Section 3.1.6 of RFC 2367 clearly indicates there are two 
cases in which user space programs can send the kernel PF_KEY 
messages.  The first case is just the 'struct sadb_msg' 
header that should specify an error relating to a previous 
acquire message.  I don't think the other case is implemented 
in the Linux kernel - I have reprinted the relevant portion 
of the RFC below:

------------------
   The third is where an application-layer consumer of security
   associations (e.g.  an OSPFv2 or RIPv2 daemon) needs a security
   association.

        Send an SADB_ACQUIRE message from a user process to the kernel.

        <base, address(SD), (address(P),) (identity(SD),) (sensitivity,)
proposal>

        The kernel returns an SADB_ACQUIRE message to registered sockets.

        <base, address(SD), (address(P),) (identity(SD),) (sensitivity,)
proposal>

        The user-level consumer waits for an SADB_UPDATE or SADB_ADD
        message for its particular type, and then can use that
        association by using SADB_GET messages.
----------

Now for the barrage of questions:
Was this omitted for a reason?
Are we aware this was omitted?
Does someone already have a patch?
Would a patch be accepted for 2.6.13 if it is sent in time?  
This is a bug after all.

Cheers,
Thomas
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to