Just one more question inline.

> -----Original Message-----
> From: dev <[email protected]> On Behalf Of Anoob Joseph
> Sent: Thursday, January 16, 2020 2:03 PM
> To: Ori Kam <[email protected]>; Medvedkin, Vladimir
> <[email protected]>; Ananyev, Konstantin
> <[email protected]>; Akhil Goyal <[email protected]>;
> Adrien Mazarguil <[email protected]>; Doherty, Declan
> <[email protected]>; Yigit, Ferruh <[email protected]>; Jerin
> Jacob Kollanukkaran <[email protected]>; Thomas Monjalon
> <[email protected]>
> Cc: Ankur Dwivedi <[email protected]>; Hemant Agrawal
> <[email protected]>; Matan Azrad <[email protected]>;
> Nicolau, Radu <[email protected]>; Shahaf Shuler
> <[email protected]>; Narayana Prasad Raju Athreya
> <[email protected]>; [email protected]
> Subject: Re: [dpdk-dev] [EXT] Re: [PATCH] ethdev: allow multiple security
> sessions to use one rte flow
> 
> Hi Ori,
> 
> Please see inline.
> 
> Thanks,
> Anoob
> 
> > -----Original Message-----
> > From: dev <[email protected]> On Behalf Of Ori Kam
> > Sent: Thursday, January 16, 2020 5:06 PM
> > To: Anoob Joseph <[email protected]>; Medvedkin, Vladimir
> > <[email protected]>; Ananyev, Konstantin
> > <[email protected]>; Akhil Goyal <[email protected]>;
> Adrien
> > Mazarguil <[email protected]>; Doherty, Declan
> > <[email protected]>; Yigit, Ferruh <[email protected]>; Jerin
> Jacob
> > Kollanukkaran <[email protected]>; Thomas Monjalon
> > <[email protected]>
> > Cc: Ankur Dwivedi <[email protected]>; Hemant Agrawal
> > <[email protected]>; Matan Azrad <[email protected]>;
> Nicolau,
> > Radu <[email protected]>; Shahaf Shuler <[email protected]>;
> > Narayana Prasad Raju Athreya <[email protected]>; [email protected]
> > Subject: Re: [dpdk-dev] [EXT] Re: [PATCH] ethdev: allow multiple security
> > sessions to use one rte flow
> >
> >
> >
> > > -----Original Message-----
> > > From: dev <[email protected]> On Behalf Of Anoob Joseph
> > > Sent: Tuesday, January 14, 2020 11:28 AM
> > > To: Ori Kam <[email protected]>; Medvedkin, Vladimir
> > > <[email protected]>; Ananyev, Konstantin
> > > <[email protected]>; Akhil Goyal <[email protected]>;
> > > Adrien Mazarguil <[email protected]>; Doherty, Declan
> > > <[email protected]>; Yigit, Ferruh <[email protected]>;
> > > Jerin Jacob Kollanukkaran <[email protected]>; Thomas Monjalon
> > > <[email protected]>
> > > Cc: Ankur Dwivedi <[email protected]>; Hemant Agrawal
> > > <[email protected]>; Matan Azrad <[email protected]>;
> > Nicolau,
> > > Radu <[email protected]>; Shahaf Shuler
> <[email protected]>;
> > > Narayana Prasad Raju Athreya <[email protected]>; [email protected]
> > > Subject: Re: [dpdk-dev] [EXT] Re: [PATCH] ethdev: allow multiple
> > > security sessions to use one rte flow
> > >
> > > Hi Ori,
> > >
> > > Please see inline.
> > >
> > > Thanks,
> > > Anoob
> > >
> > > > -----Original Message-----
> > > > From: Ori Kam <[email protected]>
> > > > Sent: Thursday, January 9, 2020 1:06 PM
> > > > To: Medvedkin, Vladimir <[email protected]>; Ananyev,
> > > > Konstantin <[email protected]>; Anoob Joseph
> > > > <[email protected]>; Akhil Goyal <[email protected]>; Adrien
> > > > Mazarguil <[email protected]>; Doherty, Declan
> > > > <[email protected]>; Yigit, Ferruh <[email protected]>;
> > > > Jerin Jacob Kollanukkaran <[email protected]>; Thomas Monjalon
> > > > <[email protected]>
> > > > Cc: Ankur Dwivedi <[email protected]>; Hemant Agrawal
> > > > <[email protected]>; Matan Azrad <[email protected]>;
> > Nicolau,
> > > > Radu <[email protected]>; Shahaf Shuler
> <[email protected]>;
> > > > Narayana Prasad Raju Athreya <[email protected]>;
> [email protected]
> > > > Subject: RE: [dpdk-dev] [EXT] Re: [PATCH] ethdev: allow multiple
> > > > security sessions to use one rte flow
> > > >
> > > > Hi
> > > > sorry for jumping in late.
> > > >
> > > >
> > > > > -----Original Message-----
> > > > > From: dev <[email protected]> On Behalf Of Medvedkin,
> Vladimir
> > > > > Sent: Wednesday, January 8, 2020 4:30 PM
> > > > > To: Ananyev, Konstantin <[email protected]>; Anoob
> > > Joseph
> > > > > <[email protected]>; Akhil Goyal <[email protected]>; Adrien
> > > > > Mazarguil <[email protected]>; Doherty, Declan
> > > > > <[email protected]>; Yigit, Ferruh
> > > > > <[email protected]>;
> > > Jerin
> > > > > Jacob Kollanukkaran <[email protected]>; Thomas Monjalon
> > > > > <[email protected]>
> > > > > Cc: Ankur Dwivedi <[email protected]>; Hemant Agrawal
> > > > > <[email protected]>; Matan Azrad
> <[email protected]>;
> > > > > Nicolau, Radu <[email protected]>; Shahaf Shuler
> > > > > <[email protected]>; Narayana Prasad Raju Athreya
> > > > > <[email protected]>; [email protected]
> > > > > Subject: Re: [dpdk-dev] [EXT] Re: [PATCH] ethdev: allow multiple
> > > > > security sessions to use one rte flow
> > > > >
> > > > > Hi Anoob,
> > > > >
> > > > > On 23/12/2019 13:34, Ananyev, Konstantin wrote:
> > > > > >
> > > > > >>>>>>>>>>>>>> The rte_security API which enables inline
> > > > protocol/crypto
> > > > > >>>>>>>>>>>>>> feature mandates that for every security session
> an
> > > > > rte_flow
> > > > > >>>>>>>>>>>>>> is
> > > > > >>>>> created.
> > > > > >>>>>>>>>>>>>> This would internally translate to a rule in the
> > > hardware
> > > > > >>>>>>>>>>>>>> which would do packet classification.
> > > > > >>>>>>>>>>>>>>
> > > > > >>>>>>>>>>>>>> In rte_securty, one SA would be one security
> session.
> > > > And
> > > > > if
> > > > > >>>>>>>>>>>>>> an rte_flow need to be created for every session,
> > > > > >>>>>>>>>>>>>> the
> > > > > number
> > > > > >>>>>>>>>>>>>> of SAs supported by an inline implementation
> would
> > > be
> > > > > >>>>>>>>>>>>>> limited by the number of rte_flows the PMD
> would be
> > > > > able to
> > > > > >>> support.
> > > > > >>>>>>>>>>>>>> If the fields SPI & IP addresses are allowed to be
> > > > > >>>>>>>>>>>>>> a
> > > > range,
> > > > > >>>>>>>>>>>>>> then this limitation can be overcome. Multiple
> > > > > >>>>>>>>>>>>>> flows
> > > will
> > > > > be
> > > > > >>>>>>>>>>>>>> able to use one rule for SECURITY processing. In
> > > > > >>>>>>>>>>>>>> this
> > > > case,
> > > > > >>>>>>>>>>>>>> the security session provided as conf would be
> NULL.
> > > >
> > > > Why is that?
> > > > If the rte flow can have a range then this means that we need one
> > > > security_session for the entire range, Am I missing something? As it
> > > > is stated in the rte_fow.h  security_session
> > > can
> > > > be used for multiple flows.
> > >
> > > [Anoob] One SA would mean one security_session. So if we have one
> > > security_session for the entire range, then it will be like having
> > > single SA for a range of IP & SPI. Do you think we should allow that?
> > >
> > [Ori] I'm less familiar with security, but this is what I understand you are
> trying to
> > do right?
> 
> [Anoob] Not exactly. In our implementation, h/w can index into a table which
> would hold security_sessions. So we can have one rte_flow rule, which will
> enable the packet steering in the hardware. Which session need to be used
> will be determined by the SPI.
> 
> >
> > > Also, the intent of the patch is to minimize the number of rte_flow
> > > rules required for inline ipsec processing. Since the security session
> > > is per SA, and if we need multiple SPIs to use same rte_flow rule,
> > > then the security_session field in the rte_flow rule need to be NULL.
> > > Having a non-zero security_session when SPI is a range would be
> incorrect.
> > >
> > [Ori] I'm all in favor decreasing number of flows.
> > Sorry for the basic question, what is the security_session /SA dependent
> on?
> 
> [Anoob] No prob! In case of unicast IPsec, every SA would have a unique SPI.
> So we cannot have multiple SPI's referring to the same SA. And one SA would
> mean one security_session.
> 
> > Can one SA include number of different SPI?
> 
> [Anoob] No.
> 
> May be we need to reimagine this.
> 
> Currently, an rte_flow with SECURITY enables ipsec processing with a specific
> security_session on the packet. This is enabled on a specific IP/SPI specified
> in the rule.
> 
> My proposal: an rte_flow with SECURITY (and session = NULL), would enable
> ipsec processing on a range and SPI from the packet can be used by the h/w
> to further figure out the security_session.

O.K. so SPI can't be shared between SA (Security_session) while IP can right?
Other why to ask my question is what is allowed to be in range to allow the 
same 
security_session?

<Snip>

Reply via email to