On Tue, Jan 2, 2018 at 2:27 PM, Johannes Berg <johannes@xxxxxxxxxxxxxxxx> wrote: > On Fri, 2017-12-29 at 12:29 -0600, Denis Kenzior wrote: > >> Agreed, requiring both attributes is less than ideal, but I tried to >> make the initial RFC as minimal as possible. It also helped that iwd >> uses SOCKET_OWNER by default. What can be done is to always set >> conn_owner_nlportid and introduce another flag that would indicate >> whether 'connection tear-down on application exit' was requested. >> >> However, my opinion is that the current SOCKET_OWNER behavior should >> just be made default, especially for control port over nl80211 >> connections, even if SOCKET_OWNER was not requested. Once the >> controlling application dies, there's no hope of salvaging the >> connection, perform rekeys, etc. > > I think we should keep both attributes; it's better to be explicit that > both are needed than to set socket-owner automatically. As I see it the problem is that SOCKET_OWNER behavior is actually two behaviors wrapped in one, ie. 1) make notifications unicast, and 2) tear-down on socket disconnect. So what is the reason for requiring this attribute. In the cover letter you mention it is for unicast notifications, but above you seem to put more weight in the tear-down behavior. From earlier discussion I recall that multicast netlink messages may not be received. Is that the reason for opting for unicast here. If so, I would suggest to mention that in the commit message. >> The biggest issue was that each driver defines a set of management >> frames it can accept via this mechanism. > > I'm not sure this is "the biggest issue", but I tend to agree with > keeping them separate. Yes. Seems like dealing with mgmt and data adds quite a bit of complexity and/or redesign. Just another note. In the cover letter it is mentioned that eapol-over-nl80211 solves some long standing races. Now the example mentioned is indeed one for which wpa_supplicant temporarily stores M1 or at least that is what I suspect you are referring to. Another issue, for which we have a hack in brcmfmac, is a race between installing the keys through nl80211 and M4 being passed through the netdev which can result in M4 being sent out encrypted. Not sure if your discussion about DONT_CRYPT is about that. Gr. AvS