Begin forwarded message:
Date: Tue, 4 Jul 2006 06:54:01 -0700 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [Bugme-new] [Bug 6791] New: ports in SA should not be zeroed when protocol is specified http://bugzilla.kernel.org/show_bug.cgi?id=6791 Summary: ports in SA should not be zeroed when protocol is specified Kernel Version: 2.6.17 and all previous Status: NEW Severity: normal Owner: [EMAIL PROTECTED] Submitter: [EMAIL PROTECTED] Problem Description: Security assotiations manipulation is defined by RFC2367 - PFKEY API. However this specification has some drawbacks and unnecessary limitations. (Maybe RFC2367 would deserve updating as it is rather old.) Specifically there is a need for an IPsec SA which supports simultaneously TCP and UDP. Such behaviour can be required by many applications and is e.g. neccessary for authenticating in 3G according to 3GPP TS 33.203. Current implementation of PFkey in linux (af_key.c) nethertheless doesn't support usage of ports as SA selectors and moreover, if a protocol is specified, the ports are zeroed. I have found that a bug on this issue has been reported against solaris and has been corrected - see bugID 6258318 (http://bugs.opensolaris.org/bugdatabase/view_bug.do?bug_id=6258318) So, I would appreciate to have similar behaviour in linux as well to be competitive. ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html