2021-09-26 17:31:37 +00:00
< span style = "font-weight: bold; color: red;" > While functional and tested to some extent, this project is still in early development phase: don't use in production or critical environments yet.< / span >
2021-03-18 11:56:03 +00:00
# passt: Plug A Simple Socket Transport
2021-09-26 17:31:37 +00:00
_passt_ implements a translation layer between a Layer-2 network interface and
native Layer-4 sockets (TCP, UDP, ICMP/ICMPv6 echo) on a host. It doesn't
2021-03-18 11:56:03 +00:00
require any capabilities or privileges, and it can be used as a simple
replacement for Slirp.
2021-09-26 17:31:37 +00:00
< img src = "/builds/latest/web/passt_overview.png" usemap = "#image-map" class = "bright" style = "z-index: 20; position: relative;" >
2021-03-24 10:09:41 +00:00
< map name = "image-map" id = "map_overview" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/tcp.7.html" coords = "229,275,246,320,306,294,287,249" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://lwn.net/Articles/420799/" coords = "230,201,243,246,297,232,289,186" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/udp.7.html" coords = "234,129,236,175,297,169,293,126" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://en.wiktionary.org/wiki/passen#German" coords = "387,516,841,440,847,476,393,553" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/ipv4/udp.c" coords = "398,123,520,157" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/ipv4/ping.c" coords = "397,164,517,197" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/ipv4/tcp.c" coords = "398,203,516,237" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/unix.7.html" coords = "569,306,674,359" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/udp.c" coords = "719,152,740,176,792,134,768,108" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/icmp.c" coords = "727,206,827,120,854,150,754,238" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/tcp.c" coords = "730,273,774,326,947,176,902,119" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/igmp.c" coords = "865,273,912,295" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/arp.c" coords = "854,300,897,320" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/ndp.c" coords = "869,325,909,344" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/mld.c" coords = "924,267,964,289" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/dhcpv6.c" coords = "918,297,986,317" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/dhcp.c" coords = "931,328,981,352" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/udp.7.html" coords = "1073,115,1059,154,1120,176,1133,137" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://lwn.net/Articles/420799/" coords = "966,113,942,152,1000,175,1017,136" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/tcp.7.html" coords = "1059,175,1039,213,1098,237,1116,197" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/ipv4/udp.c" coords = "1203,154,1326,189" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/ipv4/ping.c" coords = "1202,195,1327,228" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/ipv4/tcp.c" coords = "1204,236,1327,269" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://en.wikipedia.org/wiki/OSI_model#Layer_architecture" coords = "1159,52,1325,147" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man4/veth.4.html" coords = "1119,351,1157,339,1198,340,1236,345,1258,359,1229,377,1176,377,1139,375,1114,365" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man4/veth.4.html" coords = "1044,471,1090,461,1126,462,1150,464,1176,479,1160,491,1121,500,1081,501,1044,491,1037,483" shape = "poly" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/network_namespaces.7.html" coords = "240,379,524,452" shape = "rect" >
< area class = "map_area" target = "_blank" href = "https://man7.org/linux/man-pages/man7/netlink.7.html" coords = "1119,278,1117,293,1165,304,1169,288" shape = "poly" >
2021-09-26 17:31:37 +00:00
< area class = "map_area" target = "_blank" href = "https://passt.top/passt/tree/conf.c" coords = "989,294,1040,264,1089,280,986,344" shape = "poly" >
2021-03-24 10:09:41 +00:00
< / map >
2021-04-13 20:54:08 +00:00
< canvas id = "map_highlight" style = "border: 0px; z-index: 10; position: fixed; pointer-events: none" > < / canvas >
2021-03-24 10:09:41 +00:00
< script >
function canvas_position(el) {
var rect = el.getBoundingClientRect();
var canvas = document.getElementById('map_highlight');
canvas.width = rect.right - rect.left;
canvas.height = rect.bottom - rect.top;
canvas.style.left = rect.left + 'px';
canvas.style.top = rect.top + 'px';
}
function map_hover() {
var coords = this.coords.split(',');
var canvas = document.getElementById('map_highlight');
var ctx = canvas.getContext('2d');
canvas_position(this);
ctx.fillStyle = 'rgba(255, 255, 255, .3)';
ctx.lineWidth = 1.5;
ctx.strokeStyle = 'rgba(255, 255, 100, 1)';
ctx.beginPath();
ctx.setLineDash([15, 15]);
if (this.shape == "poly") {
ctx.moveTo(coords[0], coords[1]);
for (item = 2; item < coords.length - 1 ; item + = 2 ) {
ctx.lineTo(coords[item], coords[item + 1])
}
} else if (this.shape == "rect") {
ctx.rect(coords[0], coords[1],
coords[2] - coords[0], coords[3] - coords[1]);
}
ctx.closePath();
ctx.stroke();
ctx.fill();
}
function map_out() {
var canvas = document.getElementById('map_highlight');
var ctx = canvas.getContext('2d');
ctx.clearRect(0, 0, canvas.width, canvas.height);
}
var map_areas = document.getElementsByClassName("map_area");
for (var i = 0; i < map_areas.length ; i + + ) {
map_areas[i].onmouseover = map_hover;
map_areas[i].onmouseout = map_out;
}
< / script >
2021-03-20 06:22:09 +00:00
2021-09-26 17:31:37 +00:00
# pasta: Pack A Subtle Tap Abstraction
_pasta_ (same binary as _passt_ , different command) offers equivalent
functionality, for network namespaces: traffic is forwarded using a tap
interface inside the namespace, without the need to create further interfaces on
the host, hence not requiring any capabilities or privileges.
It also implements a tap bypass path for local connections: packets with a local
destination address are moved directly between Layer-4 sockets, avoiding Layer-2
translations, using the _splice_ (2) and _recvmmsg_ (2)/_sendmmsg_(2) system calls
for TCP and UDP, respectively.
< img src = "/builds/latest/web/pasta_overview.png" class = "bright" style = "z-index: 20; position: relative;" >
- [Motivation ](#motivation )
2021-03-18 11:56:03 +00:00
- [Non-functional Targets ](#non-functional-targets )
- [Interfaces and Environment ](#interfaces-and-environment )
- [Services ](#services )
- [Addresses ](#addresses )
- [Protocols ](#protocols )
- [Ports ](#ports )
2021-09-27 11:45:17 +00:00
- [Demo ](#demo )
2021-09-26 17:31:37 +00:00
- [Continuous Integration ](#continuous-integration )
- [Performance ](#performance )
2021-03-18 11:56:03 +00:00
- [Try it ](#try-it )
- [Contribute ](#contribute )
2021-09-26 17:31:37 +00:00
## Motivation
### passt
2021-03-18 11:56:03 +00:00
When container workloads are moved to virtual machines, the network traffic is
typically forwarded by interfaces operating at data link level. Some components
in the containers ecosystem (such as _service meshes_ ), however, expect
applications to run locally, with visible sockets and processes, for the
purposes of socket redirection, monitoring, port mapping.
2021-09-26 17:31:37 +00:00
To solve this issue, user mode networking, as provided e.g. by _libslirp_ ,
can be used. Existing solutions implement a full TCP/IP stack, replaying traffic
on sockets that are local to the pod of the service mesh. This creates the
illusion of application processes running on the same host, eventually separated
by user namespaces.
2021-03-18 11:56:03 +00:00
While being almost transparent to the service mesh infrastructure, that kind of
solution comes with a number of downsides:
* three different TCP/IP stacks (guest, adaptation and host) need to be
2021-09-26 17:31:37 +00:00
traversed for every service request
2021-03-18 11:56:03 +00:00
* addressing needs to be coordinated to create the pretense of consistent
addresses and routes between guest and host environments. This typically needs
a NAT with masquerading, or some form of packet bridging
* the traffic seen by the service mesh and observable externally is a distant
replica of the packets forwarded to and from the guest environment:
* TCP congestion windows and network buffering mechanisms in general operate
differently from what would be naturally expected by the application
* protocols carrying addressing information might pose additional challenges,
as the applications don't see the same set of addresses and routes as they
would if deployed with regular containers
_passt_ implements a thinner layer between guest and host, that only implements
2021-09-26 17:31:37 +00:00
what's strictly needed to pretend processes are running locally. The TCP
adaptation doesn't keep per-connection packet buffers, and reflects observed
sending windows and acknowledgements between the two sides. This TCP adaptation
is needed as _passt_ runs without the `CAP_NET_RAW` capability: it can't create
raw IP sockets on the pod, and therefore needs to map packets at Layer-2 to
Layer-4 sockets offered by the host kernel.
2021-03-18 11:56:03 +00:00
The problem and this approach are illustrated in more detail, with diagrams,
[here ](https://gitlab.com/abologna/kubevirt-and-kvm/-/blob/master/Networking.md ).
2021-09-26 17:31:37 +00:00
### pasta
On Linux, regular users can create network namespaces and run application
services inside them. However, connecting namespaces to other namespaces and to
external hosts requires the creation of network interfaces, such as `veth`
pairs, which needs in turn elevated privileges or the `CAP_NET_ADMIN`
capability. _pasta_ , similarly to _slirp4netns_ , solves this problem by creating
a tap interface available to processes in the namespace, and mapping network
traffic outside the namespace using native Layer-4 sockets.
Existing approaches typically implement a full, generic TCP/IP stack for this
translation between data and transport layers, without the possibility of
speeding up local connections, and usually requiring NAT. _pasta_ :
* avoids the need for a generic, full-fledged TCP/IP stack by coordinating TCP
connection dynamics between sender and receiver
* offers a fast bypass path for local connections: if a process connects to
another process on the same host across namespaces, data is directly forwarded
using pairs of Layer-4 sockets
* with default options, maps routing and addressing information to the
namespace, avoiding any need for NAT
2021-03-18 11:56:03 +00:00
## Non-functional Targets
Security and maintainability goals:
* no dynamic memory allocation
2021-09-26 17:31:37 +00:00
* ~5 000 LoC target
2021-03-18 11:56:03 +00:00
* no external dependencies
## Interfaces and Environment
_passt_ exchanges packets with _qemu_ via UNIX domain socket, using the `socket`
back-end in qemu. Currently, qemu can only connect to a listening process via
TCP. Two temporary solutions are available:
* a [patch ](https://passt.top/passt/tree/qemu ) for qemu
* a wrapper, [qrap ](https://passt.top/passt/tree/qrap.c ), that connects to a
UNIX domain socket and starts qemu, which can now use the file descriptor
that's already opened
This approach, compared to using a _tap_ device, doesn't require any security
capabilities, as we don't need to create any interface.
2021-09-26 17:31:37 +00:00
_pasta_ runs out of the box with any recent (post-3.8) Linux kernel.
2021-03-18 11:56:03 +00:00
## Services
2021-09-26 17:31:37 +00:00
_passt_ and _pasta_ provide some minimalistic implementations of networking
services:
2021-03-18 11:56:03 +00:00
2021-04-13 19:59:47 +00:00
* [ARP proxy ](https://passt.top/passt/tree/arp.c ), that resolves the address of
2021-03-18 11:56:03 +00:00
the host (which is used as gateway) to the original MAC address of the host
* [DHCP server ](https://passt.top/passt/tree/dhcp.c ), a simple implementation
2021-09-26 17:31:37 +00:00
handing out one single IPv4 address to the guest or namespace, namely, the
same address as the first one configured for the upstream host interface, and
passing the nameservers configured on the host
2021-03-18 11:56:03 +00:00
* [NDP proxy ](https://passt.top/passt/tree/ndp.c ), which can also assign prefix
and nameserver using SLAAC
2021-04-13 19:59:47 +00:00
* [DHCPv6 server ](https://passt.top/passt/tree/dhcpv6.c ): a simple
2021-09-26 17:31:37 +00:00
implementation handing out one single IPv6 address to the guest or namespace,
namely, the the same address as the first one configured for the upstream host
interface, and passing the nameservers configured on the host
2021-03-18 11:56:03 +00:00
## Addresses
2021-09-26 17:31:37 +00:00
For IPv4, the guest or namespace is assigned, via DHCP, the same address as the
upstream interface of the host, and the same default gateway as the default
gateway of the host. Addresses are translated in case the guest is seen using a
different address from the assigned one.
For IPv6, the guest or namespace is assigned, via SLAAC, the same prefix as the
upstream interface of the host, the same default route as the default route of
the host, and, if a DHCPv6 client is running in the guest or namespace, also the
same address as the upstream address of the host. This means that, with a DHCPv6
client in the guest or namespace, addresses don't need to be translated. Should
the client use a different address, the destination address is translated for
packets going to the guest or to the namespace.
2021-03-18 11:56:03 +00:00
2021-09-26 17:31:37 +00:00
### Local connections with _passt_
2021-03-18 11:56:03 +00:00
2021-09-26 17:31:37 +00:00
For UDP and TCP, for both IPv4 and IPv6, packets from the host addressed to a
loopback address are forwarded to the guest with their source address changed to
the address of the gateway or first hop of the default route. This mapping is
reversed on the other way.
### Local connections with _pasta_
Packets addressed to a loopback address in either namespace are directly
forwarded to the corresponding (or configured) port in the other namespace.
Similarly as _passt_ , packets from the non-init namespace addressed to the
default gateway, which are therefore sent via the tap device, will have their
destination address translated to the loopback address.
udp: Connection tracking for ephemeral, local ports, and related fixes
As we support UDP forwarding for packets that are sent to local
ports, we actually need some kind of connection tracking for UDP.
While at it, this commit introduces a number of vaguely related fixes
for issues observed while trying this out. In detail:
- implement an explicit, albeit minimalistic, connection tracking
for UDP, to allow usage of ephemeral ports by the guest and by
the host at the same time, by binding them dynamically as needed,
and to allow mapping address changes for packets with a loopback
address as destination
- set the guest MAC address whenever we receive a packet from tap
instead of waiting for an ARP request, and set it to broadcast on
start, otherwise DHCPv6 might not work if all DHCPv6 requests time
out before the guest starts talking IPv4
- split context IPv6 address into address we assign, global or site
address seen on tap, and link-local address seen on tap, and make
sure we use the addresses we've seen as destination (link-local
choice depends on source address). Similarly, for IPv4, split into
address we assign and address we observe, and use the address we
observe as destination
- introduce a clock_gettime() syscall right after epoll_wait() wakes
up, so that we can remove all the other ones and pass the current
timestamp to tap and socket handlers -- this is additionally needed
by UDP to time out bindings to ephemeral ports and mappings between
loopback address and a local address
- rename sock_l4_add() to sock_l4(), no semantic changes intended
- include <arpa/inet.h> in passt.c before kernel headers so that we
can use <netinet/in.h> macros to check IPv6 address types, and
remove a duplicate <linux/ip.h> inclusion
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
2021-04-29 14:59:20 +00:00
2021-03-18 11:56:03 +00:00
## Protocols
2021-09-26 17:31:37 +00:00
_passt_ and _pasta_ support TCP, UDP and ICMP/ICMPv6 echo (requests and
replies). More details about the TCP implementation are available
2021-03-18 11:56:03 +00:00
[here ](https://passt.top/passt/tree/tcp.c ), and for the UDP
implementation [here ](https://passt.top/passt/tree/udp.c ).
2021-09-26 17:31:37 +00:00
An IGMP/MLD proxy is currently work in progress.
2021-03-18 11:56:03 +00:00
## Ports
2021-09-26 17:31:37 +00:00
### passt
To avoid the need for explicit port mapping configuration, _passt_ can bind to
all unbound non-ephemeral (0-49152) TCP and UDP ports. Binding to low ports
(0-1023) will fail without additional capabilities, and ports already bound
(service proxies, etc.) will also not be used. Smaller subsets of ports, with
port translations, are also configurable.
udp: Connection tracking for ephemeral, local ports, and related fixes
As we support UDP forwarding for packets that are sent to local
ports, we actually need some kind of connection tracking for UDP.
While at it, this commit introduces a number of vaguely related fixes
for issues observed while trying this out. In detail:
- implement an explicit, albeit minimalistic, connection tracking
for UDP, to allow usage of ephemeral ports by the guest and by
the host at the same time, by binding them dynamically as needed,
and to allow mapping address changes for packets with a loopback
address as destination
- set the guest MAC address whenever we receive a packet from tap
instead of waiting for an ARP request, and set it to broadcast on
start, otherwise DHCPv6 might not work if all DHCPv6 requests time
out before the guest starts talking IPv4
- split context IPv6 address into address we assign, global or site
address seen on tap, and link-local address seen on tap, and make
sure we use the addresses we've seen as destination (link-local
choice depends on source address). Similarly, for IPv4, split into
address we assign and address we observe, and use the address we
observe as destination
- introduce a clock_gettime() syscall right after epoll_wait() wakes
up, so that we can remove all the other ones and pass the current
timestamp to tap and socket handlers -- this is additionally needed
by UDP to time out bindings to ephemeral ports and mappings between
loopback address and a local address
- rename sock_l4_add() to sock_l4(), no semantic changes intended
- include <arpa/inet.h> in passt.c before kernel headers so that we
can use <netinet/in.h> macros to check IPv6 address types, and
remove a duplicate <linux/ip.h> inclusion
Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
2021-04-29 14:59:20 +00:00
UDP ephemeral ports are bound dynamically, as the guest uses them.
2021-03-18 11:56:03 +00:00
2021-09-26 17:31:37 +00:00
If all ports are forwarded, service proxies and other services running in the
container need to be started before _passt_ starts.
### pasta
With default options, _pasta_ scans for bound ports on init and non-init
namespaces, and automatically forwards them from the other side. Port forwarding
is fully configurable with command line options.
2021-09-27 11:45:17 +00:00
## Demo
### pasta
< p > < video id = "demo_pasta_video" style = "width: 70%; height: auto; max-height: 90%" controls >
< source src = "/builds/latest/web/demo_pasta.webm" type = "video/webm" >
< / video > < / p >
### passt
< p > < video id = "demo_passt_video" style = "width: 70%; height: auto; max-height: 90%" controls >
< source src = "/builds/latest/web/demo_passt.webm" type = "video/webm" >
< / video > < / p >
2021-09-26 17:31:37 +00:00
## Continuous Integration
< p > < video id = "ci_video" style = "width: 90%; height: auto; max-height: 90%" controls >
< source src = "/builds/latest/web/ci.webm" type = "video/webm" >
< / video > < / p >
< script src = "/builds/latest/web/ci.js" > < / script >
Test logs [here ](https://passt.top/builds/latest/test/ ).
## Performance
< script src = "/builds/latest/web/perf.js" > < / script >
2021-03-18 11:56:03 +00:00
## Try it
2021-09-26 17:31:37 +00:00
### passt
2021-03-18 11:56:03 +00:00
* build from source:
git clone https://passt.top/passt
cd passt
make
2021-09-26 17:31:37 +00:00
* alternatively, static builds for x86_64, with or without AVX2 instructions,
as of the latest commit are also available for convenience
[here ](https://passt.top/builds/latest/x86_64/avx2/ ) and
[here ](https://passt.top/builds/latest/x86_64/ ). Convenience, non-official
packages for Debian (and derivatives) and RPM-based distributions are also
available there. These binaries and packages are simply built with:
2021-05-10 05:34:24 +00:00
2021-09-26 17:31:37 +00:00
CFLAGS="-static" make avx2
make pkgs
make static
make pkgs
2021-05-10 05:34:24 +00:00
2021-09-26 17:31:37 +00:00
* have a look at the _man_ page for synopsis and options:
2021-03-18 11:56:03 +00:00
2021-09-26 17:31:37 +00:00
man ./passt.1
2021-03-18 11:56:03 +00:00
* run the demo script, that creates a network namespace called `passt` , sets up
sets up a _veth_ pair and and addresses, together with NAT for IPv4 and NDP
proxying for IPv6, then starts _passt_ in the network namespace:
doc/demo.sh
* from the same network namespace, start qemu. At the moment, qemu doesn't
support UNIX domain sockets for the `socket` back-end. Two alternatives:
* use the _qrap_ wrapper, which maps a tap socket descriptor to _passt_ 's
UNIX domain socket, for example:
ip netns exec passt ./qrap 5 qemu-system-x86_64 ... -net socket,fd=5 -net nic,model=virtio ...
* or patch qemu with [this patch ](https://passt.top/passt/tree/qemu/0001-net-Allow-also-UNIX-domain-sockets-to-be-used-as-net.patch )
and start it like this:
qemu-system-x86_64 ... -net socket,connect=/tmp/passt.socket -net nic,model=virtio
2021-03-20 06:22:09 +00:00
* alternatively, you can use libvirt, with [this patch ](https://passt.top/passt/tree/libvirt/0001-conf-Introduce-support-for-UNIX-domain-socket-as-qem.patch ),
to start qemu (with the patch mentioned above), with this kind of network
interface configuration:
< interface type = 'client' >
< mac address = '52:54:00:02:6b:60' / >
< source path = '/tmp/passt.socket' / >
< model type = 'virtio' / >
< address type = 'pci' domain = '0x0000' bus = '0x01' slot = '0x00' function = '0x0' / >
< / interface >
2021-03-18 11:56:03 +00:00
* and that's it, you should now have TCP connections, UDP, and ICMP/ICMPv6
echo working from/to the guest for IPv4 and IPv6
* to connect to a service on the VM, just connect to the same port directly
with the address of the network namespace. For example, to ssh to the guest,
from the main namespace on the host:
ssh 192.0.2.2
2021-09-26 17:31:37 +00:00
### passt
2021-03-18 11:56:03 +00:00
2021-09-26 17:31:37 +00:00
* build from source:
2021-09-18 05:47:25 +00:00
2021-09-26 17:31:37 +00:00
git clone https://passt.top/passt
cd passt
make
* alternatively, static builds for x86_64, with or without AVX2 instructions,
as of the latest commit are also available for convenience
[here ](https://passt.top/builds/latest/x86_64/avx2/ ) and
[here ](https://passt.top/builds/latest/x86_64/ ). Convenience, non-official
packages for Debian (and derivatives) and RPM-based distributions are also
available there. These binaries and packages are simply built with:
CFLAGS="-static" make avx2
make pkgs
make static
make pkgs
* have a look at the _man_ page for synopsis and options:
man ./pasta.1
2021-09-18 05:47:25 +00:00
2021-09-26 17:31:37 +00:00
* start pasta with:
./pasta
* you're now inside a new user and network namespace. For IPv6, SLAAC happens
right away as _pasta_ sets up the interface, but DHCPv6 support is available
as well. For IPv4, configure the interface with a DHCP client:
dhclient
and, optionally:
dhclient -6
* and that's it, you should now have TCP connections, UDP, and ICMP/ICMPv6
echo working from/to the guest for IPv4 and IPv6
* to connect to a service inside the namespace, just connect to the same port
using the loopback address.
## Contribute
2021-09-18 05:47:25 +00:00
2021-09-26 17:31:37 +00:00
Public bug tracker and mailing lists are coming soon. For the moment being, send
patches and issue reports to [sbrivio@redhat.com ](mailto:sbrivio@redhat.com ).