TODO.IPv6 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215
  1. TODO for IPv6 payload support
  2. -----------------------------
  3. 1.) "--topology subnet" doesn't work together with IPv6 payload on FreeBSD
  4. (verified for FreeBSD server, Linux/ifconfig client, problems
  5. with ICMP6 neighbor solicitations from BSD not being answered by Linux)
  6. * 2012-01-22 fixed in platform cleanup, commit 62c613d46dc495d74
  7. 2.) NetBSD IPv6 support doesn't work
  8. ("connected" route is not auto-created, "route-ipv6" adding fails)
  9. * fixed, 3.1.10 *
  10. 3.) route deletion for IPv6 routes is not yet done
  11. * fixed for configured routes, 3.1.10 *
  12. * missing for manual-ifconfig-connected (NetBSD, Darwin, Win32)
  13. * 2012-06-10 - fixed somewhere in 2010
  14. 4.) do "ifconfig tun0 inet6 unplumb" or "ifconfig tun0 destroy" for
  15. Solaris, *BSD, ... at program termination time, to clean up leftovers
  16. (unless tunnel persistance is desired).
  17. For Solaris, only the "ipv6 tun0" is affected, for the *BSDs all tun0
  18. stay around.
  19. * 2012-06-10 - fixed in individual platform cleanups early-2012
  20. 4a.) deconfigure IPv6 on tun interface on session termination, otherwise
  21. one could end up with something like this (on NetBSD):
  22. tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
  23. inet 10.9.0.18 -> 10.9.0.17 netmask 0xffffffff
  24. inet6 fe80::a00:20ff:fece:d299%tun0 -> prefixlen 64 scopeid 0x3
  25. inet6 2001:608:4:eff::2000:3 -> prefixlen 64
  26. inet6 2001:608:4:eff::1:3 -> prefixlen 64
  27. (pool was changed, previous address still active on tun0, breakage)
  28. * semi-fixed for NetBSD, 28.2.10, always do tun0 destroy / tun0 create
  29. before actual ifconfig -- tunnel still lingers after OpenVPN quits
  30. * 2011-09-16 fixed in platform cleanup, commit 8ca19c014c149cf69
  31. 4b.) verify this - on FreeBSD, tun0 is auto-destroyed if created by
  32. opening /dev/tun (and lingers if created by "ifconfig tun0 create")
  33. -> use for persistant tunnels on not-linux?
  34. * 2012-06-10 tun interface behaviour is documented in "man tun(4)"
  35. 5.) add new option "ifconfig-ipv6-push"
  36. (per-client static IPv6 assignment, -> radiusplugin, etc)
  37. * implemented, 14.1.10 *
  38. 6.) add new option "route-ipv6-gateway"
  39. * 2012-06-09 - decided there is no current need (but fairly trivial)
  40. 7.) add "full" gateway handling for IPv6 in route.c
  41. (right now, the routes are just sent down the tun interface, if the
  42. operating system in questions supports that, without care for the
  43. gateway address - which does not work for gateways that are supposed
  44. to point elsewhere. Also, it doesn't work for TAP interfaces.
  45. * 2012-06-09 use "dev tun" for tun devices, "via $gateway" for tap
  46. (and purposely do not support off-link routes)
  47. 8.) full IPv6 support for TAP interfaces
  48. (main issue should be routes+gateway - and testing :-) )
  49. test 2010/09/24: TAP itself works on linux/ifconfig+iproute2, but
  50. route-via-tap doesn't work at all (route points to "tap0" which fails)
  51. 17:51:14.075412 fe:ab:6e:c5:53:71 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2001:608:4:a053::1:0 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2001:608:4:a001::1, length 32
  52. * 2012-06-09 missing gateway support implemented
  53. 8a.)
  54. how is iroute-via-tap supposed to work??
  55. * 2012-06-10 - answer: not at all, OpenVPN doesn't do "iroute" in
  56. tap mode - set up "route-ipv6" with gateway address = individual
  57. client's tap0 address to get the per-client routes
  58. 9.) verify that iroute-ipv6 and route-ipv6 interact in the same way as
  59. documented for iroute/route:
  60. A's subnet, OpenVPN must push this route to all clients
  61. EXCEPT for A, since the subnet is already owned by A.
  62. OpenVPN accomplishes this by not
  63. not pushing a route to a client
  64. if it matches one of the client's iroutes.
  65. 10.) extend "ifconfig-ipv6" to handle specification of /netbits, pushing
  66. of /netbits, and correctly ifconfig'ing this
  67. (default, if not specified: /64)
  68. * done * 2012-02-03
  69. 11.) do not add ipv6-routes if tun-ipv6 is not set - complain instead
  70. * done * 12.1.10
  71. 12.) handle incoming [::] and [fe80:...] packets in tun-p2mp MULTI mode
  72. (most likely those are DAD packets)
  73. silently ignore DAD?
  74. Or accept-and-forward iff (multicast && client2client)?
  75. handle NS/NA
  76. 13.) from Martin List-Petersen:
  77. One thing, and I guess this requires modifications in
  78. network-manager-openvpn: It also works, BUT ignores "push
  79. route-ipv6-gateway" and "push route-ipv6 ...." (obviously routes pushed
  80. from the server) entirely.
  81. 14.) from ##openvpn-discussion:
  82. new features should be #ifdef'ed
  83. (check whether this is feasible at all)
  84. 15.) IPv6 related environment variables
  85. - document all of them in openvpn.8
  86. - make sure that all existing IPv4 stuff has IPv6 counterparts
  87. 16.) OpenBSD
  88. - implement ifconfig/route for IPv6
  89. - revert ifconfig/open_tun order to "normal" (separate commit!!!)
  90. (openvpn-devel, Subject: OpenBSD)
  91. - test
  92. * 2012-02-05 platform cleanup, commit 82d4e12068774b0a6ca
  93. 17.) client-option (Elwood)
  94. - ignore-v6-push-options yes/no
  95. - ignore-v6-route-push ("as for IPv4 routes")
  96. 18.) fail-save? "what if 'ip -6 addr add' fails" -> fail, or fallback to v4?
  97. (-> recomment setting "ignore-v6-push-options yes")
  98. 19.) safety check: if connecting over IPv6 (v6 transport) and the pushed
  99. route-ipv6 network encompasses the server IPv6 address, make sure
  100. we at least log a warning (until we can fiddle with external routing
  101. to make this work correctly).
  102. 20.) show "route add" / "route delete" commands for IPv6 in log file
  103. (we show the "ifconfig" commands, so why not the routes?)
  104. 2010-08-07: this is a null-feature - it's already there, but with
  105. different debug level (M_INFO vs. D_ROUTE) so user
  106. didn't notice
  107. 21.) enable ipv6-only server operations
  108. - decouple ipv6 pool handling from ipv4 pool
  109. - make sure Rest of OpenVPN doesn't assume "there will always be IPv4"
  110. 22.) implement --learn-address for IPv6
  111. 23.) FreeBSD 8 seems to require explicit setting of the "ifconfig" IPv6
  112. route, while FreeBSD 6+7 don't --> more testing, and code fix
  113. workaround for the time being: just add
  114. server-ipv6 2001:608:4:a051::/64
  115. route-ipv6 2001:608:4:a051::/64
  116. to the config
  117. (problem + workaround applies both to tun and tap style devices)
  118. * 2012-06-09 - this got fixed in one of the platform cleanups
  119. TODO for IPv6 transport support
  120. -------------------------------
  121. [ Last updated: 2014-01-03. ]
  122. * All platforms:
  123. o mgmt console: as currently passes straight in_addr_t bits around
  124. o make possible to get AF from getaddrinfo() answer, ie allow openvpn to
  125. use ipv4/6 if DNS returns A/AAAA without specifying protocol.
  126. Hard: requires deep changes in initialization/calling logic
  127. - Done by dual stack patches
  128. o use AI_PASSIVE
  129. - Done by dual stack patches
  130. o the getaddr()/getaddr6() interface is not prepared for handling socktype
  131. "tagging", currently I abuse the sockflags bits for getting the ai_socktype
  132. downstream.
  133. - Still done by flags, seems clean enough.
  134. o implement comparison for mapped addesses: server in dual stack
  135. listening IPv6 must permit incoming streams from allowed IPv4 peer,
  136. currently you need to pass eg: --remote ffff::1.2.3.4
  137. - OpenVPN will compare all address of a remote
  138. but will still fail on mapped addresses
  139. * win32:
  140. o find out about mapped addresses, as I can't make it work
  141. with bound at ::1 and connect to 127.0.0.1
  142. - Should be fixed by 8832c6c - "Implement listing on IPv4/IPv6 dual
  143. socket on all platform"