Good work guys, sorry could not attend.

Can I stress people about also making this work in ADV zone + SG?

Lucian

--
Sent from the Delta quadrant using Borg technology!

Nux!
www.nux.ro

----- Original Message -----
> From: "Wido den Hollander" <w...@widodh.nl>
> To: dev@cloudstack.apache.org
> Sent: Thursday, 21 May, 2015 19:59:34
> Subject: IPv6 ideas for Basic Networking

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi,
> 
> After the EU User Group meetup in London today I sat down with Rohit,
> John Burwell and some other people and I wanted to ventilate the ideas
> we/I came up with for IPv6 in BASIC networking.
> 
> 
> (IPv6) routers should send out RAs (Router Advertisements) with the
> managed-other-flag [0][1], telling Instances to ONLY use that routers
> as their default gateways and NOT to use SLAAC to autoconfigure their
> IP-Address.
> 
> The management server should be told that a specific subnet can be
> used within a pod, eg a /64.
> 
> When a new IPv6 Address is requested the management server generates a
> random new address in that subnet and checks if no duplicate exists.
> If not, it stores the /128 (single IP) in the MySQL database and
> configures the DHCPv6 server on the Virtual Router (VR).
> 
> When the Instance boots it knowns that due to the "managed other flag"
> in the RA that it should query DHCPv6 for acquiring a IPv6 address.
> 
> The VR responds to the DHCPv6 request with a IPv6 address, DNS
> servers, domain and maybe a NTP server.
> 
> We ONLY store addresses we handed out, not with IPv4 where we store
> every address. A address NOT stored in the database means it's not
> handed out.
> 
> The (ip6tables) Security Groups should allow ICMPv6 by default. IPv6
> traffic breaks really hard without ICMPv6 traffic, for example PMTU
> doesn't work properly and breaks IPv6 connections.
> 
> In CloudStack we might configure a /48, but tell it to hand out
> addresses for each instance from a /64 out of that /48. That means we
> can have 65k Instances in that pod. Some firewall policies block a
> complete /64 when they see malicious traffic coming from that subnet,
> so if the subnet is big enough we should try to keep all the IPv6
> addresses from one Instance in the same /64 subnet. This could also
> simplify the iptable rules.
> 
> To use this seems like a simple, but robust solution. The real
> hardware routers do all the traffic forwarding and the VR only does
> DHCPv6.
> 
> Security grouping has to be extended to also support IPv6, but should
> allow ICMPv6 by default.
> 
> At the end of June 2015 we want to keep a one-day meetup in Amsterdam
> with various developers to discuss some more details.
> 
> Wido
> 
> [0]: https://www.ietf.org/rfc/rfc5075.txt
> [1]: https://www.ietf.org/rfc/rfc4861.txt
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> 
> iQIcBAEBAgAGBQJVXisUAAoJEAGbWC3bPspCvTcQAJ09PKqwhhjGqF1TmpyfLKGE
> Aup7qDQsHlGn4tnl09OIOoJo4RC2WMGV4d93jO3q1IM6moMNWMNrtOWqLrIhwnXg
> zYvYvvJZQN8eYCL1eyz2sTb/pOo0LpIFB8E9QV2Tp6m0oL8jvpXXo4dobZBXAGAu
> oCsqpdo3zFAG23DLAxRjEB+UoxtvwYbgyEDN97JRM3Da0PMPeTiwdtdOmb91w1sF
> ZfvUQcf71Zdg2LHTV1LYiLynhrOpKtqrZ0MOI+RMxB4tdgdmA5dw5Ifp0pcrbCCR
> VUeX4GPj+vOtlJWo677/j2napPuQA+Jev367PU3+vzO5nboWxEMtXMZZFQJ2wSbj
> jpBldZm0AThEKkmCWjmi0UGJXH0sEIVyytvdo6p/W64L0a4wTF70A6FUtT5QT+mg
> KHlBl40QVL57JKCEVYjdUtqVMPKbj3JwLu6N9vX4gxmNcv1CASOfn1/0F5pmN2mL
> mMM+mF6FAl1VwNVCxyssnCOK1OkjrIbsLWNExrTFPPfrit4eSgRLTBpZML/EZQws
> AnsUH7bLzvsBGJZUZP8tTksSw9N6gq3Zxr8/xGXEdcvL8NpUjPf6yVUjG3baKvnU
> OE0JlpP2MiELP4M7RZoYDCnrXM8DAGy7ogu8n350o85+QfL3/b34NRcwPvIxKXqd
> tX0aruUHc2IIy/5Mp2Dj
> =RsNl
> -----END PGP SIGNATURE-----

Reply via email to