From owner-svn-src-head@freebsd.org Wed Mar 1 05:21:42 2017 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C95BFCF50E0; Wed, 1 Mar 2017 05:21:42 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mail.allbsd.org (gatekeeper.allbsd.org [IPv6:2001:2f0:104:e001::32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.allbsd.org", Issuer "RapidSSL SHA256 CA - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 5B55C80B; Wed, 1 Mar 2017 05:21:42 +0000 (UTC) (envelope-from hrs@FreeBSD.org) Received: from mail-d.allbsd.org (p2027-ipbf1605funabasi.chiba.ocn.ne.jp [123.225.191.27]) (authenticated bits=56) by mail.allbsd.org (8.15.2/8.15.2) with ESMTPSA id v215LHZO058610 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) (Client CN "/OU=GT07882699/OU=See+20www.rapidssl.com/resources/cps+20+28c+2915/OU=Domain+20Control+20Validated+20-+20RapidSSL+28R+29/CN=*.allbsd.org", Issuer "/C=US/O=GeoTrust+20Inc./CN=RapidSSL+20SHA256+20CA+20-+20G3"); Wed, 1 Mar 2017 14:21:38 +0900 (JST) (envelope-from hrs@FreeBSD.org) Received: from alph.allbsd.org (alph.allbsd.org [192.168.0.10]) by mail-d.allbsd.org (8.15.2/8.15.2) with ESMTPS id v215K1r6030540 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 1 Mar 2017 14:20:01 +0900 (JST) (envelope-from hrs@FreeBSD.org) Received: from localhost (localhost [IPv6:::1]) (authenticated bits=0) by alph.allbsd.org (8.15.2/8.15.2) with ESMTPA id v215JxH5030521; Wed, 1 Mar 2017 14:20:00 +0900 (JST) (envelope-from hrs@FreeBSD.org) Date: Wed, 01 Mar 2017 14:18:56 +0900 (JST) Message-Id: <20170301.141856.1441900213581775162.hrs@allbsd.org> To: imp@FreeBSD.org Cc: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: Re: svn commit: r314471 - head/sys/net From: Hiroki Sato In-Reply-To: <201703010447.v214lM4c026957@repo.freebsd.org> References: <201703010447.v214lM4c026957@repo.freebsd.org> X-PGPkey-fingerprint: BDB3 443F A5DD B3D0 A530 FFD7 4F2C D3D8 2793 CF2D X-Mailer: Mew version 6.7 on Emacs 25.1 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Multipart/Signed; protocol="application/pgp-signature"; micalg=pgp-sha1; boundary="--Security_Multipart(Wed_Mar__1_14_18_56_2017_794)--" Content-Transfer-Encoding: 7bit X-Virus-Scanned: clamav-milter 0.99 at gatekeeper.allbsd.org X-Virus-Status: Clean X-Greylist: Sender DNS name whitelisted, not delayed by milter-greylist-4.4.3 (mail.allbsd.org [133.31.130.32]); Wed, 01 Mar 2017 14:21:39 +0900 (JST) X-Spam-Status: No, score=-97.9 required=13.0 tests=CONTENT_TYPE_PRESENT, QENCPTR1,URIBL_SC2_SURBL,URIBL_XS_SURBL,USER_IN_WHITELIST autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on gatekeeper.allbsd.org X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Mar 2017 05:21:42 -0000 ----Security_Multipart(Wed_Mar__1_14_18_56_2017_794)-- Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Warner Losh wrote in <201703010447.v214lM4c026957@repo.freebsd.org>: im> Author: imp im> Date: Wed Mar 1 04:47:22 2017 im> New Revision: 314471 im> URL: https://svnweb.freebsd.org/changeset/base/314471 im> im> Log: im> Fix VNET - DAD detected duplicate IPv6 address im> im> Assign a hopefully unique, locally administered etheraddr. - for im> epairNa & epairNb im> im> Submitted by: Catalin im> Pull Request: https://github.com/freebsd/freebsd/pull/92 This was discussed in D1858. epairNa and epairNb never have the same L2 addr because eaddr[5] is unique. If the goal of this change is to prevent a conflict of L2 addrs with epairNs created in another vnet jail on the same system or on the same network, eaddr[5] of epairNa (around l.839) must also be randomized at least. While I am still for a deterministic value because changing the L2 addr every time when rebooting a vnet jail is annoying, but if we use some random numbers for the vendor bits, I think eaddr[2] should be initialized in the same way. -- Hiroki ----Security_Multipart(Wed_Mar__1_14_18_56_2017_794)-- Content-Type: application/pgp-signature Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iEYEABECAAYFAli2WcAACgkQTyzT2CeTzy3cgwCfSH1sjv8JnBtTChyd5tfzFPBL OhsAoIiIp6t4mPSTvL1ufxuj/wXVpRW/ =8aF5 -----END PGP SIGNATURE----- ----Security_Multipart(Wed_Mar__1_14_18_56_2017_794)----