ipsec: Allow SAs with NULL auth &crypto on IPSec interface 82/29282/2
authorNeale Ranns <nranns@cisco.com>
Wed, 7 Oct 2020 13:58:56 +0000 (13:58 +0000)
committerDamjan Marion <dmarion@me.com>
Thu, 8 Oct 2020 06:20:47 +0000 (06:20 +0000)
commit970187bd969631da3e81d9bb1691ab88a997f79e
treeaf2f97c88098f06444434c2678196d9b4f36875c
parent21fb4f71ee3824c8f177045f21fea258ece602a9
ipsec: Allow SAs with NULL auth &crypto on IPSec interface

Type: improvement

on the dedicated IPSec interface, the SA describes the peer, so it is
not possible to forward to a peer for which there is no SA. Therefore if
an SA is added with NULL auth and integ then this explicitly states that
this is what the peer desires.
on the contrary on the IP-IP/GRE interface, in the absence of protection
and an SA, then the traffic is sent in the clear. So adding NULL
auth/crypto iSA is a means to describe that the peer should not be sent
traffic.

Signed-off-by: Neale Ranns <nranns@cisco.com>
Change-Id: I7ad2d466cc74eb7ff8c4c84e0d7897d06e2fcf86
src/vnet/ipsec/ipsec_tun.c
test/test_ipsec_tun_if_esp.py