Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Aug 2007 13:10:09 -0700
From:      "Kip Macy" <kip.macy@gmail.com>
To:        "Andrew Gallatin" <gallatin@cs.duke.edu>
Cc:        freebsd-current@freebsd.org
Subject:   Re: IPSEC disables TSO
Message-ID:  <b1fa29170708161310o5578bbc6s7b2149f9b33d3507@mail.gmail.com>
In-Reply-To: <18116.44624.144286.621286@grasshopper.cs.duke.edu>
References:  <18116.43755.107638.103132@grasshopper.cs.duke.edu> <b1fa29170708161253q6c96f8b7k6fd807b93460fd02@mail.gmail.com> <b1fa29170708161256v281889bcka9325164c1242d9d@mail.gmail.com> <18116.44624.144286.621286@grasshopper.cs.duke.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
>
> Yes, exactly, there needs to be a smarter test that can distingiush if
> IPSEC is actually in use on a connection or not; I should have been
> more clear about this.  The problem is that I have zero knowledge
> about IPSEC, so I have no idea how to do this.
>
> I'm worried that people will compile IPSEC into the kernel to run an
> encrypted tunnel (or the TCP MD5 signature stuff for BGP), and
> then be rather surprised that their their "normal" TCP performance
> stinks.

Maybe file it as a PR?

-Kip



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?b1fa29170708161310o5578bbc6s7b2149f9b33d3507>