AAScratch: Difference between revisions

From Libreswan
Jump to navigation Jump to search
No edit summary
No edit summary
Line 26: Line 26:
* 2015 [https://lwn.net/Articles/647516/ LWN virtio]
* 2015 [https://lwn.net/Articles/647516/ LWN virtio]


== Linux Kernel space developments ==  
== IPsec and Linux Kernel developments ==
* XFRM Offload : starting 4.14  
* XFRM Offload : starting 4.14  
   * NAT support ???  
   * NAT support ???  
Line 34: Line 34:
   * idea presentation [http://vger.kernel.org/netconf2019_files/xfrm_xdp.pdf Steffen Klassert] Linux Netconf, Boston, June, 2019
   * idea presentation [http://vger.kernel.org/netconf2019_files/xfrm_xdp.pdf Steffen Klassert] Linux Netconf, Boston, June, 2019


== VPP + DPDK IPsec (Userspace stack) ==
* XFRM pCPU prototype [https://libreswan.org/wiki/XFRM_pCPU experimental] 
 
== Userspace Stacks VPP + DPDK IPsec (Userspace stack) ==
* https://wiki.fd.io/view/VPP/IPSec_and_IKEv2
* https://wiki.fd.io/view/VPP/IPSec_and_IKEv2
* [https://archive.fosdem.org/2019/schedule/event/userspace_network_stacks User-space Network Stacks (DPDK and friends)] 2019
* [https://archive.fosdem.org/2019/schedule/event/userspace_network_stacks User-space Network Stacks (DPDK and friends)] 2019

Revision as of 14:55, 7 June 2020

Antony's unsorted pages I want access quickly, related to libreswan, when think I know this page exist where is it. Someone moved it renamed ..

virtiofs replace 9pfs: libvirt 6.2, qemu 5.0, kernel 5.4

KVM/QEMU + vsock to replace 9pfs

KVM support for vsock and nfs support could have a better performance than 9pfs. This work could be interesting to libreswan KVM testing. It started in 2015. Slowly picking up, as 2018 it seems AWS and firecracker is pushing it. We are almost there.

IPsec and Linux Kernel developments

  • XFRM Offload : starting 4.14
 * NAT support ??? 
 * What if the interface is a bridge? can libreswan/strongswan configure SA correctly? bridge
 * what if the packets arrive on different interface would that get decrypted correctly?  
  • XFRM and XDP
 * idea presentation Steffen Klassert Linux Netconf, Boston, June, 2019

Userspace Stacks VPP + DPDK IPsec (Userspace stack)

iptable rule to drop IKEv2 message id X

https://unix.stackexchange.com/questions/321252/drop-a-packet-depending-on-its-options-or-type