From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) by lore.proxmox.com (Postfix) with ESMTPS id ADE921FF143 for ; Mon, 19 Jan 2026 12:13:38 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 77D6C1B977; Mon, 19 Jan 2026 12:13:45 +0100 (CET) Message-ID: Date: Mon, 19 Jan 2026 12:13:41 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird To: Proxmox VE development discussion , Stefan Hanreich References: <20260119110534.18200-1-h.laimer@proxmox.com> <1a741933-de82-4928-a68d-69f4b823e7e8@proxmox.com> Content-Language: en-US From: Hannes Laimer In-Reply-To: <1a741933-de82-4928-a68d-69f4b823e7e8@proxmox.com> X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1768821167979 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.058 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: Re: [pve-devel] [PATCH pve-network v2] sdn: evpn: fix IPv6 exitnode local routing X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: Proxmox VE development discussion Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Errors-To: pve-devel-bounces@lists.proxmox.com Sender: "pve-devel" On 1/19/26 12:08, Stefan Hanreich wrote: > On 1/19/26 12:05 PM, Hannes Laimer wrote: >> IPv6 subnets on exitnodes had no working local-routing path. Add a v6 >> address on the xvrf veth pair and install IPv6 routes via that next-hop. >> >> Signed-off-by: Hannes Laimer >> --- >> v2: >> - change `address6` to `address`, ifreload2 does not pick up address6. >> Probably had the address still attached from manualy testing so I >> didn't notice when I tested this for v1 >> >> src/PVE/Network/SDN/Controllers/EvpnPlugin.pm | 7 ++++++- >> src/PVE/Network/SDN/Zones/EvpnPlugin.pm | 2 ++ >> 2 files changed, 8 insertions(+), 1 deletion(-) >> >> diff --git a/src/PVE/Network/SDN/Controllers/EvpnPlugin.pm b/src/PVE/Network/SDN/Controllers/EvpnPlugin.pm >> index e53000a..74fc35d 100644 >> --- a/src/PVE/Network/SDN/Controllers/EvpnPlugin.pm >> +++ b/src/PVE/Network/SDN/Controllers/EvpnPlugin.pm >> @@ -462,7 +462,12 @@ sub generate_vnet_frr_config { >> foreach my $subnetid (sort keys %{$subnets}) { >> my $subnet = $subnets->{$subnetid}; >> my $cidr = $subnet->{cidr}; >> - push @controller_config, "ip route $cidr 10.255.255.2 xvrf_$zoneid"; >> + my ($ip) = split(/\//, $cidr, 2); >> + if (Net::IP::ip_is_ipv6($ip)) { >> + push @controller_config, "ipv6 route $cidr fd00:ffff::2 xvrf_$zoneid"; > > Wouldn't it make sense to use the link-local address instead? For IPv4 > it would make sense as well imo to use an APIPA address instead, but > technically that's a breaking change. I guess we could even route all > IPv4 traffic via the IPv6 link-local address. > I did try just `ipv6 route $cidr xvrf_$zoneid` since I assumed it would end up using the ll address, but it didn't. I am not super sure why, maybe cause it would be cross-vrf(?). Or did you mean just putting the ll address there explicitly? >> + } else { >> + push @controller_config, "ip route $cidr 10.255.255.2 xvrf_$zoneid"; >> + } >> } >> push(@{ $config->{frr_ip_protocol} }, @controller_config); >> } >> diff --git a/src/PVE/Network/SDN/Zones/EvpnPlugin.pm b/src/PVE/Network/SDN/Zones/EvpnPlugin.pm >> index 6d89499..18aecb9 100644 >> --- a/src/PVE/Network/SDN/Zones/EvpnPlugin.pm >> +++ b/src/PVE/Network/SDN/Zones/EvpnPlugin.pm >> @@ -327,6 +327,7 @@ sub generate_sdn_config { >> @iface_config = (); >> push @iface_config, "link-type veth"; >> push @iface_config, "address 10.255.255.1/30"; >> + push @iface_config, "address fd00:ffff::1/126" if $ipv6; >> push @iface_config, "veth-peer-name $iface_xvrfp"; >> push @iface_config, "mtu " . ($mtu + 50) if $mtu; >> push(@{ $config->{$iface_xvrf} }, @iface_config) if !$config->{$iface_xvrf}; >> @@ -334,6 +335,7 @@ sub generate_sdn_config { >> @iface_config = (); >> push @iface_config, "link-type veth"; >> push @iface_config, "address 10.255.255.2/30"; >> + push @iface_config, "address fd00:ffff::2/126" if $ipv6; >> push @iface_config, "veth-peer-name $iface_xvrf"; >> push @iface_config, "vrf $vrf_iface"; >> push @iface_config, "mtu " . ($mtu + 50) if $mtu; > > > > _______________________________________________ > pve-devel mailing list > pve-devel@lists.proxmox.com > https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel > > _______________________________________________ pve-devel mailing list pve-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel