Bug 588763

Summary: libguestfs should use non-public or link-local addresses for appliance network
Product: [Community] Virtualization Tools Reporter: Richard W.M. Jones <rjones>
Component: libguestfsAssignee: Richard W.M. Jones <rjones>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: low    
Version: unspecifiedCC: mbooth, virt-maint
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-05-12 11:49:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Richard W.M. Jones 2010-05-04 13:24:25 UTC
Description of problem:

When running network commands (eg. using
http://libguestfs.org/guestfs.3.html#guestfs_command ),
these can fail if they access a public service on the 10.x.x.x
network.  For example, if trying to run 'yum update' and if
yum has been configured to use a yum server or proxy which
is within the local network and therefore has a 10.x.x.x address.

This happens because inside the appliance we use qemu's
userspace network to talk from daemon to host library, and
qemu's userspace network by default is set to use the 10.x.x.x
address space for its own purposes.

Proposed solution is to switch to using link local addresses,
see: http://tools.ietf.org/html/rfc3927

Version-Release number of selected component (if applicable):

libguestfs 1.3.9

How reproducible:

Always.

Steps to Reproduce:
1. Run 'sh "yum -y update"'

Actual results:

Fails if the network command has to access any network
service which resolves to 10.x.x.x address.

Expected results:

Should not fail.

Additional info: