Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4057919pxv; Mon, 26 Jul 2021 20:06:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxUsauMm/mFWG5qrBoygBLrAk4Pex1oaFoEySu1Wzf6nLq51ThBfKaN+rmuHGR3DizCfcdg X-Received: by 2002:a05:6402:c8a:: with SMTP id cm10mr12528933edb.192.1627355187332; Mon, 26 Jul 2021 20:06:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627355187; cv=none; d=google.com; s=arc-20160816; b=rLwJjozZUERJeYACJPriOzzTiUmxS2hUNFRg3RPzHhC9oyZ7ahAiCToANddBem0lWz glWpJPhqkbVJVSOywIv0qIZxUzL42xdKhJf50S8AqqG0wucjDY0xzdYd0tybIGXg2NS3 J/WB3qVS5pzOzMY5uCRfTUpJ0W9xRYfqbzKfQaKkleh4JNMAKTGF1sy21URGFKB42I8d KwQkYi8SkBBAipq4hPXimIyH/XdVXlo4Ipg6CPd+DuQMbs6LyF2R/CSEIyd0Opu5ElAf by/hwRVBGvqo7G46BuskQHDvaOuKT0Lv2BaEI2ksyKSvHHQbVw+SItvO8qJL11v4DBcp 6Hcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=dO+/VjmDNm/jvNfgL8TZqjssguu0SYylw+ZFTbhKfUs=; b=HXPvoO7JzWXPOAfeU4FakF9mUGUNBjAiOE4zubo7sbxRMepFit3puFcoCHFRLSM/2W S5/3cls321QYQzgsxO/LVqkSZxzMK1yQZLfYXFANGfoIRSXmoBGFUL1Tp5rbDJtCdQSB z77UkvZk5BCfLfagIrSTcrCAGtlOPYN8BtgSA1546h5IST1MxJU9YjKQpqycTUWok0P5 vUwlfhfWIQamvwVTHR2NAbHPz/OjvN5ESHH0cjYQ5mRYKhL7fwgfUnpXKOW5+XPDwxt6 7KCZ0qkomm/le2eyjeWs3pKs3PRb2edDh6J+bnMRaPNsP/NaKIOA3DPEWWaJu72Ftxqb xTNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@arista.com header.s=google header.b=hnkvf5Pt; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=arista.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g16si1623313ejt.27.2021.07.26.20.06.04; Mon, 26 Jul 2021 20:06:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@arista.com header.s=google header.b=hnkvf5Pt; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=arista.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234724AbhG0CZU (ORCPT + 99 others); Mon, 26 Jul 2021 22:25:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33222 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234727AbhG0CZT (ORCPT ); Mon, 26 Jul 2021 22:25:19 -0400 Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 38012C061764 for ; Mon, 26 Jul 2021 20:05:46 -0700 (PDT) Received: by mail-qt1-x82f.google.com with SMTP id h27so8583712qtu.9 for ; Mon, 26 Jul 2021 20:05:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dO+/VjmDNm/jvNfgL8TZqjssguu0SYylw+ZFTbhKfUs=; b=hnkvf5PtgJ9iT3a75HtWTd32Ux85xeReIjr1eqyhAUwnpNaIFXm1jBHhcDvmynqtTi sYQeIoLfecuTZLCwmwYxdVm4a5MsEjOupgr6gULzNbHmrV0l/jRkb9VhKVuFu3Y23K48 9EFDJ390fmOpkGTHhx32407CxLrCiDw+FALzHCokwXvcM0f6uRI3THTP8Ti885wqkRc4 NhJOruzjSNOJk4Wjse+i2eE+qZ9+BrmwfHCdjfNwC12EC8cYafJLWEKwzFrWnNMrT08f aI1UCA7r5iRMCpjlBB9Aq3Rao8A5vaxCmYDllXBbAbCCZvIM8ik4WiepRr4Ldi26LPYi HqDA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dO+/VjmDNm/jvNfgL8TZqjssguu0SYylw+ZFTbhKfUs=; b=ty1sscLngro3V7A31g6FxFDFDHlIF/lrDLWL8sr/buB0Vzx2DhZddRvcgc7/nCa2sA HYfSVhkZ57nixLi0GL/Coo+jYpWY73JhY0oFcNFNWHoQ9yPEeQhkkG1RbgNxcjSu3tNC AKLWVTVY2umkyNYcvgC7VSjEwKrnVHHRetIKxI5hZJ2KwSZav+f/ZHACGjRvFmZun2JO luvyPBwYkAbLM4Kf8h4XyDxPDsoKKtXU6G8p3VetW7hD6uQmdX9EcEEo4/tVuEBPfYkM fmSSS35R2F0E3sPsYcP9pPwl/L/Q53TSx31eWn2Op4ExxjQk4JxCATtRoHTOELbeoX6o v3fw== X-Gm-Message-State: AOAM531845V+veftH9o/QwOaFS08UPhwQ43up2kPV8nUUzXYK3IPK8Q/ 89sm4QFApmZVNd2LRYusx7A3wkW1nI7d1apB4skpUw== X-Received: by 2002:ac8:7773:: with SMTP id h19mr17385217qtu.184.1627355145337; Mon, 26 Jul 2021 20:05:45 -0700 (PDT) MIME-Version: 1.0 References: <01383a8751e97ef826ef2adf93bfde3a08195a43.1626693859.git.cdleonard@gmail.com> In-Reply-To: From: Francesco Ruggeri Date: Mon, 26 Jul 2021 20:05:34 -0700 Message-ID: Subject: Re: [RFC] tcp: Initial support for RFC5925 auth option To: David Ahern Cc: Leonard Crestez , Eric Dumazet , "David S. Miller" , Herbert Xu , Hideaki YOSHIFUJI , Jakub Kicinski , David Ahern , Yuchung Cheng , Mat Martineau , Christoph Paasch , Priyaranjan Jha , Kuniyuki Iwashima , Menglong Dong , open list , linux-crypto@vger.kernel.org, netdev , Salam Noureddine , Bob Gilligan , Dmitry Safonov , Francesco Ruggeri Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Leonard, thanks for taking on this task! > I'm especially interested in feedback regarding ABI and testing. I noticed that the TCP connection identifier is not part of the representation of the MKT (tcp_authopt_key_info). This could cause some issues if, for example 2 MKTs with different in the TCP connection identifier but same KeyID (recv_id) are installed on a socket. In that case tcp_authopt_inbound_key_lookup() may not pick the correct MKT for the connection. Matching incoming segments only based on recv_id may not comply with the RFC. I think there may be other cases where TCP connection identifiers may be needed to resolve conflicts, but I have to look at your patch in more detail. It would be helpful if you could split your patch into smaller incremental chunks. Francesco On Mon, Jul 26, 2021 at 6:07 PM David Ahern wrote: > > On 7/19/21 5:24 AM, Leonard Crestez wrote: > > I'm especially interested in feedback regarding ABI and testing. > > Please add tests -- both positive and negative -- to > tools/testing/selftests/net/fcnal-test.sh. That script already covers > the MD5 permutations. You can add the uapi support needed to nettest.c