public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: Noah Gold <nkgold@google.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: Stefano Brivio <sbrivio@redhat.com>, passt-dev@passt.top
Subject: Re: Improved handling of changing DNS resolvers
Date: Mon, 30 Jan 2023 16:11:38 -0800	[thread overview]
Message-ID: <CAEJ_Dr98+sD8w0s=A-4XxQhFXqR-bYHfeq30dH3bifvr4Vd5sQ@mail.gmail.com> (raw)
In-Reply-To: <Y84nHTYdUK7RZYyo@yekko>

Sorry for the delay, I've been really busy this past week.

On Sun, Jan 22, 2023 at 10:26 PM David Gibson
<david@gibson.dropbear.id.au> wrote:
>
> On Sat, Jan 21, 2023 at 10:47:03AM +0100, Stefano Brivio wrote:
> > Hi Noah,
> >
> > Sorry for the delay, I didn't check pending mailing list posts for a
> > couple of days. Comments below:
> >
> > On Tue, 17 Jan 2023 11:50:50 -0800
> > Noah Gold <nkgold@google.com> wrote:
> >
> > > Hi folks,
> > >
> > > libslirp and Passt have different approaches to sharing DNS resolvers with
> > > the guest system, each with their own benefits & drawbacks. On the libslirp
> > > project, we're discussing [1] how to support DNS failover. Passt already has
> > >  support for this, but there is a drawback to its solution which prevents us
> > > from taking a similar approach: the resolvers are read exactly once, so if the
> > > host changes networks at runtime, the guest will not receive the updated
> > > resolvers and thus its connectivity will break.
>
> So, passt/pasta kinda-sorta binds itself to a particular host
> interface, so DNS won't be the only issue if the host changes
> network.  For one thing, at least by default the guest gets the same
> IP as the host, so if the host IP changes the guest will get out of
> sync.  We'll mostly cope with that ok, but there will be some edge
> cases which will break (most obviously if after the network change the
> guest wants to talk to something at the host's old address / its
> current address).
>
> > Right -- the main motivation behind this (other than simplicity) is that
> > we can close /etc/resolv.conf before sandboxing.
> >
> > However, we could keep a handle on it, just like we do for PID and pcap
> > files, while still unmounting the filesystem.
> >
> > And we could also use inotify to detect changes I guess -- we do the
> > same to monitor namespaces in pasta mode (see pasta_netns_quit_init()).
>
> All true, but I'm not sure those are actually the most pressing issues
> we'll face with a host network change.
>
> > > libslirp's current approach is to DNAT a single address exposed to the guest
> > > to one of the resolvers configured on the host. The problem here is that if that
> > > one resolver goes down, the guest can't resolve DNS names. We're
> > > considering changing so that instead of a single address, we expose a set of
> > > MAXNS addresses, and DNAT those 1:1 to the DNS resolvers registered with
> > > the host. Because the DNAT table lives on the host side, we can refresh the
> > > guest's resolvers whenever the host's resolvers change, but without the need to
> > > expire a DHCP lease (even with short leases, the guest will still lose
> > > connectivity
> > > for a time).
> > >
> > > Does this sound like an approach Passt would be open to adopting as well?
> >
> > Yes, definitely, patches would be very welcome.
>
> Hm, that's doesn't fit that easily into the passt model.  For the most
> part we don't NAT at all, we only have a couple of special cases where
> we do.  Because of that the problem with adding any extra NAT case is
> address allocation.  Currently we use the host's gateway address,
> which mostly works but is a bit troublesome.  I have some ideas I
> think will work better, but those don't necessarily get us more
> available addresses.

For libslirp we have the guest on a private subnet, so pulling addresses from
that pool is pretty easy. For passt is the issue that there is no address range,
or that the infrastructure to allocate from the range just doesn't exist yet?

When you say "we use the host's gateway address", what is it used for
exactly? (I didn't follow the loopback example below.)

>
> > Note that David (Cc'ed) is currently working on a generalised/flexible
> > address mapping mechanism, some kind of (simple) NAT table as far as I
> > understood it.
>
> That's a bit overstating it.  I'm making our current single NAT case
> (translating host side loopback to gateway address on the guest) more
> configurable.  I have plans (or at least ideas) for a more generalized
> NAT mechanism, but I'm really not implementing that yet.  What I'm
> doing now is kind of a soft prerequisite for that rework though (as
> well as useful in its own right).
>
> > This might even address your DNS idea already, I'm not sure, I'd wait
> > for him to comment.
>
> Hadn't considered specifically that model, but it's a reasonbly
> natural extension of it (address allocation is still a complication).
> I'll certainly consider this case when I do more on this.

It sounds like there might be a path to using NAT, but it's not something
that would be ready soon. Given that, would there be long term concerns
with using NAT for DNS in the way proposed here? I understand we can't
implement it now, but I'd like to understand if it's an approach we would
still rather avoid, even long term.

>
> --
> David Gibson                    | I'll have my music baroque, and my code
> david AT gibson.dropbear.id.au  | minimalist, thank you.  NOT _the_ _other_
>                                 | _way_ _around_!
> http://www.ozlabs.org/~dgibson

On Wed, Jan 25, 2023 at 9:55 AM Stefano Brivio <sbrivio@redhat.com> wrote:
>
> On Mon, 23 Jan 2023 17:20:13 +1100
> David Gibson <david@gibson.dropbear.id.au> wrote:
>
> > On Sat, Jan 21, 2023 at 10:47:03AM +0100, Stefano Brivio wrote:
> > > Hi Noah,
> > >
> > > Sorry for the delay, I didn't check pending mailing list posts for a
> > > couple of days. Comments below:
> > >
> > > On Tue, 17 Jan 2023 11:50:50 -0800
> > > Noah Gold <nkgold@google.com> wrote:
> > >
> > > > Hi folks,
> > > >
> > > > libslirp and Passt have different approaches to sharing DNS resolvers with
> > > > the guest system, each with their own benefits & drawbacks. On the libslirp
> > > > project, we're discussing [1] how to support DNS failover. Passt already has
> > > >  support for this, but there is a drawback to its solution which prevents us
> > > > from taking a similar approach: the resolvers are read exactly once, so if the
> > > > host changes networks at runtime, the guest will not receive the updated
> > > > resolvers and thus its connectivity will break.
> >
> > So, passt/pasta kinda-sorta binds itself to a particular host
> > interface, so DNS won't be the only issue if the host changes
> > network.  For one thing, at least by default the guest gets the same
> > IP as the host, so if the host IP changes the guest will get out of
> > sync.  We'll mostly cope with that ok, but there will be some edge
> > cases which will break (most obviously if after the network change the
> > guest wants to talk to something at the host's old address / its
> > current address).
>
> Noah, by the way, if your usage for DNS failover is related to a
> virtual machine being migrated to another host with different
> addressing, mind that you could simply tell qemu to connect to a new
> instance of passt. That's something you can't do with libslirp.

It's not related to machine migration, though that's another interesting
case with similar constraints. The use case I'm thinking about is for a
mobile device that may experience network changes as part of its
normal operation (e.g. changing wifi networks).

>
> Would that solve your problem, or your issue is specifically related to
> DNS failover without any VM migration playing a role?

It's not related to migration, but I wonder whether there's an idea there
which could be used. The approach I was taking was to make the
network component resilient to network changes. But another option is
to detect network changes and restart the network component. libslirp
still needs a way to support exposing multiple servers though, and I
wonder whether we would want to require library consumers to write
network awareness into their applications as opposed to solving it
for them.

>
> --
> Stefano
>

  parent reply	other threads:[~2023-01-31  0:11 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-17 18:51 Improved handling of changing DNS resolvers Noah Gold
2023-01-21  9:47 ` Stefano Brivio
2023-01-23  6:20   ` David Gibson
2023-01-25 17:55     ` Stefano Brivio
2023-01-31  0:11     ` Noah Gold [this message]
2023-02-02 11:09       ` Stefano Brivio
2023-02-14  2:45         ` Noah Gold
2023-02-14 15:06           ` Stefano Brivio

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAEJ_Dr98+sD8w0s=A-4XxQhFXqR-bYHfeq30dH3bifvr4Vd5sQ@mail.gmail.com' \
    --to=nkgold@google.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=passt-dev@passt.top \
    --cc=sbrivio@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).