Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Herbert Poetzl
On Sun, Dec 10, 2006 at 01:34:14AM +0300, Kir Kolyshkin wrote: > Herbert Poetzl wrote: > >On Fri, Dec 08, 2006 at 10:13:48PM -0800, Andrew Morton wrote: > > > >> > >>It's actually happening quite gradually and carefully. > >> > > > >hmm, I must have missed a testing phase for the > >IPC names

Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Kir Kolyshkin
Herbert Poetzl wrote: On Fri, Dec 08, 2006 at 10:13:48PM -0800, Andrew Morton wrote: It's actually happening quite gradually and carefully. hmm, I must have missed a testing phase for the IPC namespace then, not that I think it is broken (well, maybe it is, we do not know yet) You

Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Dmitry Mishin
On Saturday 09 December 2006 09:35, Herbert Poetzl wrote: > On Fri, Dec 08, 2006 at 10:13:48PM -0800, Andrew Morton wrote: > > On Sat, 9 Dec 2006 04:50:02 +0100 > > Herbert Poetzl <[EMAIL PROTECTED]> wrote: > > > > > On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: > > > > Herber

Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Herbert Poetzl
On Sat, Dec 09, 2006 at 12:27:34PM +0100, Tomasz Torcz wrote: > On Sat, Dec 09, 2006 at 04:50:02AM +0100, Herbert Poetzl wrote: > > On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: > > > Herbert Poetzl <[EMAIL PROTECTED]> writes: > > > > > > >> But, ok, it is not the real point t

Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Tomasz Torcz
On Sat, Dec 09, 2006 at 04:50:02AM +0100, Herbert Poetzl wrote: > On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: > > Herbert Poetzl <[EMAIL PROTECTED]> writes: > > > > >> But, ok, it is not the real point to argue so much imho > > >> and waste our time instead of doing things.

Re: [Devel] Re: Network virtualization/isolation

2006-12-09 Thread Eric W. Biederman
Herbert Poetzl <[EMAIL PROTECTED]> writes: > On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: >> Herbert Poetzl <[EMAIL PROTECTED]> writes: >> >> >> But, ok, it is not the real point to argue so much imho >> >> and waste our time instead of doing things. > >> > well, IMHO bette

Re: [Devel] Re: Network virtualization/isolation

2006-12-08 Thread Herbert Poetzl
On Fri, Dec 08, 2006 at 10:13:48PM -0800, Andrew Morton wrote: > On Sat, 9 Dec 2006 04:50:02 +0100 > Herbert Poetzl <[EMAIL PROTECTED]> wrote: > > > On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: > > > Herbert Poetzl <[EMAIL PROTECTED]> writes: > > > > > > >> But, ok, it is no

Re: [Devel] Re: Network virtualization/isolation

2006-12-08 Thread Andrew Morton
On Sat, 9 Dec 2006 04:50:02 +0100 Herbert Poetzl <[EMAIL PROTECTED]> wrote: > On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: > > Herbert Poetzl <[EMAIL PROTECTED]> writes: > > > > >> But, ok, it is not the real point to argue so much imho > > >> and waste our time instead of

Re: [Devel] Re: Network virtualization/isolation

2006-12-08 Thread Herbert Poetzl
On Fri, Dec 08, 2006 at 12:57:49PM -0700, Eric W. Biederman wrote: > Herbert Poetzl <[EMAIL PROTECTED]> writes: > > >> But, ok, it is not the real point to argue so much imho > >> and waste our time instead of doing things. > > well, IMHO better talk (and think) first, then implement > > somethi

Re: [Devel] Re: Network virtualization/isolation

2006-12-08 Thread Eric W. Biederman
Herbert Poetzl <[EMAIL PROTECTED]> writes: >> But, ok, it is not the real point to argue so much imho and waste our >> time instead of doing things. > > well, IMHO better talk (and think) first, then implement > something ... not the other way round, and then start > fixing up the mess ... Well w

Re: [Devel] Re: Network virtualization/isolation

2006-12-06 Thread Herbert Poetzl
On Wed, Dec 06, 2006 at 02:54:16PM +0300, Kirill Korotaev wrote: > >>>If there is a better and less intrusive while still being obvious > >>>method I am all for it. I do not like the OpenVZ thing of doing the > >>>lookup once and then stashing the value in current and the special > >>>casing the e

Re: [Devel] Re: Network virtualization/isolation

2006-12-06 Thread Kirill Korotaev
>>>If there is a better and less intrusive while still being obvious >>>method I am all for it. I do not like the OpenVZ thing of doing the >>>lookup once and then stashing the value in current and the special >>>casing the exceptions. >> >>Why? > > > I like it when things are obvious and not im

Re: Network virtualization/isolation

2006-12-04 Thread Daniel Lezcano
Dmitry Mishin wrote: On Monday 04 December 2006 19:43, Herbert Poetzl wrote: On Mon, Dec 04, 2006 at 06:19:00PM +0300, Dmitry Mishin wrote: On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: Ok. Just a quick summary of where I see the discussion. We all agree that L2 isolation is nee

Re: Network virtualization/isolation

2006-12-04 Thread Herbert Poetzl
On Mon, Dec 04, 2006 at 08:02:48PM +0300, Dmitry Mishin wrote: > On Monday 04 December 2006 19:43, Herbert Poetzl wrote: > > On Mon, Dec 04, 2006 at 06:19:00PM +0300, Dmitry Mishin wrote: > > > On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: > > > > Ok. Just a quick summary of where I s

Re: Network virtualization/isolation

2006-12-04 Thread Dmitry Mishin
On Monday 04 December 2006 19:43, Herbert Poetzl wrote: > On Mon, Dec 04, 2006 at 06:19:00PM +0300, Dmitry Mishin wrote: > > On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: > > > Ok. Just a quick summary of where I see the discussion. > > > > > > We all agree that L2 isolation is needed

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
Herbert Poetzl <[EMAIL PROTECTED]> writes: > On Mon, Dec 04, 2006 at 06:19:00PM +0300, Dmitry Mishin wrote: >> On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: >> > Ok. Just a quick summary of where I see the discussion. >> > >> > We all agree that L2 isolation is needed at some point.

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
Dmitry Mishin <[EMAIL PROTECTED]> writes: > On Monday 04 December 2006 18:35, Eric W. Biederman wrote: > [skip] >> Where and when you look to find the network namespace that applies to >> a packet is the primary difference between the OpenVZ L2 >> implementation and my L2 implementation. >> >> If

Re: Network virtualization/isolation

2006-12-04 Thread Herbert Poetzl
On Mon, Dec 04, 2006 at 06:19:00PM +0300, Dmitry Mishin wrote: > On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: > > Ok. Just a quick summary of where I see the discussion. > > > > We all agree that L2 isolation is needed at some point. > As we all agreed on this, may be it is time to

Re: Network virtualization/isolation

2006-12-04 Thread Dmitry Mishin
On Monday 04 December 2006 18:35, Eric W. Biederman wrote: [skip] > Where and when you look to find the network namespace that applies to > a packet is the primary difference between the OpenVZ L2 > implementation and my L2 implementation. > > If there is a better and less intrusive while still bei

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
Dmitry Mishin <[EMAIL PROTECTED]> writes: > On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: >> Ok. Just a quick summary of where I see the discussion. >> >> We all agree that L2 isolation is needed at some point. > As we all agreed on this, may be it is time to send patches one-by-one?

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
jamal <[EMAIL PROTECTED]> writes: > On Mon, 2006-04-12 at 05:15 -0700, Eric W. Biederman wrote: >> jamal <[EMAIL PROTECTED]> writes: >> > >> Containers are a necessary first step to getting migration and > checkpoint/restart >> assistance from the kernel. > > Isnt it like a MUST have if you are d

Re: Network virtualization/isolation

2006-12-04 Thread Dmitry Mishin
On Sunday 03 December 2006 19:00, Eric W. Biederman wrote: > Ok. Just a quick summary of where I see the discussion. > > We all agree that L2 isolation is needed at some point. As we all agreed on this, may be it is time to send patches one-by-one? For the beggining, I propose to resend Cedric's e

Re: Network virtualization/isolation

2006-12-04 Thread jamal
On Mon, 2006-04-12 at 05:15 -0700, Eric W. Biederman wrote: > jamal <[EMAIL PROTECTED]> writes: > > Containers are a necessary first step to getting migration and > checkpoint/restart > assistance from the kernel. Isnt it like a MUST have if you are doing things from scratch instead of it being

Re: Network virtualization/isolation

2006-12-04 Thread jamal
Daniel, On Mon, 2006-04-12 at 11:18 +0100, Daniel Lezcano wrote: > Hi Jamal, > Currently, there are some resources moved to a namespace relative > access, the IPC and the utsname and this is into the 2.6.19 kernel. > The work on the pid namespace is still in progress. > > The idea is to use a

Re: Network virtualization/isolation

2006-12-04 Thread Eric W. Biederman
jamal <[EMAIL PROTECTED]> writes: > I have removed the Re: just to add some freshness to the discussion > > So i read quickly the rest of the discussions. I was almost suprised to > find that i agree with Eric on a lot of opinions (we also agree that > vindaloo is good for you i guess);-> > The tw

Re: Network virtualization/isolation

2006-12-04 Thread Daniel Lezcano
Hi Jamal, thanks for taking the time read the document. The objective of the document was not to convince one approach is better than other. I wanted to show the pros and the cons of each approach and to point that the 2 approaches are complementary. Currently, there are some resources moved

Re: Network virtualization/isolation

2006-12-03 Thread jamal
On Sun, 2006-03-12 at 17:37 +0100, Herbert Poetzl wrote: > On Sun, Dec 03, 2006 at 07:26:02AM -0500, jamal wrote: > To use an extreme example: if i picked apache as a > > binary compiled 10 years ago, it will run on the L2 approach but not on > > the L3 approach. Is this understanding correct? I

Re: Network virtualization/isolation

2006-12-03 Thread Herbert Poetzl
On Sun, Dec 03, 2006 at 07:26:02AM -0500, jamal wrote: > On Wed, 2006-14-11 at 16:17 +0100, Daniel Lezcano wrote: > > The attached document describes the network isolation at the layer 2 > > and at the layer 3 .. > > Daniel, > > I apologize for taking this long to get back to you. The document (I

Re: Network virtualization/isolation

2006-12-03 Thread Eric W. Biederman
Ok. Just a quick summary of where I see the discussion. We all agree that L2 isolation is needed at some point. The approaches discussed for L2 and L3 are sufficiently orthogonal that we can implement then in either order. You would need to unshare L3 to unshare L2, but if we think of them as

Re: Network virtualization/isolation

2006-12-03 Thread jamal
On Wed, 2006-14-11 at 16:17 +0100, Daniel Lezcano wrote: > The attached document describes the network isolation at the layer 2 > and at the layer 3 .. Daniel, I apologize for taking this long to get back to you. The document (I hope) made it clear to me at least the difference between the two ap

Re: Network virtualization/isolation

2006-12-02 Thread Kari Hurtta
Kari Hurtta <[EMAIL PROTECTED]> writes in gmane.linux.network: > [EMAIL PROTECTED] (Eric W. Biederman) writes in gmane.linux.network: > > > Ok. So on this point we agree. Full isolation at the network device/L2 > > level > > is desirable and no one is opposed to that. > > > > There is however

Re: Network virtualization/isolation

2006-12-02 Thread Kari Hurtta
[EMAIL PROTECTED] (Eric W. Biederman) writes in gmane.linux.network: > Ok. So on this point we agree. Full isolation at the network device/L2 level > is desirable and no one is opposed to that. > > There is however a strong feeling especially for the case of application > containers that someth

Re: [Devel] Re: Network virtualization/isolation

2006-11-30 Thread Herbert Poetzl
On Thu, Nov 30, 2006 at 05:38:16PM +0100, Daniel Lezcano wrote: > Vlad Yasevich wrote: > > Daniel Lezcano wrote: > >> Brian Haley wrote: > >>> Eric W. Biederman wrote: > I think for cases across network socket namespaces it should > be a matter for the rules, to decide if the connection s

Re: [Devel] Re: Network virtualization/isolation

2006-11-30 Thread Daniel Lezcano
Vlad Yasevich wrote: Daniel Lezcano wrote: Brian Haley wrote: Eric W. Biederman wrote: I think for cases across network socket namespaces it should be a matter for the rules, to decide if the connection should happen and what error code to return if the connection does not happen. There is a

Re: [Devel] Re: Network virtualization/isolation

2006-11-30 Thread Vlad Yasevich
Daniel Lezcano wrote: > Brian Haley wrote: >> Eric W. Biederman wrote: >>> I think for cases across network socket namespaces it should >>> be a matter for the rules, to decide if the connection should >>> happen and what error code to return if the connection does not >>> happen. >>> >>> There is

Re: [Devel] Re: Network virtualization/isolation

2006-11-29 Thread Daniel Lezcano
Brian Haley wrote: Eric W. Biederman wrote: I think for cases across network socket namespaces it should be a matter for the rules, to decide if the connection should happen and what error code to return if the connection does not happen. There is a potential in this to have an ambiguous case w

Re: Network virtualization/isolation

2006-11-29 Thread Brian Haley
Eric W. Biederman wrote: I think for cases across network socket namespaces it should be a matter for the rules, to decide if the connection should happen and what error code to return if the connection does not happen. There is a potential in this to have an ambiguous case where two application

Re: Network virtualization/isolation

2006-11-28 Thread Herbert Poetzl
On Tue, Nov 28, 2006 at 09:26:52PM +0100, Daniel Lezcano wrote: > Eric W. Biederman wrote: > > I do not want to get into a big debate on the merits of various > > techniques at this time. We seem to be in basic agreement > > about what we are talking about. > > > > There is one thing I think

Re: Network virtualization/isolation

2006-11-28 Thread Herbert Poetzl
On Tue, Nov 28, 2006 at 02:50:03PM -0700, Eric W. Biederman wrote: > Daniel Lezcano <[EMAIL PROTECTED]> writes: > > > Eric W. Biederman wrote: > >> I do not want to get into a big debate on the merits of various > >> techniques at this time. We seem to be in basic agreement > >> about what we are

Re: Network virtualization/isolation

2006-11-28 Thread Eric W. Biederman
Daniel Lezcano <[EMAIL PROTECTED]> writes: > Eric W. Biederman wrote: >> I do not want to get into a big debate on the merits of various >> techniques at this time. We seem to be in basic agreement >> about what we are talking about. >> >> There is one thing I think we can all agree upon. >> - Ev

Re: Network virtualization/isolation

2006-11-28 Thread Daniel Lezcano
Eric W. Biederman wrote: > I do not want to get into a big debate on the merits of various > techniques at this time. We seem to be in basic agreement > about what we are talking about. > > There is one thing I think we can all agree upon. > - Everything except isolation at the network device/L2

Re: Network virtualization/isolation

2006-11-28 Thread Herbert Poetzl
On Tue, Nov 28, 2006 at 09:51:57AM -0700, Eric W. Biederman wrote: > > I do not want to get into a big debate on the merits of various > techniques at this time. We seem to be in basic agreement > about what we are talking about. > > There is one thing I think we can all agree upon. > - Everythi

Re: Network virtualization/isolation

2006-11-28 Thread Eric W. Biederman
I do not want to get into a big debate on the merits of various techniques at this time. We seem to be in basic agreement about what we are talking about. There is one thing I think we can all agree upon. - Everything except isolation at the network device/L2 layer, does not allow guests to ha

Re: Network virtualization/isolation

2006-11-28 Thread Daniel Lezcano
Eric W. Biederman wrote: [ snip ] The packets arrive to the real device and go through the routes engine. From this point, the used route is enough to know to which container the traffic can go and the sockets subset assigned to the container. Note this has potentially the highest overhead o

Re: Network virtualization/isolation

2006-11-26 Thread Eric W. Biederman
Herbert Poetzl <[EMAIL PROTECTED]> writes: > On Sat, Nov 25, 2006 at 01:21:39AM -0700, Eric W. Biederman wrote: >> There are two techniques in real use. >> - Bind/Accept filtering >> >> Which layer 3 addresses a socket can bind/accept are filtered, >> but otherwise the network stack remains

Re: Network virtualization/isolation

2006-11-26 Thread Ben Greear
Herbert Poetzl wrote: On Sat, Nov 25, 2006 at 01:21:39AM -0700, Eric W. Biederman wrote: Then the question is how do we reduce the overhead when we don't have enough physical network interfaces to go around. My feeling is that we could push the work to the network adapters and allow single p

Re: Network virtualization/isolation

2006-11-26 Thread Herbert Poetzl
On Sat, Nov 25, 2006 at 01:21:39AM -0700, Eric W. Biederman wrote: > > jamal <[EMAIL PROTECTED]> writes: > > > On Fri, 2006-27-10 at 11:10 +0200, Daniel Lezcano wrote: > > > >> No, it uses virtualization at layer 2 and I had already mention it > >> before (see the first email of the thread), but

Re: Network virtualization/isolation

2006-11-25 Thread Eric W. Biederman
"Leonid Grossman" <[EMAIL PROTECTED]> writes: > I did not mean kernel bypass, just L2 hw channels that for > all practical purposes act as separate NICs - > different MAC addresses, no blocking, independent reset, etc. Yes. Nearly all of what you need for safe kernel bypass. >> In the worst ca

RE: Network virtualization/isolation

2006-11-25 Thread Leonid Grossman
> -Original Message- > From: Eric W. Biederman [mailto:[EMAIL PROTECTED] > Sent: Saturday, November 25, 2006 11:27 AM > To: Leonid Grossman > Cc: [EMAIL PROTECTED]; Daniel Lezcano; Dmitry Mishin; Stephen > Hemminger; netdev@vger.kernel.org; Linux Containers >

Re: Network virtualization/isolation

2006-11-14 Thread James Morris
On Tue, 14 Nov 2006, Daniel Lezcano wrote: > the attached document describes the network isolation at the layer 2 and at > the layer 3, it presents the pros and cons of the different approaches, their > common points and the impacted network code. > I hope it will be helpful :) What about other n

Re: Network virtualization/isolation

2006-11-14 Thread Daniel Lezcano
Then a matrix of how each requires what modifications in the network code. Of course all players need to agree that the description is accurate. Is there such a document? cheers, jamal Hi, the attached document describes the network isolation at the layer 2 and at the layer 3, it presents the

Re: Network virtualization/isolation

2006-11-01 Thread Daniel Lezcano
What would be really useful is someone takes the time and creates a matrix of the differences between the implementations. It seems there are quiet a few differences but without such comparison (to which all agree to) it is hard to form an opinion without a document of some form. If Dmitry is ag

Re: Network virtualization/isolation

2006-11-01 Thread jamal
On Fri, 2006-27-10 at 11:10 +0200, Daniel Lezcano wrote: > No, it uses virtualization at layer 2 and I had already mention it > before (see the first email of the thread), but thank you for the email > thread pointer. What would be really useful is someone takes the time and creates a matrix o

Re: Network virtualization/isolation

2006-10-27 Thread Daniel Lezcano
[ ... ] Dmitry Mishin wrote: Stephen, Virtualized container can be secure, if it is complete system virtualization, not just an application container. OpenVZ implements such and it is used hard over the world. And of course, we care a lot to keep hostile root from killing whole system. Op

Re: Network virtualization/isolation

2006-10-27 Thread Dmitry Mishin
On Thursday 26 October 2006 19:56, Stephen Hemminger wrote: > On Thu, 26 Oct 2006 11:44:55 +0200 > > Daniel Lezcano <[EMAIL PROTECTED]> wrote: > > Stephen Hemminger wrote: > > > On Wed, 25 Oct 2006 17:51:28 +0200 > > > > > > Daniel Lezcano <[EMAIL PROTECTED]> wrote: > > >>Hi Stephen, > > >> > > >>c

Re: Network virtualization/isolation

2006-10-26 Thread Daniel Lezcano
Stephen Hemminger wrote: On Thu, 26 Oct 2006 11:44:55 +0200 Daniel Lezcano <[EMAIL PROTECTED]> wrote: [ ... ] Assuming you are talking about pseudo-virtualized environments, there are several different discussions. Yes, exact, I forgot to mention that. 1. How should the namespace be isol

Re: Network virtualization/isolation

2006-10-26 Thread Stephen Hemminger
On Thu, 26 Oct 2006 11:44:55 +0200 Daniel Lezcano <[EMAIL PROTECTED]> wrote: > Stephen Hemminger wrote: > > On Wed, 25 Oct 2006 17:51:28 +0200 > > Daniel Lezcano <[EMAIL PROTECTED]> wrote: > > > > > >>Hi Stephen, > >> > >>currently the work to make the container enablement into the kernel is >

Re: Network virtualization/isolation

2006-10-26 Thread Daniel Lezcano
Stephen Hemminger wrote: On Wed, 25 Oct 2006 17:51:28 +0200 Daniel Lezcano <[EMAIL PROTECTED]> wrote: Hi Stephen, currently the work to make the container enablement into the kernel is doing good progress. The ipc, pid, utsname and filesystem system ressources are isolated/virtualized relyi

Re: Network virtualization/isolation

2006-10-25 Thread Stephen Hemminger
On Wed, 25 Oct 2006 17:51:28 +0200 Daniel Lezcano <[EMAIL PROTECTED]> wrote: > Hi Stephen, > > currently the work to make the container enablement into the kernel is > doing good progress. The ipc, pid, utsname and filesystem system > ressources are isolated/virtualized relying on the namespace