On Sat, Jun 20, 2015 at 9:11 PM, Harsh Jain <[email protected]> wrote:
> Hi,
>
> Thanks for reply. I missed Ansis's reply "Pravin told me that he will
> look into this patch before applying".
> Patch which I sent is for 3.18.4 kernel. latest kernel branch has
> moved the code to new function.
> If needed I can send the patch for latest kernel version.
>
Sorry for late reply. I forgot to reply to your patch.
The patch is enhancement, so send the patch against latest net-next to
netdev and ovs-dev mailing list.

Thanks,
Pravin.


>
> Regards
> Harsh Jain
>
> On Sun, Jun 21, 2015 at 12:26 AM, Ben Pfaff <[email protected]> wrote:
>> If you it find more satisfying, you can file an issue in the github
>> tracker:
>>         https://github.com/openvswitch/ovs-issues/
>>
>> On Sat, Jun 20, 2015 at 09:48:39AM +0530, Harsh Jain wrote:
>>> Hi all,
>>>
>>> How to track weather bug is raised or community has ignored the
>>> issue.I have not received any mail.
>>>
>>>
>>> Regards
>>> Harsh Jain
>>>
>>> On Wed, Jun 10, 2015 at 10:35 PM, Ansis Atteka <[email protected]> wrote:
>>> > On Mon, Jun 8, 2015 at 7:57 PM, Harsh Jain <[email protected]> 
>>> > wrote:
>>> >> Hi Ansis,
>>> >>
>>> >>  I used "ip xfrm add policy" command to add policy.
>>> >
>>> >> I have not used "ovs-monitor-ipsec".Can it be used to encryt based on 
>>> >> GRE key?.
>>> > No, ovs-monitor-ipsec can't be used used to install IPsec policies
>>> > that match on GRE key.
>>> >
>>> >> I tested with GRE key value only.I will test weather Port no, based
>>> >> filtering is supported in OVS or not and revert.
>>> > Pravin told me that he will look into this patch before applying.
>>> >
>>> > One small comment - if gre KEY is not set, shouldn't we set it to 0
>>> > instead of leaving unset before performing route lookup?
>>> >
>>> >>
>>> >>
>>> >> Regards
>>> >> Harsh jain
>>> >>
>>> >>
>>> >> Regards
>>> >> Harsh Jain
>>> >>
>>> >> On Tue, Jun 9, 2015 at 2:07 AM, Ansis Atteka <[email protected]> wrote:
>>> >>> On Mon, Jun 8, 2015 at 12:19 AM, Harsh Jain <[email protected]> 
>>> >>> wrote:
>>> >>>> Hi,
>>> >>>>
>>> >>>>
>>> >>>> While trying to encrypt(IPsec policy) packets  based on GRE key
>>> >>>> received in packets. kernel didn't encrypted the packets received from
>>> >>>> OVS bridge. The packets forwarded to Desination unencrypted.
>>> >>>> Kernel treats packet having different keys as same flow type.
>>> >>>
>>> >>> It seems that you are not using ovs-monitor-ipsec to install IPsec
>>> >>> policies for you?
>>> >>>
>>> >>>>
>>> >>>>
>>> >>>> Kernel Version used : 3.18.14
>>> >>>> ovs-vswitchd (Open vSwitch) 2.0.1
>>> >>>> Compiled Apr 16 2014 14:19:17
>>> >>>> OpenFlow versions 0x1:0x1
>>> >>>>
>>> >>>> Fix Applied :  Find attached initial patch.
>>> >>>>
>>> >>>> Please confirm if it is bug?.
>>> >>>
>>> >>> I think this could be classified as bug for those use cases when one
>>> >>> wants to install such fine grained IPsec policies based on GRE key.
>>> >>> BTW I looked in ip-xfrm man page and it has more fields in SELECTOR.
>>> >>>
>>> >>>
>>> >>>>
>>> >>>>
>>> >>>> Regards
>>> >>>> Harsh Jain
>>> >>>>
>>> >>>> _______________________________________________
>>> >>>> discuss mailing list
>>> >>>> [email protected]
>>> >>>> http://openvswitch.org/mailman/listinfo/discuss
>>> >>>>
>>> _______________________________________________
>>> discuss mailing list
>>> [email protected]
>>> http://openvswitch.org/mailman/listinfo/discuss
> _______________________________________________
> discuss mailing list
> [email protected]
> http://openvswitch.org/mailman/listinfo/discuss
_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to