Skip to content
Commit 2d151d39 authored by Steffen Klassert's avatar Steffen Klassert
Browse files

xfrm: Add possibility to set the default to block if we have no policy



As the default we assume the traffic to pass, if we have no
matching IPsec policy. With this patch, we have a possibility to
change this default from allow to block. It can be configured
via netlink. Each direction (input/output/forward) can be
configured separately. With the default to block configuered,
we need allow policies for all packet flows we accept.
We do not use default policy lookup for the loopback device.

v1->v2
 - fix compiling when XFRM is disabled
- Reported-by: default avatarkernel test robot <lkp@intel.com>

Co-developed-by: default avatarChristian Langrock <christian.langrock@secunet.com>
Signed-off-by: default avatarChristian Langrock <christian.langrock@secunet.com>
Co-developed-by: default avatarAntony Antony <antony.antony@secunet.com>
Signed-off-by: default avatarAntony Antony <antony.antony@secunet.com>
Signed-off-by: default avatarSteffen Klassert <steffen.klassert@secunet.com>
parent f8fdadef
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment