Subject: Re: IPv4 fast routing versus IPSEC
To: None <itojun@iijlab.net, tech-net@netbsd.org>
From: Thor Lancelot Simon <tls@rek.tjls.com>
List: tech-net
Date: 02/24/2003 20:06:12
On Tue, Feb 25, 2003 at 10:03:03AM +0900, itojun@iijlab.net wrote:
> >>>| date: 1999/10/26 09:53:17;  author: itojun;  state: Exp;  lines: +6 -1
> >>>| disable ipflow (IPv4 fast fowarding) when IPsec is configured into the kernel.
> >>> Why is this the case?
> 
> 	ipsec policy engine is some sort of packet filter.  it is not friendly
> 	with ipflow.  for instance, if some traffic hits ipflow cache, it won't
> 	be encrypted.

Hm.  Perhaps a good solution would be:

1) Cache policy engine decision per-flow in ipflow
2) Notify ipflow from the policy engine when new policies are loaded; even
   the coarse action of clearing all current flow state should suffice, and
   be better than the current state of affairs; on most systems, policies
   don't change all that often.

What do you think?

-- 
 Thor Lancelot Simon	                                      tls@rek.tjls.com
   But as he knew no bad language, he had called him all the names of common
 objects that he could think of, and had screamed: "You lamp!  You towel!  You
 plate!" and so on.              --Sigmund Freud