From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 905A47942C for ; Tue, 4 May 2021 12:12:36 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 6C45C273E0 for ; Tue, 4 May 2021 12:12:36 +0200 (CEST) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [94.136.29.106]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 55AAC27353 for ; Tue, 4 May 2021 12:12:33 +0200 (CEST) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id 21B8542A40 for ; Tue, 4 May 2021 12:12:33 +0200 (CEST) From: Stoiko Ivanov To: pve-devel@lists.proxmox.com Date: Tue, 4 May 2021 12:12:20 +0200 Message-Id: <20210504101222.21276-7-s.ivanov@proxmox.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210504101222.21276-1-s.ivanov@proxmox.com> References: <20210504101222.21276-1-s.ivanov@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL 0.011 Adjusted score from AWL reputation of From: address KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH docs 1/3] pveproxy: add note about bindv6only sysctl X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 May 2021 10:12:36 -0000 Seems certain hosting environments (e.g. OVH) set net.ipv6.bindv6only to 1, which caused problems for those users after the 6.4 upgrade. Signed-off-by: Stoiko Ivanov --- pveproxy.adoc | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/pveproxy.adoc b/pveproxy.adoc index 8d02418..665e575 100644 --- a/pveproxy.adoc +++ b/pveproxy.adoc @@ -62,6 +62,9 @@ The default policy is `allow`. Listening IP ------------ +By default the `pveproxy` and `spiceproxy` daemons listen on the wildcard +address and accept connections from both IPv4 and IPv6 clients. + By setting `LISTEN_IP` in `/etc/default/pveproxy` you can control to which IP address the `pveproxy` and `spiceproxy` daemons bind. The IP-address needs to be configured on the system. @@ -102,6 +105,12 @@ long-running worker processes, for example a running console or shell from a virtual guest. So, please use a maintenance window to bring this change in effect. +NOTE: setting the `sysctl` `net.ipv6.bindv6only` to `1` will cause the daemons + to only accept connection from IPv6 clients. This non-default setting usually + also causes other issues. Either remove the `sysctl` setting, or set the + `LISTEN_IP` to `0.0.0.0` (which will only allow IPv4 clients). + + SSL Cipher Suite ---------------- -- 2.20.1