diff options
| author | Jamal Hadi Salim <hadi@cyberus.ca> | 2006-04-14 18:05:16 -0400 |
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2006-04-14 18:05:16 -0400 |
| commit | b8a99520f78e23e47f9efffeb0060c1385064ff6 (patch) | |
| tree | 49dab75993e179bc97d09d582bf4f5b444b09cdb | |
| parent | 2717096ab41eacdbf07352dca6826b59470eb39a (diff) | |
[XFRM]: Add documentation for async events.
Documentation to describe asynchronous xfrm events to help people
writting HA code in user space.
Signed-off-by: Jamal Hadi Salim <hadi@cyberus.ca>
Signed-off-by: David S. Miller <davem@davemloft.net>
| -rw-r--r-- | Documentation/networking/xfrm_sync.txt | 166 |
1 files changed, 166 insertions, 0 deletions
diff --git a/Documentation/networking/xfrm_sync.txt b/Documentation/networking/xfrm_sync.txt new file mode 100644 index 000000000000..8be626f7c0b8 --- /dev/null +++ b/Documentation/networking/xfrm_sync.txt | |||
| @@ -0,0 +1,166 @@ | |||
| 1 | |||
| 2 | The sync patches work is based on initial patches from | ||
| 3 | Krisztian <hidden@balabit.hu> and others and additional patches | ||
| 4 | from Jamal <hadi@cyberus.ca>. | ||
| 5 | |||
| 6 | The end goal for syncing is to be able to insert attributes + generate | ||
| 7 | events so that the an SA can be safely moved from one machine to another | ||
| 8 | for HA purposes. | ||
| 9 | The idea is to synchronize the SA so that the takeover machine can do | ||
| 10 | the processing of the SA as accurate as possible if it has access to it. | ||
| 11 | |||
| 12 | We already have the ability to generate SA add/del/upd events. | ||
| 13 | These patches add ability to sync and have accurate lifetime byte (to | ||
| 14 | ensure proper decay of SAs) and replay counters to avoid replay attacks | ||
| 15 | with as minimal loss at failover time. | ||
| 16 | This way a backup stays as closely uptodate as an active member. | ||
| 17 | |||
| 18 | Because the above items change for every packet the SA receives, | ||
| 19 | it is possible for a lot of the events to be generated. | ||
| 20 | For this reason, we also add a nagle-like algorithm to restrict | ||
| 21 | the events. i.e we are going to set thresholds to say "let me | ||
| 22 | know if the replay sequence threshold is reached or 10 secs have passed" | ||
| 23 | These thresholds are set system-wide via sysctls or can be updated | ||
| 24 | per SA. | ||
| 25 | |||
| 26 | The identified items that need to be synchronized are: | ||
| 27 | - the lifetime byte counter | ||
| 28 | note that: lifetime time limit is not important if you assume the failover | ||
| 29 | machine is known ahead of time since the decay of the time countdown | ||
| 30 | is not driven by packet arrival. | ||
| 31 | - the replay sequence for both inbound and outbound | ||
| 32 | |||
| 33 | 1) Message Structure | ||
| 34 | ---------------------- | ||
| 35 | |||
| 36 | nlmsghdr:aevent_id:optional-TLVs. | ||
| 37 | |||
| 38 | The netlink message types are: | ||
| 39 | |||
| 40 | XFRM_MSG_NEWAE and XFRM_MSG_GETAE. | ||
| 41 | |||
| 42 | A XFRM_MSG_GETAE does not have TLVs. | ||
| 43 | A XFRM_MSG_NEWAE will have at least two TLVs (as is | ||
| 44 | discussed further below). | ||
| 45 | |||
| 46 | aevent_id structure looks like: | ||
| 47 | |||
| 48 | struct xfrm_aevent_id { | ||
| 49 | struct xfrm_usersa_id sa_id; | ||
| 50 | __u32 flags; | ||
| 51 | }; | ||
| 52 | |||
| 53 | xfrm_usersa_id in this message layout identifies the SA. | ||
| 54 | |||
| 55 | flags are used to indicate different things. The possible | ||
| 56 | flags are: | ||
| 57 | XFRM_AE_RTHR=1, /* replay threshold*/ | ||
| 58 | XFRM_AE_RVAL=2, /* replay value */ | ||
| 59 | XFRM_AE_LVAL=4, /* lifetime value */ | ||
| 60 | XFRM_AE_ETHR=8, /* expiry timer threshold */ | ||
| 61 | XFRM_AE_CR=16, /* Event cause is replay update */ | ||
| 62 | XFRM_AE_CE=32, /* Event cause is timer expiry */ | ||
| 63 | XFRM_AE_CU=64, /* Event cause is policy update */ | ||
| 64 | |||
| 65 | How these flags are used is dependent on the direction of the | ||
| 66 | message (kernel<->user) as well the cause (config, query or event). | ||
| 67 | This is described below in the different messages. | ||
| 68 | |||
| 69 | The pid will be set appropriately in netlink to recognize direction | ||
| 70 | (0 to the kernel and pid = processid that created the event | ||
| 71 | when going from kernel to user space) | ||
| 72 | |||
| 73 | A program needs to subscribe to multicast group XFRMNLGRP_AEVENTS | ||
| 74 | to get notified of these events. | ||
| 75 | |||
| 76 | 2) TLVS reflect the different parameters: | ||
| 77 | ----------------------------------------- | ||
| 78 | |||
| 79 | a) byte value (XFRMA_LTIME_VAL) | ||
| 80 | This TLV carries the running/current counter for byte lifetime since | ||
| 81 | last event. | ||
| 82 | |||
| 83 | b)replay value (XFRMA_REPLAY_VAL) | ||
| 84 | This TLV carries the running/current counter for replay sequence since | ||
| 85 | last event. | ||
| 86 | |||
| 87 | c)replay threshold (XFRMA_REPLAY_THRESH) | ||
| 88 | This TLV carries the threshold being used by the kernel to trigger events | ||
| 89 | when the replay sequence is exceeded. | ||
| 90 | |||
| 91 | d) expiry timer (XFRMA_ETIMER_THRESH) | ||
| 92 | This is a timer value in milliseconds which is used as the nagle | ||
| 93 | value to rate limit the events. | ||
| 94 | |||
| 95 | 3) Default configurations for the parameters: | ||
| 96 | ---------------------------------------------- | ||
| 97 | |||
| 98 | By default these events should be turned off unless there is | ||
| 99 | at least one listener registered to listen to the multicast | ||
| 100 | group XFRMNLGRP_AEVENTS. | ||
| 101 | |||
| 102 | Programs installing SAs will need to specify the two thresholds, however, | ||
| 103 | in order to not change existing applications such as racoon | ||
| 104 | we also provide default threshold values for these different parameters | ||
| 105 | in case they are not specified. | ||
| 106 | |||
| 107 | the two sysctls/proc entries are: | ||
| 108 | a) /proc/sys/net/core/sysctl_xfrm_aevent_etime | ||
| 109 | used to provide default values for the XFRMA_ETIMER_THRESH in incremental | ||
| 110 | units of time of 100ms. The default is 10 (1 second) | ||
| 111 | |||
| 112 | b) /proc/sys/net/core/sysctl_xfrm_aevent_rseqth | ||
| 113 | used to provide default values for XFRMA_REPLAY_THRESH parameter | ||
| 114 | in incremental packet count. The default is two packets. | ||
| 115 | |||
| 116 | 4) Message types | ||
| 117 | ---------------- | ||
| 118 | |||
| 119 | a) XFRM_MSG_GETAE issued by user-->kernel. | ||
| 120 | XFRM_MSG_GETAE does not carry any TLVs. | ||
| 121 | The response is a XFRM_MSG_NEWAE which is formatted based on what | ||
| 122 | XFRM_MSG_GETAE queried for. | ||
| 123 | The response will always have XFRMA_LTIME_VAL and XFRMA_REPLAY_VAL TLVs. | ||
| 124 | *if XFRM_AE_RTHR flag is set, then XFRMA_REPLAY_THRESH is also retrieved | ||
| 125 | *if XFRM_AE_ETHR flag is set, then XFRMA_ETIMER_THRESH is also retrieved | ||
| 126 | |||
| 127 | b) XFRM_MSG_NEWAE is issued by either user space to configure | ||
| 128 | or kernel to announce events or respond to a XFRM_MSG_GETAE. | ||
| 129 | |||
| 130 | i) user --> kernel to configure a specific SA. | ||
| 131 | any of the values or threshold parameters can be updated by passing the | ||
| 132 | appropriate TLV. | ||
| 133 | A response is issued back to the sender in user space to indicate success | ||
| 134 | or failure. | ||
| 135 | In the case of success, additionally an event with | ||
| 136 | XFRM_MSG_NEWAE is also issued to any listeners as described in iii). | ||
| 137 | |||
| 138 | ii) kernel->user direction as a response to XFRM_MSG_GETAE | ||
| 139 | The response will always have XFRMA_LTIME_VAL and XFRMA_REPLAY_VAL TLVs. | ||
| 140 | The threshold TLVs will be included if explicitly requested in | ||
| 141 | the XFRM_MSG_GETAE message. | ||
| 142 | |||
| 143 | iii) kernel->user to report as event if someone sets any values or | ||
| 144 | thresholds for an SA using XFRM_MSG_NEWAE (as described in #i above). | ||
| 145 | In such a case XFRM_AE_CU flag is set to inform the user that | ||
| 146 | the change happened as a result of an update. | ||
| 147 | The message will always have XFRMA_LTIME_VAL and XFRMA_REPLAY_VAL TLVs. | ||
| 148 | |||
| 149 | iv) kernel->user to report event when replay threshold or a timeout | ||
| 150 | is exceeded. | ||
| 151 | In such a case either XFRM_AE_CR (replay exceeded) or XFRM_AE_CE (timeout | ||
| 152 | happened) is set to inform the user what happened. | ||
| 153 | Note the two flags are mutually exclusive. | ||
| 154 | The message will always have XFRMA_LTIME_VAL and XFRMA_REPLAY_VAL TLVs. | ||
| 155 | |||
| 156 | Exceptions to threshold settings | ||
| 157 | -------------------------------- | ||
| 158 | |||
| 159 | If you have an SA that is getting hit by traffic in bursts such that | ||
| 160 | there is a period where the timer threshold expires with no packets | ||
| 161 | seen, then an odd behavior is seen as follows: | ||
| 162 | The first packet arrival after a timer expiry will trigger a timeout | ||
| 163 | aevent; i.e we dont wait for a timeout period or a packet threshold | ||
| 164 | to be reached. This is done for simplicity and efficiency reasons. | ||
| 165 | |||
| 166 | -JHS | ||
