#SLAAC

2025-03-10

A fun hour or so of troubleshooting #IPv6 just to realise that I'd forgotten to reconfigure the #dhcpPrefixDelegation onto the #vif after making it #vlanaware #edgerouter #slaac #ubiquity

Thomas Schäfertschaefer@ipv6.social
2025-01-14

Service:

Hin und wieder wird bei DYNDNS eine stabile Host-ID verlangt:

Linux allgemein:
man ip-token
ip token set ::3000 dev eth0
oder im NetworkManager:
networkmanager.pages.freedeskt

[ipv6]
addr-gen-mode=eui64
method=auto
token=::3333

Damit kommt man ohne DHCPv6 aus und die Hosts müssen nicht ihre MAC-Adresse "verraten".

Wenn jemand die äquivalenten Einstellungen für andere OS oder Tools kennt, kann ja gern damit darauf antworten.

#ipv6 #slaac #dyndns #hostid #prefix

Petr Menšík :fedora:pemensik@fosstodon.org
2024-11-05

I had a presentation about registering #hostname on #ipv6, when #SLAAC is used. Is there any attempt to register name to local #dns server, when I am on IPv6 only network? I think dynamic update over TCP would be similar to #dhcp based registration Dnsmasq does automatically. Is there any system attempting it already?

Jan ☕🎼🎹☁️🏋️‍♂️jan@kcore.org
2024-09-27

Does anyone know how to make Windows 11 prefer #DHCPv6 over #SLAAC?

#ipv6 #windows11

Felix Palmen :freebsd: :c64:zirias@bsd.cafe
2024-09-20

@mort BTW, I agree that #android insisting on #SLAAC is a bad design of that OS. But it's within the specification, SLAAC is mandatory for #IPv6, while #dhcpv6 is optional.

Felix Palmen :freebsd: :c64:zirias@bsd.cafe
2024-09-20

@mort #IPv6 doesn't support host-parts shorter than (and prefixes longer than) 64 bits.

Although some routers (e.g. my #FreeBSD VM) can deal with longer prefixes and I'd be perfectly fine for my small network to assign addresses manually and with #dhcpv6, not all devices and systems (e.g. #android) can do that but insist on #SLAAC, which strictly requires a 64bit host part.

Jan ☕🎼🎹☁️🏋️‍♂️jan@kcore.org
2024-09-12

How does one manage #ipv6 #ula addresses in #DNS?

Addressing is done using #SLAAC.

I'd like to get those automatically registered so I can use the in my internal network, but ..

2024-09-07

If you have clients periodically lose the IPv6 default route, and are using #radvd to implement #SLAAC, the reason for the trouble can be that the net.ipv6.conf.<laniface>.forwarding is incorrectly configured as 0.

ping output showing IPv6 default route disappearing periodically.

It was really cumbersome to configure IPv6 on my proxmox playground box.

Yes I do want this box to act as a router for the hosted VMs, but yes I also want SLAAC to get the default route and DNS!

Long story short, in a pre-up I had to add a "echo 0" to the forwarding sysctl for the wan interface.
But from my understanding, this interface is still forwarding IPv6 packets for the VMs.

At least now it's working, and also tested that the configuration is also correctly applied upon a reboot.

#linux #debian #proxmox #networking #ipv6 #slaac

Jan ☕🎼🎹☁️🏋️‍♂️jan@kcore.org
2024-08-22

Wondering if I can get rid of my #dhcpdv6 and just use #slaac for everything.

There was a reason I activated it, but I honestly don't remember.

Devices here are android, Linux and Windows based.

#ipv6

2024-08-15

Is it just me or is #radvd "::/64" prefix autodiscovery broken since it doesn't limit the prefix length to 64? If the ISP offers a wider than 64-bit block the autodiscovery will just pick that value as-is and advertise it. At least macOS and iOS will reject such overly wide RA.

One fix for this is to just use explicit prefix stanza with "address::/64" but this requires that the radvd.conf is generated runtime based on the prefix obtained from the ISP.

Since I didn't feel like having to keep regenerating the radvd.conf dynamically I just patched the send.c to limit the xprefix.PrefixLen to 64.

I'm sure there's a better way but this problem looked like a nail to me.

#IPv6 #SLAAC

--- radvd-2.19/send.c.orig	2024-08-15 07:38:53.784933510 +0300
+++ radvd-2.19/send.c	2024-08-15 07:39:01.252993258 +0300
@@ -308,6 +308,11 @@
 		xprefix.Prefix = get_prefix6(&s6->sin6_addr, &mask->sin6_addr);
 		xprefix.PrefixLen = count_mask(mask);
 
+		/* Limit the prefix to 64 */
+		if (xprefix.PrefixLen < 64) {
+			xprefix.PrefixLen = 64;
+		}
+
 		char pfx_str[INET6_ADDRSTRLEN];
 		addrtostr(&xprefix.Prefix, pfx_str, sizeof(pfx_str));
 		dlog(LOG_DEBUG, 3, "auto-selected prefix %s/%d on interface %s", pfx_str, xprefix.PrefixLen, ifname);

@txt_file Looking at the end of pg 3 of
rfc-editor.org/rfc/rfc2464
"An IPv6 address prefix used for stateless autoconfiguration [ACONF]
of an Ethernet interface must have a length of 64 bits."

So you are right. If you are not using #ethernet then #SLAAC might work on different prefix that /64

Jinna the bureaucracy witchjinna@tech.lgbt
2024-04-11
Antranig Vartanian :freebsd:antranigv@sigin.fo
2024-04-09

Short question: WireGuard + auto IPv6, doable?

Long question: can I run SLAAC/rtadvd over a WireGuard interface? I can do the scripting by myself.

#WireGuard #IPv6 #SLAAC #FreeBSD

2024-02-27

@troglobit also in #ICMPv6 RA / #RFC4861 it seems that again only a prefix plus prefix length is allowed. And not a netmask. Which would seem quite useful for #IPv6 #multicast?

And now I'm also wondering if a host's #IPv6 stack receiving any (routeable) unicast prefix via #SLAAC or #DHCPv6 should maybe just install the matching #embeddedRP #multicast prefix on its own, by default on the according interface?

__sharky____sharky__
2024-01-19

14 is running too stable . I will add to one of my jails and see how it goes. Last time a did it , after a couple of days the default route disappeared. Fingers crossed .

Mikael Hanssonmikael@hachyderm.io
2024-01-13

Extremely surprising finding: while #FreeBSD has no problems at all taking part in an #IPv6 network via #SLAAC or manually assigned addresses in combination with regular router advertisements, even the version 14 base system still doesn’t seem to support #DHCPv6 in a standards-compliant way. forums.freebsd.org/threads/is- from 2018 suggests using dual-dhcpcd. Is that still the recommended solution?

2024-01-13

@frameworkcomputer @debian
TL;DR:

#ipv6 #slaac on #framewok

Not working:
Debian+wifi+NetworkManger

Working:
Debian+lan
Debian+wifi+ifupdown
Fedora
Kali

Alexandre :freebsd:alelab@bsd.cafe
2023-11-27

I found something strange on my home server upgraded to #FreeBSD 14.0-RELEASE.
I got 2 jails built with #Bastille. Both are using VNet. Their network is setup with static #IPv4 and #SLAAC #IPv6.
All works fine. I can ping in both ways and using IPv4 & IPv6 other computers on the local network.
Jails can ping the host in IPv4 in both ways, but IPv6 ping doesn’t work to the host. If the host try to ping jails, it works and IPv6 ping from jails to host magically works.
I tried to disable #PF on jails but it doesn’t changed anything.
Did I missed anything new in 14.0 with network stack?
Host contains this in /etc/rc.conf:
ifconfig_em0="SYNCDHCP"
ifconfig_em0_ipv6="inet6 accept_rtadv"
ipv6_cpe_wanif="em0"

In jails I set this:
ifconfig_vnet0="inet 192.168.1.123/24"
defaultrouter="192.168.1.1"
ifconfig_vnet0_ipv6="inet6 accept_rtadv"
ipv6_cpe_wanif="vnet0"

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst