On Sat, May 20, 2023 at 07:47:46PM +0200, Florian Obser wrote:
> On 2023-05-20 19:37 +02, Paul de Weerd <we...@weirdnet.nl> wrote:
> > On Sat, May 20, 2023 at 05:33:11PM +0200, Florian Obser wrote:
> > | In case this turns out to be useful for unlocking work in the kernel.
> > | 
> > | It's a minimum diff, if we want to go this way we probably want to move
> > | init_soiikey() to the engine process and stop bouncing through the main
> > | process when an interface changes.
> > | 
> > | This changes behaviour: in -current we can change the sysctl and down/up
> > | an interface to read the new value, with this diff that no longer
> > | works. slaacd will (and can) only read the file on startup.

Having to restart slaacd when changing soii.key at runtime seems fine to me,
it's a seed and not really a config file, anyway.

> > | 
> > | This has consequences for the installer: slaacd starts before
> > | /mnt/etc/soii.key is available in the upgrade case. Which in turn means
> > | that we get a different IPv6 address in the installer than in the
> > | running system. I don't know how big of an issue that is.
> >
> > Can't speak for others, but my use case for soii-addresses is for
> > incoming connections - outgoing ones should use the temporary privacy
> > addressed.  So for the installer it doesn't matter.
> >
> > My guess is that this goes for many (most? all?) users of
> > soii-addresses, so it should be safe to not have those in the
> > installer during upgrades.
> 
> I'm worried that someone runs a completely locked down network.
> They installed a server, figured out the random but stable IP address
> and added it to their firewall and only allow communication from known
> IP addresses.
> 
> They will be fine if they use sysupgrade(8). The installed base is
> probably smaller than 6.

Lots of time still until release to find out for real.

Reply via email to