[Swan-dev] ip_range
Antony Antony
antony at phenome.org
Mon Oct 14 09:44:14 UTC 2019
On Sun, Oct 13, 2019 at 01:18:29PM -0400, Andrew Cagney wrote:
> PS:
>
> Moving the size logic out of ttorange() and into a function vis:
agree. Though I want to recored is_subet (with /) or a range (with
- ) inside the ttorange. That is important for jam_range.
> bool range_size(const ip_range *range, uintmax_t *staturated_size)
> MUST_USE_RESULT /* false if overflow */
>
> (same for converse range+offset) I think does have merit.
I have the similar idea. If the offset is variable lease the address could
begin closer to the prefix boundry.
> On Sun, 13 Oct 2019 at 12:49, Andrew Cagney <andrew.cagney at gmail.com> wrote:
> >
> > On Sun, 13 Oct 2019 at 11:04, D. Hugh Redelmeier <hugh at mimosa.com> wrote:
> > >
> > > The ip_range type seems to be used for two purposes:
> > >
> > > - traffic selectors
> >
> > The (ikev2) traffic selector code outputs an ip_subnet, not an
> > ip_range Internally it just happens to use an ip_range as part of the
> > journey towards a subnet. Like the comment points out:
in ikev2 traffic selectors it is a transient use. I tempted to leave
ip_range the same for now. Your next argument is more convincing. See
bellow.
> > /*
> > * This is not the subnet you're looking for.
> > *
> > * In libreswan ip_subnet is used to store client routing information.
> > * IKEv2 calls this traffic selectors and it allows the negotiation
> > * of:
> > *
> > * LO_ADDRESS..HI_ADDRESS : LO_PORT..HI_PORT
> > *
> > * The structures below can only handle a limited subset of this,
> > * namely:
> > *
> > * NETWORK_PREFIX | 0 / MASK : PORT
> > *
> > * where PORT==0 imples 0..65535, and (presumably) port can only be
> > * non-zero when the NETWORK_PREFIX/MASK is for a single address.
> > */
> >
> >
> >
> > > - ip address pools
> > >
> > > The two uses have diverged. Lots of complexity has been added for the
> > > address pool case which is not clearly correct or useful for the traffic
> > > selector case.
> > >
> > > Is there an RFC-based limit on range sizes for traffic selectors?
> > > If so, that should be enforced (i.e. violation should be failure,
> > > not truncation). If not, we should not trunctate them.
no. I don't think so. Libreswan and linux kernel currenly only accept a
subnet. I herd a Kernel developer, Stefeen, mumbling add kernel support for
range because in RFC IP and port are ranges.
> > >
> > > For address pools, I think that we get to set the rules. It seems to
> > > me that 2^32 is large enough. That's what our code supports. Why not
> > > treat a larger size as an actual error rather than truncating to
> > > specified range? Then a lot of truncation logic goes away. Clearly
> > > this limit must be spelled out in the documentation (perhaps it is --
> > > I haven't looked).
> >
> > This is what Antony did.
Yes.
However, there is convience factor in accepting smaller prefixes say /64,
even upto /32 and for testing purposes /1; even though size is truncated to
to 2^32-1.
> > > The routines that currently do truncation don't know whether they are
> > > dealing with a traffic selector or an address pool.
> > >
> > > I suggest that the old ip_range type be reinstated and that a new type,
> > > perhaps "pool_range", be added with the new features.
> > >
> > > The pool_range type could be composed of an ip_range and some additions.
> > >
sure. sounds good to me. I don't have a preference. I guess I will move the
.size to ip_pool and size computation a funcation as Andrew suggest.
> > > Among other things, this would allow improved modularization and
> > > better diagnostics.
-antony
More information about the Swan-dev
mailing list