Bug 2213200
| Summary: | NetworkManager MACsec tunnel setup fails to pass traffic when connected via switch | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Adrian Tomasov <atomasov> |
| Component: | NetworkManager | Assignee: | NetworkManager Development Team <nm-team> |
| Status: | CLOSED NOTABUG | QA Contact: | Desktop QE <desktop-qa-list> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 9.2 | CC: | aokuliar, atomasov, bgalvani, jhladky, lrintel, osabart, rkhan, sukulkar, thaller, till |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-06-27 08:31:55 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Adrian Tomasov
2023-06-07 12:49:13 UTC
NetworkManager uses wpa_supplicant for configuring macsec. In particular, that is important, because wpa_supplicant does 802.1x-2010 to negotiate keys. While you can use `ip macsec` to configure some keys ad-hoc, that is not a useful without some key-management on top of it. The suggested key-management is 802.1x-2010 and wpa_supplicant. It would seem, that the switch filters out some packets for negotiating the keys. `man ip-macsec` says: > This tool can be used to configure the 802.1AE keys of the interface. Note that 802.1AE uses GCM-AES with a initialization vector (IV) derived from the packet number. The same key must not be used with the same IV more than once. Instead, keys must be frequently regenerated and distributed. This tool is thus mostly for debugging and testing, or in combination with a user-space application that reconfigures the keys. It is wrong to just configure the keys statically and assume them to work indefinitely. The suggested and standardized way for key management is 802.1X-2010, which is implemented by wpa_supplicant. Hello Thomas, thank you for the information. It could be possible that the switch somehow filters out the key-negotiation packets. We will try to recheck the switch configuration. Please correct me if I am wrong, but what I currently understand about the macsec, the connection in our test scenario should also work when NICs are connected via a "dumb" switch (no special features/macsec support on a switch). Is that correct? Or are there any extra features that must be supported and enabled on a switch? Thanks. Hello Thomas, we took a look at our Juniper switches (QFX5100, EX4550). It really seems that the switches are filtering the 802.1x (EAPOL) packets - we can see them in tcpdump. Unfortunately, we haven't found a way to disable the filtering on specific ports. I don't know, maybe we are missing some switch features/licenses. So, We will test the Macsec performance via machines where the chosen NICs will be connected directly (back-2-back). In this scenario, everything seems to work as expected. |