[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2017-12-06 Thread Andreas Hasenack
Is the current situation good enough? In the procps package, the default is still "2". Image deployments change that as Scott described in comment #23 (but that was 3y ago, might have changed). I don't know how server installs using the text mode installer behave, it's been a while since I last

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2017-12-06 Thread Andreas Hasenack
Is the current situation good enough? In the procps package, the default is still "2". Image deployments change that as Scott described in comment #23 (but that was 3y ago, might have changed). I don't know how server installs using the text mode installer behave, it's been a while since I last

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2017-06-09 Thread Tore Anderson
Hi Christian. Some comments/corrections: 1) On servers privacy extensions are *not* always enabled. As I pointed out in comment #24, if NM is not in use, privacy extensions are only enabled for userspace-created interfaces such as "vlan123". It is *not* enabled by default for physical interfaces

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2017-06-08 Thread ChristianEhrhardt
Thanks Tore for checking so much Details and all the relations to NetworkManager it might have on a Desktop. On a server (no NM) I'd think it is always enabled i'd think. But if that is a bug or not is a"discussion". Just as much as users want it off (here) others want it on - see bug 176125 and

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2016-04-24 Thread Tore Anderson
In case anyone's interested in knowing why setting net/ipv6/conf/all/use_tempaddr=2 no longer changes the value of pre- existing interfaces (thus ensuring privacy extensions are disabled by default for physical interfaces configured through /etc/network/interfaces), it's because

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2016-04-23 Thread Tore Anderson
Correction to my previous comment: "disable_ipv6" should of course have read "use_tempaddr" throughout, except for the part about NM bouncing the disable_ipv6 sysctl. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2016-04-23 Thread Tore Anderson
The situation appears to have improved somewhat in Xenial. The net/ipv6/conf/all/disable_ipv6 sysctl appears to have become a no-op in recent kernels, so when 10-ipv6-privacy.conf gets applied during the bootup sequence (by systemd-sysctl.service) it does *not* change the effective per-device

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2015-12-25 Thread Ken Sharp
** Tags added: trusty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title: IPv6 Privacy Extensions enabled on Ubuntu Server by default To manage notifications about

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2015-12-25 Thread Ken Sharp
** Tags added: trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title: IPv6 Privacy Extensions enabled on Ubuntu Server by default To manage notifications about this bug go to:

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-10-10 Thread Scott Moser
ok. so some updates. Ben fixed this in the cloud image build process via [1] (commit [2]), and limited the change to utopic+. The fix was done by adding a file /etc/sysctl.d/99-cloudimg-ipv6.conf The problem with this change is described in bug 1352255 and bug 994931. If ipv6 addresses are

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-10-10 Thread Scott Moser
ok. so some updates. Ben fixed this in the cloud image build process via [1] (commit [2]), and limited the change to utopic+. The fix was done by adding a file /etc/sysctl.d/99-cloudimg-ipv6.conf The problem with this change is described in bug 1352255 and bug 994931. If ipv6 addresses are

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-10-09 Thread Scott Moser
interestingly enough, modifying the privacy settings via sysctl has some negative affects if addresses are already up. see diagnosis in bug 1377005 . -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu.

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-10-09 Thread Scott Moser
interestingly enough, modifying the privacy settings via sysctl has some negative affects if addresses are already up. see diagnosis in bug 1377005 . -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-09-06 Thread Mr. Jester
Just to document additional support. I concur that on a Server install, PE should disabled by default. A server doesn't fall into the use case of needing to protect the privacy of the user. It is meant to be known, not obfuscated. -- You received this bug notification because you are a member

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-09-06 Thread Mr. Jester
Just to document additional support. I concur that on a Server install, PE should disabled by default. A server doesn't fall into the use case of needing to protect the privacy of the user. It is meant to be known, not obfuscated. -- You received this bug notification because you are a member

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-08-27 Thread Scott Moser
marked this 'triaged' in cloud-init while still not really relevant. Ben Howard has disabled the privacy extensions in cloud images in 14.10, and the plan is to just do the same for 14.04. ** Changed in: cloud-init (Ubuntu) Status: New = Triaged ** Changed in: cloud-init (Ubuntu)

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-08-27 Thread Scott Moser
marked this 'triaged' in cloud-init while still not really relevant. Ben Howard has disabled the privacy extensions in cloud images in 14.10, and the plan is to just do the same for 14.04. ** Changed in: cloud-init (Ubuntu) Status: New = Triaged ** Changed in: cloud-init (Ubuntu)

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-07-01 Thread Ben Howard
Disabled IPv6 privacy extensions for Ubuntu 14.10 via /etc/sysctl.d. I would be in favor of making this a default for 14.04 as well. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu.

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-07-01 Thread Ben Howard
Disabled IPv6 privacy extensions for Ubuntu 14.10 via /etc/sysctl.d. I would be in favor of making this a default for 14.04 as well. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title:

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-26 Thread Scott Moser
given RFC4941 SHOULD (RFC capitalisation) be turned off by default above, and the general lack of value of privacy extensions being enabled on a server or cloud geust, i really think we should: a.) turn off privacy extensions on cloud-images for 14.10+ b.) look for a way to disable them by

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-26 Thread Scott Moser
given RFC4941 SHOULD (RFC capitalisation) be turned off by default above, and the general lack of value of privacy extensions being enabled on a server or cloud geust, i really think we should: a.) turn off privacy extensions on cloud-images for 14.10+ b.) look for a way to disable them by

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
** Also affects: cloud-init (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title: IPv6 Privacy Extensions enabled on

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
Neil: the metadata is just one example (though that's not happening). The firewall rule thing applies irrespective of the metadata. The cloud environment created requires only /128 addresses it knows about to be accessible, and firewalls everything else out. Reasons for this include prevention of

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Neil Wilson
There's no problem with using it in an IPv6 environment if you use IPv6 prefix mechanisms as designed If you've tied down your cloud environment too tight (and technically contra the spec - IPv6 is prefix based, not address based) then you have to expect to make alterations to the standard

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
This affects 14.04 too -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cloud-init in Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title: IPv6 Privacy Extensions enabled on Ubuntu Server by default To manage notifications about

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
That doesn't work if (for instance) you have 2 machines on the same SDN virtual LAN, which is a /64, and you want to prevent source spoofing between them. For avoidance of doubt, we do use /64s. -- You received this bug notification because you are a member of Ubuntu Server Team, which is

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Neil Wilson
I would suggest that is a design flaw in your network - which is working in an IPv4 manner, not an IPv6 one. You should have used a prefix smaller than /64 The problem here is with the network design, not the image. On 4 June 2014 14:40, Alex Bligh ubu...@alex.org.uk wrote: That doesn't work if

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
In my view this is NOT a software bug, its an OS bug. Here's a completely different why this causes problems. We use Ubuntu UEC images. There are no meaningful privacy considerations here because we generate both the MAC address and the IP address of the servers concerned. IE, if the machine is

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Neil Wilson
The metadata request on IPv6 should ask to use the global address on outgoing connection. If it did, then the firewall rule would work, the metadata obtained and that can turn off the temporary address mechanism if that is what you want. Badly coded applications should be fixed to work properly

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
** Also affects: cloud-init (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title: IPv6 Privacy Extensions enabled on Ubuntu Server by

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
Neil: the metadata is just one example (though that's not happening). The firewall rule thing applies irrespective of the metadata. The cloud environment created requires only /128 addresses it knows about to be accessible, and firewalls everything else out. Reasons for this include prevention of

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Neil Wilson
There's no problem with using it in an IPv6 environment if you use IPv6 prefix mechanisms as designed If you've tied down your cloud environment too tight (and technically contra the spec - IPv6 is prefix based, not address based) then you have to expect to make alterations to the standard

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
That doesn't work if (for instance) you have 2 machines on the same SDN virtual LAN, which is a /64, and you want to prevent source spoofing between them. For avoidance of doubt, we do use /64s. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Alex Bligh
This affects 14.04 too -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title: IPv6 Privacy Extensions enabled on Ubuntu Server by default To manage notifications about this bug go to:

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-06-04 Thread Neil Wilson
I would suggest that is a design flaw in your network - which is working in an IPv4 manner, not an IPv6 one. You should have used a prefix smaller than /64 The problem here is with the network design, not the image. On 4 June 2014 14:40, Alex Bligh ubu...@alex.org.uk wrote: That doesn't work if

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2014-02-28 Thread Brian Candler
RFC 4941: The use of temporary addresses may cause unexpected difficulties with some applications. ... Consequently, the use of temporary addresses SHOULD be disabled by default in order to minimize potential disruptions. -- You received this bug notification because you are a

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-05-17 Thread Neil Wilson
From 'include/linux/in6.h' /* RFC5014: Source address selection */ #define IPV6_ADDR_PREFERENCES 72 #define IPV6_PREFER_SRC_TMP 0x0001 #define IPV6_PREFER_SRC_PUBLIC 0x0002 #define IPV6_PREFER_SRC_PUBTMP_DEFAULT 0x0100 #define IPV6_PREFER_SRC_COA 0x0004

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-05-16 Thread Jason Eggleston
I can confirm all of the security addresses by default are marked Global. There is no application level workaround for this. $ ifconfig eth0 | awk '/inet6/ {print $1,$2,ipv6addr,$4}' inet6 addr: ipv6addr Scope:Global inet6 addr: ipv6addr Scope:Global inet6 addr: ipv6addr Scope:Global inet6 addr:

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-04-01 Thread Neil Wilson
No the IPv6 system prefers privacy addresses over standard addresses if not explicitly told otherwise. Server *userspace software* should tell the system explicitly what it wants to do so that clients can connect to it. The problem is with the userspace software, not the IPv6 configuration. It

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-04-01 Thread James Troup
Neil Wilson n...@aldur.co.uk writes: No the IPv6 system prefers privacy addresses over standard addresses if not explicitly told otherwise. Server *userspace software* should tell the system explicitly what it wants to do so that clients can connect to it. You keep asserting this but don't

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-03-31 Thread Tim Heckman
I don't think you are correct. Here's why: the comments in the file mentioned in my original bug report (of which I actually included the full contents of the file) state the following: '2 - prefer privacy addresses and use them over the normal addresses.' Heavy emphasis on the word prefer.

Re: [Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-03-13 Thread Neil Wilson
That's a bug in the software - not the server system. If the software requires a global source address to work, then it should ask for one when doing the bind or provide an option to do so. If it doesn't do that then that is a buggy IPv6 implementation and should be reported as such. The problem

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2013-03-12 Thread Tim Heckman
The problem is that by default pieces of software will use that address when communicating over IPv6. Such as wget downloading a file over IPv6 or connecting to a system using SSH. This should absolutely not be the default for a server system. -Tim -- You received this bug notification because

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2012-12-12 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: procps (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1068756 Title:

[Bug 1068756] Re: IPv6 Privacy Extensions enabled on Ubuntu Server by default

2012-12-12 Thread Neil Wilson
Although I sympathise with the sentiments in this bug, the real problem is that the application is not implementing the address selection process indicated in RFC 5014. When an application opens a socket it can indicate that it requires the public address. If you find an application that fails