Skip to content
This repository has been archived by the owner on Jun 21, 2018. It is now read-only.

Add network namespaces for users #103

Open
wants to merge 8 commits into
base: master
Choose a base branch
from

Conversation

KellerFuchs
Copy link
Member

@KellerFuchs KellerFuchs commented Aug 6, 2016

Do not merge, there are some important parts missing:

  • DHCP (or whichever other way of allocating addresses) and NAT for IPv4 networking;
  • fixing resolv.conf, as Unbound doesn't listen on 127.0.0.1 in the user's netns;
  • computing the user's IPv6 address;
  • actually putting the user in the network namespace.

Moreover, this probably breaks our current identd setup.

Todo:
- add DHCP and NAT setup for IPv4
- add pam_network_namespace to actually make the user
  enter the namespace
RD/RA should take care of it
- Avoid non-POSIX keywords (function, source)
- Use proper quoting
- Do not return strings
- Avoid [ X -a Y ], as it isn't well-defined
@KellerFuchs
Copy link
Member Author

@lrvick Rebased this on the IPv6 branch, so that we can see more easily how it fits with the example config.

@daveloyall
Copy link

Drive by observation: if outgoing connections are bound to a user's IP (or range? I don't know much about IPv6), the IRC network operators will no longer care about identd operation. The can manage connections (ie, issue bans) based on the IP.

@daurnimator
Copy link
Member

Drive by observation: if outgoing connections are bound to a user's IP (or range? I don't know much about IPv6), the IRC network operators will no longer care about identd operation. The can manage connections (ie, issue bans) based on the IP.

Users still NAT to the ipv4 internet via the server's main ip.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants