Anurag Maskey writes:
> Rather than using the nwam-ESSID-BSSID as it currently does, nwam will 
> create a MD5/SHA1 (which one?) hash of the name(s) that it will use for 
> the names of secure objects.  The name is be "nwam_hash".  If the 
> tunable nwamd/strict_bssid from CR 6773627 is set, then the hash will be 
> of the string "ESSID-BSSID" ('-' between the two values), otherwise the 
> hash will be just "ESSID".  Since libdladm has a length restriction of 
> DLD_SECOBJ_NAME_MAX (32) on the names, only the first 27 from the 
> characters from the hash will be used in the secobj name.

Does this mean that when I set or reset strict_bssid, I lose my keys?

The current NWAM code still differentiates on BSSID, even after CR
6773627.  I haven't redesigned that.  I'm not so sure that new flag
should affect how key objects are named.

> The second situation is where there are secobjs already out there that 
> don't follow the character restrictions (either through nwam or dladm).  
> These could contain @*% and other characters.  These secobj's should 
> still be allowed to be loaded by dladm, and used by both dladm and 
> NWAM.  Thus, NWAM will need to failover to the current nwam-ESSID-BSSID 
> naming scheme if the new nwam_hash scheme fails when it tries to connect 
> to a WEP/WPA network. 

I'd rather see the start-up script for the 'network/physical:nwam' SMF
service search for those old secobj values and rename them.  (Too bad
there's no 'rename-secobj' function ...)

Failing that, continuing to use use the object under the old name if
it's found (but never creating new ones that way) seems ok.

-- 
James Carlson, Solaris Networking              <[EMAIL PROTECTED]>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677
_______________________________________________
networking-discuss mailing list
[email protected]

Reply via email to