diff options
author | Nicolas Dichtel <nicolas.dichtel@6wind.com> | 2013-02-22 04:54:54 -0500 |
---|---|---|
committer | Steffen Klassert <steffen.klassert@secunet.com> | 2013-03-06 01:02:45 -0500 |
commit | a947b0a93efa9a25c012aa88848f4cf8d9b41280 (patch) | |
tree | ca5ccc41834e4c811e859724a184f223a3772ca7 /net/ipv6/xfrm6_mode_tunnel.c | |
parent | 6fac41157252220678b210fcb13e2c3dad7a912a (diff) |
xfrm: allow to avoid copying DSCP during encapsulation
By default, DSCP is copying during encapsulation.
Copying the DSCP in IPsec tunneling may be a bit dangerous because packets with
different DSCP may get reordered relative to each other in the network and then
dropped by the remote IPsec GW if the reordering becomes too big compared to the
replay window.
It is possible to avoid this copy with netfilter rules, but it's very convenient
to be able to configure it for each SA directly.
This patch adds a toogle for this purpose. By default, it's not set to maintain
backward compatibility.
Field flags in struct xfrm_usersa_info is full, hence I add a new attribute.
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Diffstat (limited to 'net/ipv6/xfrm6_mode_tunnel.c')
-rw-r--r-- | net/ipv6/xfrm6_mode_tunnel.c | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/net/ipv6/xfrm6_mode_tunnel.c b/net/ipv6/xfrm6_mode_tunnel.c index 9bf6a74a71d2..4770d515c2c8 100644 --- a/net/ipv6/xfrm6_mode_tunnel.c +++ b/net/ipv6/xfrm6_mode_tunnel.c | |||
@@ -49,8 +49,11 @@ static int xfrm6_mode_tunnel_output(struct xfrm_state *x, struct sk_buff *skb) | |||
49 | sizeof(top_iph->flow_lbl)); | 49 | sizeof(top_iph->flow_lbl)); |
50 | top_iph->nexthdr = xfrm_af2proto(skb_dst(skb)->ops->family); | 50 | top_iph->nexthdr = xfrm_af2proto(skb_dst(skb)->ops->family); |
51 | 51 | ||
52 | dsfield = XFRM_MODE_SKB_CB(skb)->tos; | 52 | if (x->props.extra_flags & XFRM_SA_XFLAG_DONT_ENCAP_DSCP) |
53 | dsfield = INET_ECN_encapsulate(dsfield, dsfield); | 53 | dsfield = 0; |
54 | else | ||
55 | dsfield = XFRM_MODE_SKB_CB(skb)->tos; | ||
56 | dsfield = INET_ECN_encapsulate(dsfield, XFRM_MODE_SKB_CB(skb)->tos); | ||
54 | if (x->props.flags & XFRM_STATE_NOECN) | 57 | if (x->props.flags & XFRM_STATE_NOECN) |
55 | dsfield &= ~INET_ECN_MASK; | 58 | dsfield &= ~INET_ECN_MASK; |
56 | ipv6_change_dsfield(top_iph, 0, dsfield); | 59 | ipv6_change_dsfield(top_iph, 0, dsfield); |