Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp2746833ybv; Mon, 24 Feb 2020 10:49:19 -0800 (PST) X-Google-Smtp-Source: APXvYqzYcVAcyPTUU1me3xjpX6hau1hgDmfVM9wE+vjUzf6ZPpdAbQGW7W/UNDnrzHr3jz+XOPD5 X-Received: by 2002:aca:3542:: with SMTP id c63mr355448oia.135.1582570159819; Mon, 24 Feb 2020 10:49:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582570159; cv=none; d=google.com; s=arc-20160816; b=jGLKcul5S/+j05pTvIiKiruvRxTKEWEmvquRclAWHVFIB5wjd5lC+3lPcTRnrsd0/B difetCi/xo5ruWpwQsYCTGgYhYT7QRdlj4Np/Zqm9HBulWTTlactpZB2tA2TgUM18xDz AVddSJuoRyFKLp5SJk3akyapq0A66cYAIqQvH2XLaHmcjKF0xCO2mJmhUbhDz2fVwcG6 DUsZL3pr6xApChkwOQoHJBYhQo99wwFNmUc7GGcnFATxoYdLPgYUax37iAwbDumfODxc M5mENGc7QUgbGpLLDRJMW93Cu+prYwKZ1H+Z8PK4okSPsFdkd8F05hH4JoM1XP/uJKuP Rz+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=pJp5XDCGDk9aUwwpc1G1CMFqlggFKqrq/ZzI7D1meUw=; b=Tyvx09tgWHPKkGpVpnoujifV0Rag/aToFeeECsW7YXbeLS1clyVCDzR26dDJYAu+EO NJ/LYWhOdYnFW1XNQZ25iakIpsmSdPCEvUulM3IvZBK89Vf7ityJwalaChshsiQSpRB7 g82OWpQ1xxzPYVHOf5tlYqzYYYpvvmAzQdLnF/2MP7Bh/YEe3xzTt2+J7g/gB2J/FgmL WqdX3KACL0AHOBeZr7t3R2/jP4DmZgKPEpyczRxMMh30x6ryEBBHiEwNgrhcQzfHekBy GqsVAFujbb4MXJCB8iWoZGD1/TWDPAIgZl15vdSB7dLuWp2lpTu+r8LeoKMGbe+yj9Oh jEFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t28si6362537otr.16.2020.02.24.10.49.06; Mon, 24 Feb 2020 10:49:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728068AbgBXSrd (ORCPT + 99 others); Mon, 24 Feb 2020 13:47:33 -0500 Received: from s3.sipsolutions.net ([144.76.43.62]:42446 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727797AbgBXSrd (ORCPT ); Mon, 24 Feb 2020 13:47:33 -0500 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1j6IlP-007P93-3k; Mon, 24 Feb 2020 19:47:31 +0100 Message-ID: <1a56c641eaa03c99dc9a90208902d8bb1ca1b0aa.camel@sipsolutions.net> Subject: Re: [PATCH 1/2] Revert "mac80211: support NL80211_EXT_FEATURE_CONTROL_PORT_OVER_NL80211_MAC_ADDRS" From: Johannes Berg To: Denis Kenzior , linux-wireless@vger.kernel.org Cc: Markus Theil Date: Mon, 24 Feb 2020 19:47:29 +0100 In-Reply-To: <6e723a78-db68-8ffb-986a-4a3961107f72@gmail.com> (sfid-20200224_194137_572776_5E2EB1D1) References: <20200224101910.b87da63a3cd6.Ic94bc51a370c4aa7d19fbca9b96d90ab703257dc@changeid> <53190ece697ab7d9e83fdd667eaf9e05a4418193.camel@sipsolutions.net> <6e723a78-db68-8ffb-986a-4a3961107f72@gmail.com> (sfid-20200224_194137_572776_5E2EB1D1) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.2 (3.34.2-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Mon, 2020-02-24 at 12:26 -0600, Denis Kenzior wrote: > > These are two entirely different things, preauth is simply real data as > > far as the local system is concerned. It's not related to controlled > > port operation at all, which this nl80211 API is about. > > I can understand this argument, but from what I remember, one of the > goals of the control port API was to make this legacy 'special data > packet' processing unnecessary for userspace. In other words userspace > wouldn't need to establish raw sockets. Hence my question, what is the > actual concern here? That's a question of how you define "special data packet processing"... You're defining it purely in terms of the mechanics of how you handle them, but that's not really the point. Preauth frames are _not_ special. They're entirely regular data packets as far as wifi is concerned. What _is_ special is EAPOL packets, because you may need to control their encryption, know if they were ACKed, etc. > > FWIW, you may have seen Markus's patch to remove preauth from the RX as > > well, this won't work as is, but I'm still a bit on the fence as to > > whether I'll force you into the right model or not (i.e. clear the > > existing capability bit in mac80211, and introduce a new one that > > doesn't report preauth over nl80211). For RX, however, the difference > > isn't really that much of a big deal, so maybe just make it optional. > > We're actually quite happy with the current model. So I'd like to keep > things as they are. I concede that on RX, there isn't actually really a _problem_, although it's really strange to transport what really is just data frames (from a wifi POV) over a control path ... Depending on how much complexity it adds in the kernel (I've not tried to fix that today) I guess we can keep this. I'd _prefer_ not to, but I guess I cannot convince you that the preauth model is wrong, and - mostly as a sign of how much you've worn me down - I'll probably just keep it. johannes