From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id D4D94794B1 for ; Tue, 4 May 2021 12:12:36 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id B4CF6273E1 for ; Tue, 4 May 2021 12:12:36 +0200 (CEST) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [94.136.29.106]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 9472227360 for ; Tue, 4 May 2021 12:12:33 +0200 (CEST) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id 6F91642A39 for ; Tue, 4 May 2021 12:12:33 +0200 (CEST) From: Stoiko Ivanov To: pve-devel@lists.proxmox.com Date: Tue, 4 May 2021 12:12:22 +0200 Message-Id: <20210504101222.21276-9-s.ivanov@proxmox.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210504101222.21276-1-s.ivanov@proxmox.com> References: <20210504101222.21276-1-s.ivanov@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL 0.011 Adjusted score from AWL reputation of From: address KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pve-devel] [PATCH docs 3/3] network: shortly document disabling ipv6 support X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 May 2021 10:12:36 -0000 Given that quite a few HOWTOs on the internet suggest disabling ipv6 support via kernel commandline, which can cause quite many undesired side-effects (e.g. ip6tables as used in pve-firewall errors out) this patch adds a short section documenting, that disabling ipv6 is not necessary usually and if needed better done via sysctl. Signed-off-by: Stoiko Ivanov --- pve-network.adoc | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/pve-network.adoc b/pve-network.adoc index add220e..37667b8 100644 --- a/pve-network.adoc +++ b/pve-network.adoc @@ -548,6 +548,25 @@ iface vmbr0 inet manual ---- +Disabling IPv6 on the Node +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +{pve} works correctly in all environments, irrespective of whether IPv6 is +deployed or not. We recommend leaving all settings at the provided defaults. + +Should you still need to disable support for IPv6 on your node, do so by +creating an appropriate `sysctl.conf (5)` snippet file and setting the proper +https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt[sysctls], +for example adding `/etc/sysctl.d/disable-ipv6.conf` with content: + +---- +net.ipv6.conf.all.disable_ipv6 = 1 +net.ipv6.conf.default.disable_ipv6 = 1 +---- + +This method is preferred to disabling the loading of the IPv6 module on the +https://www.kernel.org/doc/Documentation/networking/ipv6.rst[kernel commandline]. + //// TODO: explain IPv6 support? TODO: explain OVS -- 2.20.1