Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DHCPv6 improvements #21882

Merged
merged 4 commits into from Jan 15, 2017
Merged

DHCPv6 improvements #21882

merged 4 commits into from Jan 15, 2017

Conversation

abbradar
Copy link
Member

@abbradar abbradar commented Jan 14, 2017

Motivation for this change
  1. Allow one to simultaneously have two instances of dhcpd running for DHCPv4 and DHCPv6 respectively, with separate configuration;
  2. (controversial, needs review from someone who understands risks of IPv6 better!) Allow DHCPv6 client incoming traffic in the firewall by default (without this DHCPv6 client won't work);
  3. Test radvd+dhcpd6 as part of our networking tests. Client discovers a router, gets an address from the pool and pings itself and the server;
  4. Update radvd to the latest version.
Things done
  • Tested using sandboxing
    (nix.useSandbox on NixOS,
    or option build-use-sandbox in nix.conf
    on non-NixOS)
  • Built on platform(s)
    • NixOS
    • macOS
    • Linux
  • Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
  • Tested execution of all binary files (usually in ./result/bin/)
  • Fits CONTRIBUTING.md.

@mention-bot
Copy link

@abbradar, thanks for your PR! By analyzing the history of the files in this pull request, we identified @edolstra, @wkennington and @fpletz to be potential reviewers.

Copy link
Member

@fpletz fpletz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not using the ISC dhcpd much these days and didn't test this myself but the code looks good and there is a test. And more support for IPv6 is always nice. Awesome! 👍

}
];
description = ''
A list mapping Ethernet addresses to IPv${postfix} addresses for the
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Indention. ;)

@abbradar
Copy link
Member Author

abbradar commented Jan 15, 2017

@fpletz Do you think it's okay to allow DHCPv6 client traffic in firewall unconditionally? I don't see any immediate security problems (it's also enabled in Red Hat by default it seems, not sure about others) but I'm a newcomer to IPv6...

@fpletz
Copy link
Member

fpletz commented Jan 15, 2017

@abbradar I agree that this shouldn't be a security issue. The rule strict enough so only packets from hosts in the same broadcast domain will be accepted (link-local addresses). And the allowed destination port is reserved for dhcpv6-client only and is restriced to UDP. It's the job of the DHCPv6 client to listen to the correct interface or check for plausible responses.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants