Re: [lng-odp] IPsec: handling dummy packets (NH=59)

2017-11-28 Thread Bill Fischofer
On Tue, Nov 28, 2017 at 9:28 AM, Dmitry Eremin-Solenikov < dmitry.ereminsoleni...@linaro.org> wrote: > Hello, > > On 20/11/17 18:23, Bill Fischofer wrote: > > Traffic Flow Confidentiality (TFC) is a feature of SAs according to RFC > > 4303 that must be negotiated on a per-SA basis before it is

Re: [lng-odp] IPsec: handling dummy packets (NH=59)

2017-11-28 Thread Dmitry Eremin-Solenikov
Hello, On 20/11/17 18:23, Bill Fischofer wrote: > Traffic Flow Confidentiality (TFC) is a feature of SAs according to RFC > 4303 that must be negotiated on a per-SA basis before it is used. So > This would need to be hooked into higher-level protocols. > > From an ODP perspective, it would be an

Re: [lng-odp] IPsec: handling dummy packets (NH=59)

2017-11-20 Thread Bill Fischofer
Traffic Flow Confidentiality (TFC) is a feature of SAs according to RFC 4303 that must be negotiated on a per-SA basis before it is used. So This would need to be hooked into higher-level protocols. >From an ODP perspective, it would be an additional set of parameters on the odp_ipsec_sa_create()

[lng-odp] IPsec: handling dummy packets (NH=59)

2017-11-20 Thread Dmitry Eremin-Solenikov
Hello, I was thinking about another minor part of IPsec RFCs: dummy packets used to mask traffic statistics. IPsec implementation is required to drop ESP packets with NH = 59 (no next header) on receiver side and is expected to be able to generate these packets on transmitter side. Currently we