Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp2866997rwe; Mon, 29 Aug 2022 01:25:09 -0700 (PDT) X-Google-Smtp-Source: AA6agR62LhArXgFx3csHgMkbBgNqbY1VaQlnrmAPjQgnG0jXwXq6g/jPs1vNZSM49S47OpDRO0Hc X-Received: by 2002:a65:5883:0:b0:42c:5f0:92f7 with SMTP id d3-20020a655883000000b0042c05f092f7mr3887109pgu.93.1661761508802; Mon, 29 Aug 2022 01:25:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661761508; cv=none; d=google.com; s=arc-20160816; b=WcRIqvEJ+RZTxF/A+ZpYmGki7zpQLdd6+6sWBidxwAqBNn4kwu0KzRzdGE84bI/LUw IszzostwssOO9LWv0maY4H01aj9RfCviRRhnW0NDqTWXQ3sWIGoVSB+90F4tGvmksQlN Nka/PyfDDDyh8iYcMjo/Htqtsl2bI2uK1G/lPiqFvRFis+bxZtY/EH+nxY+sZ12kft8n dKD63IlJuNZrkdJvA4xEESAX1ZI1oCfQUmJm1XtwR50Ud84Wj8nXsMQdqqExoutgUCsv p1g4BtcTi9MhyeCeCrUAGgnnR2bky48qI+kOAByHJG+fJaJkSb4Q3wcxMBWfyUT97IuL e+tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:message-id:user-agent :references:in-reply-to:subject:cc:to:from:date:mime-version; bh=YaIeDABoo7JeM6aEcm+r83lRD/2+upZspuIW69ML63c=; b=t7mslAjMPYdiZFUoKiDdVXkzMm1wXuYbnhnl4//h1z6b4Xv0ZoIyi9fbgtNzNuodDx Oip4O8s3oJj4mfFZMTivL5K2VEDu2WiHO8j1BYqFZ2uc12JOhj1cjmRaZBPEG2rKcdl6 zKWSsNLQ3C7zZdz/o38Y5kB0a7xzeeEHqH/Mlaaa8qsoe12Vf+He2/0+FHDPrzbvwcUz tiOCZ9GyZQLrQUp7pnU4AEZXlgHbHCznWBOsUgOjLWAGl9sC7lfAJmUcZ9/xtjBbm+m4 R/DNLc3sT5kO7b1a2x6rI7CcY8VPd0i1EsHAnqId4Av4DHCzDk+4hPD7qutBDZJGItNQ Fbzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c11-20020a63d14b000000b0041cc7bac015si8480949pgj.102.2022.08.29.01.24.57; Mon, 29 Aug 2022 01:25:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229743AbiH2IB2 (ORCPT + 99 others); Mon, 29 Aug 2022 04:01:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39242 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229493AbiH2IBX (ORCPT ); Mon, 29 Aug 2022 04:01:23 -0400 Received: from mailout-taastrup.gigahost.dk (mailout-taastrup.gigahost.dk [46.183.139.199]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2C32D1EC6F; Mon, 29 Aug 2022 01:01:21 -0700 (PDT) Received: from mailout.gigahost.dk (mailout.gigahost.dk [89.186.169.112]) by mailout-taastrup.gigahost.dk (Postfix) with ESMTP id 939241884923; Mon, 29 Aug 2022 08:01:18 +0000 (UTC) Received: from smtp.gigahost.dk (smtp.gigahost.dk [89.186.169.109]) by mailout.gigahost.dk (Postfix) with ESMTP id 6632225032B7; Mon, 29 Aug 2022 08:01:18 +0000 (UTC) Received: by smtp.gigahost.dk (Postfix, from userid 1000) id 5AE9C9EC0002; Mon, 29 Aug 2022 08:01:18 +0000 (UTC) X-Screener-Id: 413d8c6ce5bf6eab4824d0abaab02863e8e3f662 MIME-Version: 1.0 Date: Mon, 29 Aug 2022 10:01:18 +0200 From: netdev@kapio-technology.com To: Ido Schimmel Cc: davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, Florian Fainelli , Andrew Lunn , Vivien Didelot , Vladimir Oltean , Eric Dumazet , Paolo Abeni , Kurt Kanzenbach , Hauke Mehrtens , Woojung Huh , UNGLinuxDriver@microchip.com, Sean Wang , Landen Chao , DENG Qingfang , Matthias Brugger , Claudiu Manoil , Alexandre Belloni , Jiri Pirko , Ivan Vecera , Roopa Prabhu , Nikolay Aleksandrov , Shuah Khan , Christian Marangi , Daniel Borkmann , Yuwei Wang , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, bridge@lists.linux-foundation.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH v5 net-next 6/6] selftests: forwarding: add test of MAC-Auth Bypass to locked port tests In-Reply-To: References: <20220826114538.705433-1-netdev@kapio-technology.com> <20220826114538.705433-7-netdev@kapio-technology.com> <7654860e4d7d43c15d482c6caeb6a773@kapio-technology.com> User-Agent: Gigahost Webmail Message-ID: <2967ccc234bb672f5440a4b175b73768@kapio-technology.com> X-Sender: netdev@kapio-technology.com Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-08-29 09:40, Ido Schimmel wrote: > On Sun, Aug 28, 2022 at 02:00:29PM +0200, netdev@kapio-technology.com > wrote: >> On 2022-08-27 20:21, Ido Schimmel wrote: >> > On Fri, Aug 26, 2022 at 01:45:38PM +0200, Hans Schultz wrote: >> > > +locked_port_mab() >> > > +{ >> > > + RET=0 >> > > + check_locked_port_support || return 0 >> > > + >> > > + ping_do $h1 192.0.2.2 >> > > + check_err $? "MAB: Ping did not work before locking port" >> > > + >> > > + bridge link set dev $swp1 locked on >> > > + bridge link set dev $swp1 learning on >> > >> > "locked on learning on" is counter intuitive and IMO very much a >> > misconfiguration that we should have disallowed when the "locked" option >> > was introduced. It is my understanding that the only reason we are even >> > talking about it is because mv88e6xxx needs it for MAB for some reason. >> >> As the way mv88e6xxx implements "learning off" is to remove port >> association >> for ingress packets on a port, but that breaks many other things such >> as >> refreshing ATU entries and violation interrupts, so it is needed and >> the >> question is then what is the worst to have 'learning on' on a locked >> port or >> to have the locked port enabling learning in the driver silently? >> >> Opinions seem to differ. Note that even on locked ports without MAB, >> port >> association on ingress is still needed in future as I have a dynamic >> ATU >> patch set coming, that uses age out violation and hardware refreshing >> to let >> the hardware keep the dynamic entries as long as the authorized >> station is >> sending, but will age the entry out if the station keeps silent for >> the >> ageing time. But that patch set is dependent on this patch set, and I >> don't >> think I can send it before this is accepted... > > Can you explain how you envision user space to work once everything is > merged? I want to make sure we have the full picture before more stuff > is merged. From what you describe, I expect the following: > > 1. Create topology, assuming two unauthorized ports: > > # ip link add name br0 type bridge no_linklocal_learn 1 (*) > # ip link set dev swp1 master br0 > # ip link set dev swp2 master br0 > # bridge link set dev swp1 learning on locked on > # bridge link set dev swp2 learning on locked on The final decision on this rests with you I would say. Actually I forgot to remove the port association in the driver in this version. > # ip link set dev swp1 up > # ip link set dev swp2 up > # ip link set dev br0 up > > 2. Assuming h1 behind swp1 was authorized using 802.1X: > > # bridge fdb replace $H1_MAC dev swp1 master dynamic With the new MAB flag 'replace' is not needed when MAB is not enabled. > > 3. Assuming 802.1X authentication failed for h2 behind swp2, enable > MAB: > > # bridge link set dev swp2 mab on > > 4. Assuming $H2_MAC is in our allow list: > > # bridge fdb replace $H2_MAC dev swp2 master dynamic > > Learning is on in order to refresh the dynamic entries that user space > installed. Yes, port association is needed for those reasons. :-) > > (*) Need to add support for this option in iproute2. Already exposed > over netlink (see 'IFLA_BR_MULTI_BOOLOPT'). Should I do that in this patch set?