Control: tags -1 + moreinof

On Thu, Mar 29, 2018 at 09:40:38PM +0100, Rob Andrews wrote:
> Package: src:linux
> Version: 4.14.13-1~bpo9+1
> Severity: normal
> 
> Dear Maintainer,
> 
> I use Docker for application segregation on a remote server. The host has a 
> single v4 and a single v6 IP address allocated. On the host system, I have 
> NAT66 (SNAT, masquerading) setup with the following rules in order to provide 
> segregated IPv6 connectivity to Docker containers:
> 
> Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 DOCKER     all      any    any     anywhere             anywhere  
>            ADDRTYPE match dst-type LOCAL
> 
> Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination         
> 
> Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 DOCKER     all      any    any     anywhere             anywhere  
>            ADDRTYPE match dst-type LOCAL
> 
> Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
>  pkts bytes target     prot opt in     out     source               
> destination         
>     0     0 MASQUERADE  all      any    docker0  anywhere             
> anywhere             ADDRTYPE match src-type LOCAL
>     0     0 MASQUERADE  all      any    !docker0  fd00:bee:cafe::/64   
> anywhere            
> 
> Chain DOCKER (2 references)
>  pkts bytes target     prot opt in     out     source               
> destination         
> 
> On the standard stretch 4.9.x kernel, NAT66 works just fine as witnessed by 
> this tcpdump of a ping (note that the 2001:: address is that of the AAAA 
> record for debian.org):
> 
>   % sudo tcpdump -i ens3 -n 'not tcp and not udp'
>   tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>   listening on ens3, link-type EN10MB (Ethernet), capture size 262144 bytes
>   19:56:24.980979 IP6 2a03:my:machines:v6:addr > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 0, length 64
>   19:56:24.988597 IP6 2001:41c8:1000:21::21:4 > 2a03:my:machines:v6:addr: 
> ICMP6, echo reply, seq 0, length 64
>   19:56:25.981716 IP6 2a03:my:machines:v6:addr > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 1, length 64
>   19:56:25.989010 IP6 2001:41c8:1000:21::21:4 > 2a03:my:machines:v6:addr: 
> ICMP6, echo reply, seq 1, length 64
>   19:56:26.982894 IP6 2a03:my:machines:v6:addr > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 2, length 64
> 1  9:56:26.990022 IP6 2001:41c8:1000:21::21:4 > 2a03:my:machines:v6:addr: 
> ICMP6, echo reply, seq 2, length 64
> 
> Whilst on the backports kernel 4.14.x, NAT66 fails to rewrite the source 
> address, and all IPv6 traffic (not just ICMP) fails as a result:
> 
>   % sudo tcpdump -i ens3 -n 'not tcp and not udp'
>   tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
>   listening on ens3, link-type EN10MB (Ethernet), capture size 262144 bytes
>   20:00:39.711554 IP6 fd00:bee:cafe::242:ac11:2 > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 0,length 64
>   20:00:40.712591 IP6 fd00:bee:cafe::242:ac11:2 > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 1,length 64
>   20:00:41.713768 IP6 fd00:bee:cafe::242:ac11:2 > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 2,length 64
>   20:00:42.714934 IP6 fd00:bee:cafe::242:ac11:2 > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 3,length 64
>   20:00:43.716088 IP6 fd00:bee:cafe::242:ac11:2 > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 4,length 64
>   20:00:44.717264 IP6 fd00:bee:cafe::242:ac11:2 > 2001:41c8:1000:21::21:4: 
> ICMP6, echo request, seq 5,length 64
> 
> The expected behaviour is what is witnessed with kernel 4.9.x - the source 
> address is rewritten with the outgoing interface address.
> 
> Ignoring the Docker aspect of this, the witnessed behaviour can be reproduced 
> without having to use a container: use 'ping6 -I <my-ula-address> 
> debian.org'. You'll need to setup some NAT66 rules and create a virtual 
> interface with a ULA address to simulate the behaviour - this stanza in an 
> interfaces file will suffice (make sure you have bridge-utils installed):
> 
>   iface br-nat-virt inet6 static
>       bridge_ports none
>       address fd00:bee:f00d:cafe::1/64
> 
> And the following NAT66 rule:
> 
>   ip6tables -A POSTROUTING -s fd00:bee:f00d:cafe::/64 ! -o br-nat-virt -j 
> MASQUERADE
> 
> Then reproduce the behaviour using 'ping6 -I fd00:bee:f00d:cafe::1 
> debian.org'.
> 
> I hope this makes sense. It's not a major biggy, I'm just falling back to 
> using the non-backports kernel in stretch in the meantime.

is this issue still reproducible with a recent kernel from unstable or
buster backports?

Regards,
Salvatore

Reply via email to