-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IPv6: hardcoded address fd00::2
violates RFC 4193
#259
Comments
fd00:2
violates RFC 4193fd00::2
violates RFC 4193
@giuseppe Could you take a look? What should we do with this? |
is it really a risk for slirp4netns though? IPv6 is not routed so there is not really risk of collisions, or do you think we should just pick a random IP to honor the RFC? I am fine if we go this way (and if any problem arises users of slirp4netns can force the IP addr) |
I think honoring RFC is not necessarily, but probably we will eventually need to support specifying random addr. |
- fix listen address; - list addresses in api call; - --cidr6 parameter; - add test; - fix api test script;
I think it should pick a random one. For users who want a fixed subnet, a |
If I can find some time, sure, but probably not in the next few weeks. |
@AkihiroSuda do you want just commit pfandl@8cc216f ? |
Thanks @pfandl for working on this!
|
yes
yes
yes
Not too sure about that, I tried to mimic the sample code from the RFC Can we take the necessary bits from here? https://code.woboq.org/gcc/libiberty/sha1.c.html Also @AkihiroSuda as stated here #253 (comment) I took the mac of the |
@AkihiroSuda can we bump libslirp version? I am already using the hostx_fwd functions and we need a fix there for IPv6 forwarding anyway and I think it would be less work for me to bring all in at once? |
Yes. Using #if directive is more preferable, but not necessary if it too much complicates the code. Line 379 in 631f361
|
Dependency on libcrypt is fine, as it should be available on all distros.
Why not take the MAC of |
I think #if will work, thanks for the info. I guess it should be ready coming weekend. |
@AkihiroSuda with man page, do you mean README.md? |
No, I mean this https://github.com/rootless-containers/slirp4netns/blob/master/slirp4netns.1 Generated from https://github.com/rootless-containers/slirp4netns/blob/master/slirp4netns.1.md with |
…tainers#253 Signed-off-by: fassl <[email protected]>
- fix listen address; - list addresses in api call; - --cidr6 parameter; - add test; - fix api test script; Signed-off-by: fassl <[email protected]>
…ainers#259 Signed-off-by: fassl <[email protected]>
Signed-off-by: fassl <[email protected]>
Signed-off-by: fassl <[email protected]>
…s#259 Signed-off-by: fassl <[email protected]>
Signed-off-by: fassl <[email protected]>
Signed-off-by: fassl <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: fassl <[email protected]> IPv6 test ref rootless-containers#253 Signed-off-by: fassl <[email protected]> IPv6: pseudo random id generator rootless-containers#259 rootless-containers#253 Signed-off-by: fassl <[email protected]> IPv6 port forwarding: rootless-containers#259 rootless-containers#253 - fix listen address; - list addresses in api call; - --cidr6 parameter; - add test; - fix api test script; Signed-off-by: fassl <[email protected]> handle protocol version in api: rootless-containers#253 rootless-containers#259 Signed-off-by: fassl <[email protected]> add --ipv6-random flag: rootless-containers#259 Signed-off-by: fassl <[email protected]> use strnXXX functions: rootless-containers#259 Signed-off-by: fassl <[email protected]> try read mac of tap0 and fallback to /dev/Xrandom: rootless-containers#259 Signed-off-by: fassl <[email protected]> man page and bump libslirp veresion: rootless-containers#259 Signed-off-by: fassl <[email protected]> fix Docker builds: rootless-containers#259 Signed-off-by: fassl <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: fassl <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: fassl <[email protected]>
- skip ipv6 tests on old libslirp versions - install openssl-devel on centos box - use *hostfwd functions on old libslirp versions Signed-off-by: fassl <[email protected]>
- fix missing SLIRP_CONFIG_VERSION_MAX in test scripts
- implement forwarding - implement random CIDR Signed-off-by: fassl <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: fassl <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: Jasmin Fazlic <[email protected]>
I'm late to the party. I prefer slirp4netns to support the RFC. Thanks for your work, @pfandl. Note that the sample code for generating random Global IDs is just a sample. The minimal requirement is for the number to be pseudo-random. I believe Here is the current PR for this issue: #276 (It seems that GitHub did not link them when the new PR was created) |
- implement forwarding - implement random CIDR Signed-off-by: Jasmin Fazlic <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: Jasmin Fazlic <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: Jasmin Fazlic <[email protected]>
- implement forwarding - implement random CIDR Signed-off-by: Jasmin Fazlic <[email protected]>
https://github.com/rootless-containers/slirp4netns/blob/v1.1.9/slirp4netns.1.md
According to RFC 4193, the addresses in
fd00::/8
seems to need to be randomhttps://tools.ietf.org/html/rfc4193
https://networkengineering.stackexchange.com/questions/30128/ipv6-ula-vs-link-local
(
slirp4netns --enable-ipv6
is still experimental and we can have breaking changes)The text was updated successfully, but these errors were encountered: