-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add IPv6 support to network drivers #522
Comments
@akarshm can you take a look at this feature request? |
@grcusanz @adrianm-msft could networking take a look at these asks? We can discuss it in the next Triage call. |
@akerouanton, which version of Windows was this tested on? |
I'm using Windows 11 Pro and the build number is 22631.3880. |
Hi, we'll be able to provide updates for your requests in a few days, once we've met with the product team. |
Hi, our current IPv6 support is documented here. As for the feature requests, I can confirm we do have this work in our timeline and have added it to our backlog. |
Hi,
moby / libnetwork maintainer here.
As the OMB memorandum M-21-07 will come into force in Sep. 2025, we started working on IPv6 improvements for Linux containers and we’ll need to add IPv6 support to Windows containers before that deadline. Since the API documentation for HNS doesn’t mention IPv6 limitations, I started playing with the API to see what roadblockers I could find.
I’m opening this ticket to document what I found and make feature requests. All the
docker
commands below are run against this branch: moby/moby#48285.So far, I only tested the
nat
driver, but we’ll need similar improvements for other drivers.Here’s a TL;DR list of Feature Requests:
Create an IPv6 network
So far, I’m able to create a network with static IPv6 subnet, but unlike IPv4, HNS won’t dynamically allocate IPv6 subnets:
Run a container attached to an IPv6 network
Container's IP address isn't automatically added to its interface:
Ping the host from the container (and vice-versa)
Pinging the host from the container doesn't work (although the reverse does). It seems there's a missing firewall policy to allow outbound connectivity:
And taking a look with
pktmon
:The text was updated successfully, but these errors were encountered: