diff options
author | Zachary Leaf <zachary.leaf@arm.com> | 2021-10-26 10:05:58 -0500 |
---|---|---|
committer | Fan Zhang <roy.fan.zhang@intel.com> | 2022-03-08 17:43:43 +0000 |
commit | 26fec718f2fa7913a484008fca7b1bc015c6efb5 (patch) | |
tree | d1ff50ea37c938f7caa4b88ca25885c13f83d4bb /test/test_sixrd.py | |
parent | 1031098b903e6eb4bca4d268350795e6827abdda (diff) |
ipsec: input: drop by default for non-matching pkts
As per IPSec RFC4301 [1], any non-matching packets should be dropped by
default. This is handled correctly in ipsec_output.c, however in
ipsec_input.c non-matching packets are allowed to pass as per a matched
BYPASS rule.
For full details, see:
https://lists.fd.io/g/vpp-dev/topic/ipsec_input_output_default/84943480
It appears the ipsec6_input_node only matches PROTECT policies. Until
this is extended to handle BYPASS + DISCARD, we may wish to not drop
by default here, since all IPv6 traffic not matching a PROTECT policy
will be dropped.
[1]: https://datatracker.ietf.org/doc/html/rfc4301
Type: fix
Signed-off-by: Zachary Leaf <zachary.leaf@arm.com>
Change-Id: Iddbfd008dbe082486d1928f6a10ffbd83d859a20
Diffstat (limited to 'test/test_sixrd.py')
0 files changed, 0 insertions, 0 deletions