB06pclLWoqrcqDJZtuU XhjA== X-Gm-Message-State: AJIora+TK9p/MhZX39xmt5YjbvwLvR4A1rXFUOJtMHl8j7Ds+pvLizEs dLoA+RQRv1PqD3C1J1nLETzZQS/bfisXQCa7sps= X-Received: by 2002:a5d:42c4:0:b0:21e:2cd4:a72e with SMTP id t4-20020a5d42c4000000b0021e2cd4a72emr11435970wrr.249.1658412516553; Thu, 21 Jul 2022 07:08:36 -0700 (PDT) MIME-Version: 1.0 References: <20220717134610.k3nw6mam256yxj37@skbuf> <20220717140325.p5ox5mhqedbyyiz4@skbuf> <20220717183852.oi6yg4tgc5vonorp@skbuf> <20220721114540.ovm22rtnwqs77nfb@skbuf> In-Reply-To: <20220721114540.ovm22rtnwqs77nfb@skbuf> From: Hans S Date: Thu, 21 Jul 2022 16:06:27 +0200 Message-ID: Subject: Re: [PATCH net-next v1 1/1] net: bridge: ensure that link-local traffic cannot unlock a locked port To: Vladimir Oltean Cc: Ido Schimmel , "David S. Miller" , Jakub Kicinski , netdev@vger.kernel.org, Andrew Lunn , Vivien Didelot , Florian Fainelli , Eric Dumazet , Paolo Abeni , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Nikolay Aleksandrov , Shuah Khan , Daniel Borkmann , Hans Schultz , linux-kernel@vger.kernel.org, bridge@lists.linux-foundation.org, linux-kselftest@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 21, 2022 at 1:45 PM Vladimir Oltean wrote: > > Why is it "not really so nice" to "trigger MAB" (in fact only to learn a > locked entry on a locked port) when initiating the 802.1X session? The consideration is mostly to limit (not eliminate) double actrivation, e.g. activation of 802.1X and MAB at roughly the same time, so that the daemons will have more to do coordinating which has the session. > You can disable link-local learning via the bridge option if you're The issue here is that you can only disable it bridge wide and not per port. > really bothered by that. When you have MAB enabled on an 802.1X port, > I think it's reasonable to expect that there will be some locked entries > which user space won't ever unlock via MAB. If those entries happen to > be created as a side effect of the normal EAPOL authentication process, > I don't exactly see where is the functional problem. This shouldn't > block EAPOL from proceeding any further, because this protocol uses > link-local packets which are classified as control traffic, and that > isn't subject to FDB lookups but rather always trapped to CPU, so locked > or not, it should still be received. > > I'm only pointing out the obvious here, we need an opt in for MAB, and > the implemented behavior I've seen here kind of points to mapping this > to "+learning +locked", where the learning process creates locked FDB entries. If we need an opt in for MAB, you are right. Only then I think that we need to solve the link-local learning issue so that it is disabled per port?