Skip to content

Commit 7cef0d9

Browse files
authored
Merge pull request from GHSA-x84c-p2g9-rqv9
[26.0 backport] Disable IPv6 for endpoints in '--ipv6=false' networks.
2 parents 60b9add + 841c4c8 commit 7cef0d9

File tree

4 files changed

+105
-10
lines changed

4 files changed

+105
-10
lines changed

integration/network/ipvlan/ipvlan_test.go

+25-1
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,9 @@ func TestDockerNetworkIpvlan(t *testing.T) {
9494
}, {
9595
name: "L3Addressing",
9696
test: testIpvlanL3Addressing,
97+
}, {
98+
name: "NoIPv6",
99+
test: testIpvlanNoIPv6,
97100
},
98101
} {
99102

@@ -441,6 +444,28 @@ func testIpvlanL3Addressing(t *testing.T, ctx context.Context, client dclient.AP
441444
assert.Check(t, is.Contains(result.Combined(), "default dev eth0"))
442445
}
443446

447+
// Check that an ipvlan interface with '--ipv6=false' doesn't get kernel-assigned
448+
// IPv6 addresses, but the loopback interface does still have an IPv6 address ('::1').
449+
func testIpvlanNoIPv6(t *testing.T, ctx context.Context, client dclient.APIClient) {
450+
const netName = "ipvlannet"
451+
net.CreateNoError(ctx, t, client, netName, net.WithIPvlan("", "l3"))
452+
assert.Check(t, n.IsNetworkAvailable(ctx, client, netName))
453+
454+
id := container.Run(ctx, t, client, container.WithNetworkMode(netName))
455+
456+
loRes := container.ExecT(ctx, t, client, id, []string{"ip", "a", "show", "dev", "lo"})
457+
assert.Check(t, is.Contains(loRes.Combined(), " inet "))
458+
assert.Check(t, is.Contains(loRes.Combined(), " inet6 "))
459+
460+
eth0Res := container.ExecT(ctx, t, client, id, []string{"ip", "a", "show", "dev", "eth0"})
461+
assert.Check(t, is.Contains(eth0Res.Combined(), " inet "))
462+
assert.Check(t, !strings.Contains(eth0Res.Combined(), " inet6 "),
463+
"result.Combined(): %s", eth0Res.Combined())
464+
465+
sysctlRes := container.ExecT(ctx, t, client, id, []string{"sysctl", "-n", "net.ipv6.conf.eth0.disable_ipv6"})
466+
assert.Check(t, is.Equal(strings.TrimSpace(sysctlRes.Combined()), "1"))
467+
}
468+
444469
// TestIPVlanDNS checks whether DNS is forwarded, for combinations of l2/l3 mode,
445470
// with/without a parent interface, and with '--internal'. Note that, there's no
446471
// attempt here to give the ipvlan network external connectivity - when this test
@@ -452,7 +477,6 @@ func testIpvlanL3Addressing(t *testing.T, ctx context.Context, client dclient.AP
452477
// https://github.com/moby/moby/issues/47662
453478
func TestIPVlanDNS(t *testing.T) {
454479
skip.If(t, testEnv.IsRootless, "rootless mode has different view of network")
455-
456480
ctx := testutil.StartSpan(baseContext, t)
457481

458482
net.StartDaftDNS(t, "127.0.0.1")

integration/network/macvlan/macvlan_test.go

+29
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,9 @@ func TestDockerNetworkMacvlan(t *testing.T) {
7777
}, {
7878
name: "Addressing",
7979
test: testMacvlanAddressing,
80+
}, {
81+
name: "NoIPv6",
82+
test: testMacvlanNoIPv6,
8083
},
8184
} {
8285
tc := tc
@@ -298,6 +301,32 @@ func testMacvlanAddressing(t *testing.T, ctx context.Context, client client.APIC
298301
assert.Check(t, strings.Contains(result.Combined(), "default via 2001:db8:abca::254 dev eth0"))
299302
}
300303

304+
// Check that a macvlan interface with '--ipv6=false' doesn't get kernel-assigned
305+
// IPv6 addresses, but the loopback interface does still have an IPv6 address ('::1').
306+
func testMacvlanNoIPv6(t *testing.T, ctx context.Context, client client.APIClient) {
307+
const netName = "macvlannet"
308+
309+
net.CreateNoError(ctx, t, client, netName,
310+
net.WithMacvlan(""),
311+
net.WithOption("macvlan_mode", "bridge"),
312+
)
313+
assert.Check(t, n.IsNetworkAvailable(ctx, client, netName))
314+
315+
id := container.Run(ctx, t, client, container.WithNetworkMode(netName))
316+
317+
loRes := container.ExecT(ctx, t, client, id, []string{"ip", "a", "show", "dev", "lo"})
318+
assert.Check(t, is.Contains(loRes.Combined(), " inet "))
319+
assert.Check(t, is.Contains(loRes.Combined(), " inet6 "))
320+
321+
eth0Res := container.ExecT(ctx, t, client, id, []string{"ip", "a", "show", "dev", "eth0"})
322+
assert.Check(t, is.Contains(eth0Res.Combined(), " inet "))
323+
assert.Check(t, !strings.Contains(eth0Res.Combined(), " inet6 "),
324+
"result.Combined(): %s", eth0Res.Combined())
325+
326+
sysctlRes := container.ExecT(ctx, t, client, id, []string{"sysctl", "-n", "net.ipv6.conf.eth0.disable_ipv6"})
327+
assert.Check(t, is.Equal(strings.TrimSpace(sysctlRes.Combined()), "1"))
328+
}
329+
301330
// TestMACVlanDNS checks whether DNS is forwarded, with/without a parent
302331
// interface, and with '--internal'. Note that there's no attempt here to give
303332
// the macvlan network external connectivity - when this test supplies a parent

integration/networking/bridge_test.go

+37-2
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ import (
44
"context"
55
"fmt"
66
"regexp"
7+
"strings"
78
"testing"
89
"time"
910

@@ -611,8 +612,8 @@ func TestInternalNwConnectivity(t *testing.T) {
611612
assert.Check(t, is.Contains(res.Stderr(), "Network is unreachable"))
612613
}
613614

614-
// Check that the container's interface has no IPv6 address when IPv6 is
615-
// disabled in a container via sysctl.
615+
// Check that the container's interfaces have no IPv6 address when IPv6 is
616+
// disabled in a container via sysctl (including 'lo').
616617
func TestDisableIPv6Addrs(t *testing.T) {
617618
skip.If(t, testEnv.DaemonInfo.OSType == "windows")
618619

@@ -676,6 +677,40 @@ func TestDisableIPv6Addrs(t *testing.T) {
676677
}
677678
}
678679

680+
// Check that an interface to an '--ipv6=false' network has no IPv6
681+
// address - either IPAM assigned, or kernel-assigned LL, but the loopback
682+
// interface does still have an IPv6 address ('::1').
683+
func TestNonIPv6Network(t *testing.T) {
684+
skip.If(t, testEnv.DaemonInfo.OSType == "windows")
685+
686+
ctx := setupTest(t)
687+
d := daemon.New(t)
688+
d.StartWithBusybox(ctx, t)
689+
defer d.Stop(t)
690+
691+
c := d.NewClientT(t)
692+
defer c.Close()
693+
694+
const netName = "testnet"
695+
network.CreateNoError(ctx, t, c, netName)
696+
defer network.RemoveNoError(ctx, t, c, netName)
697+
698+
id := container.Run(ctx, t, c, container.WithNetworkMode(netName))
699+
defer c.ContainerRemove(ctx, id, containertypes.RemoveOptions{Force: true})
700+
701+
loRes := container.ExecT(ctx, t, c, id, []string{"ip", "a", "show", "dev", "lo"})
702+
assert.Check(t, is.Contains(loRes.Combined(), " inet "))
703+
assert.Check(t, is.Contains(loRes.Combined(), " inet6 "))
704+
705+
eth0Res := container.ExecT(ctx, t, c, id, []string{"ip", "a", "show", "dev", "eth0"})
706+
assert.Check(t, is.Contains(eth0Res.Combined(), " inet "))
707+
assert.Check(t, !strings.Contains(eth0Res.Combined(), " inet6 "),
708+
"result.Combined(): %s", eth0Res.Combined())
709+
710+
sysctlRes := container.ExecT(ctx, t, c, id, []string{"sysctl", "-n", "net.ipv6.conf.eth0.disable_ipv6"})
711+
assert.Check(t, is.Equal(strings.TrimSpace(sysctlRes.Combined()), "1"))
712+
}
713+
679714
// Test that it's possible to set a sysctl on an interface in the container.
680715
// Regression test for https://github.com/moby/moby/issues/47619
681716
func TestSetInterfaceSysctl(t *testing.T) {

libnetwork/osl/interface_linux.go

+14-7
Original file line numberDiff line numberDiff line change
@@ -363,17 +363,24 @@ func setInterfaceIP(nlh *netlink.Handle, iface netlink.Link, i *Interface) error
363363
}
364364

365365
func setInterfaceIPv6(nlh *netlink.Handle, iface netlink.Link, i *Interface) error {
366-
if i.AddressIPv6() == nil {
366+
addr := i.AddressIPv6()
367+
// IPv6 must be enabled on the interface if and only if the network is
368+
// IPv6-enabled. For an interface on an IPv4-only network, if IPv6 isn't
369+
// disabled, the interface will be put into IPv6 multicast groups making
370+
// it unexpectedly susceptible to NDP cache poisoning, route injection, etc.
371+
// (At present, there will always be a pre-configured IPv6 address if the
372+
// network is IPv6-enabled.)
373+
if err := setIPv6(i.ns.path, i.DstName(), addr != nil); err != nil {
374+
return fmt.Errorf("failed to configure ipv6: %v", err)
375+
}
376+
if addr == nil {
367377
return nil
368378
}
369-
if err := checkRouteConflict(nlh, i.AddressIPv6(), netlink.FAMILY_V6); err != nil {
379+
if err := checkRouteConflict(nlh, addr, netlink.FAMILY_V6); err != nil {
370380
return err
371381
}
372-
if err := setIPv6(i.ns.path, i.DstName(), true); err != nil {
373-
return fmt.Errorf("failed to enable ipv6: %v", err)
374-
}
375-
ipAddr := &netlink.Addr{IPNet: i.AddressIPv6(), Label: "", Flags: syscall.IFA_F_NODAD}
376-
return nlh.AddrAdd(iface, ipAddr)
382+
nlAddr := &netlink.Addr{IPNet: addr, Label: "", Flags: syscall.IFA_F_NODAD}
383+
return nlh.AddrAdd(iface, nlAddr)
377384
}
378385

379386
func setInterfaceLinkLocalIPs(nlh *netlink.Handle, iface netlink.Link, i *Interface) error {

0 commit comments

Comments
 (0)