<MichaelRaskin>
So far I find the overhead of socks proxying everything acceptable more often than not
<MichaelRaskin>
But yeah, if you are OK with host-namespace-level IP traffic, you should just use a bridge. Or reuse the same TAP interface, by the way
<MichaelRaskin>
ARGHHH
<MichaelRaskin>
I _think_ I know what was the problem now…
<MichaelRaskin>
OK, on the host I should set the nodad (skip duplicate address detection) option, otherwise I need to wait for the dup-detection in the empty network
<MichaelRaskin>
This at least gives me proxy.
<MichaelRaskin>
I seem to be able to access the permitted ports, but 9p mount requires something more
tilpner_ is now known as tilpner
pie_ has quit [Ping timeout: 258 seconds]
pie_ has joined #spectrum
pie__ has joined #spectrum
pie_ has quit [Ping timeout: 260 seconds]
<tazjin>
qyliss: I've been doing some cgit quality-of-life improvements that you're welcome to steal, namely I wrote a filter in Rust that can syntax highlight individual files and render Markdown with properly highlighted code snippets: https://git.tazj.in/tree/tools/cheddar
<tazjin>
iirc you mentioned Markdown rendering in the repo the other day
<MichaelRaskin>
qyliss: re: bridging: by the way, what should bridging give you beyond what a shared TAP device with a firewall would give
<MichaelRaskin>
Mystery solved
<MichaelRaskin>
sin_server.sin_family = AF_INET;
<MichaelRaskin>
Yep, 9p over TCP support in the Linux kernel assumes IPv4.
* multi
rolls eyes
<MichaelRaskin>
Well, one could always do a NAT46 insided the VM
<MichaelRaskin>
But after finding this line in net/9p/trans_fd.c I am more on the «Just use a private IPv4 subnet» side
<puck>
oh yeah i hit this issue before
<puck>
i ran 9p over wireguard at some point (inside a container) -- but i wanted v6 only in the wireguard bits :(
<MichaelRaskin>
Well, you could do endpoint NAT 4-to-6
<multi>
alternatively, you could use some sort of userland proxy (such as a combination of s6-ipcserver, s6-tcpclient and s6-ioconnect) if you hard-require single stack v6 network traversal
<multi>
and connect to a unix socket and have the connection forwarded over tcp
<MichaelRaskin>
I already have a few layers of socat forwarding the stuff
<multi>
fair enough
<MichaelRaskin>
I mean, in my case it is a fully contained IPv4 subnet _only_ used for VM TAP connecting to socats carrying the actual socket connections
<MichaelRaskin>
And I think the dream for SpectrumOS mainline (which I won'y use directly, but I hope to reuse a lot of code from there) is to have just direct sockets one way or another from VM to VM without host-level IP traffic and with virtio 9p mounts