Re: [lxc-devel] [PATCH] hwaddr templating (with fixes from comments 2)

2014-01-13 Thread Serge Hallyn
Quoting l...@zitta.fr (l...@zitta.fr): Le 07/01/2014 01:07, Serge Hallyn a écrit : Quoting l...@zitta.fr (l...@zitta.fr): This change introduce mac address templating. By setting lxc.network.hwaddr to something like fe:xx:xx:xx:xx:xx each x will be replaced by a random value. If

Re: [lxc-devel] [PATCH] hwaddr templating (with fixes from comments 2)

2014-01-11 Thread lxc
Le 07/01/2014 01:07, Serge Hallyn a écrit : Quoting l...@zitta.fr (l...@zitta.fr): This change introduce mac address templating. By setting lxc.network.hwaddr to something like fe:xx:xx:xx:xx:xx each x will be replaced by a random value. If less significant bit of first byte is templated,

Re: [lxc-devel] [PATCH] hwaddr templating

2014-01-06 Thread Serge Hallyn
Quoting Serge Hallyn (serge.hal...@ubuntu.com): Quoting Guillaume ZITTA (l...@zitta.fr): This change introduce mac address templating. By setting lxc.network.hwaddr to something like fe:xx:xx:xx:xx:xx each x will be replaced by a random value. If less significant bit of first byte is

Re: [lxc-devel] [PATCH] hwaddr templating

2014-01-06 Thread S . Çağlar Onur
On Mon, Jan 6, 2014 at 11:46 AM, Serge Hallyn serge.hal...@ubuntu.com wrote: Quoting Serge Hallyn (serge.hal...@ubuntu.com): Quoting Guillaume ZITTA (l...@zitta.fr): This change introduce mac address templating. By setting lxc.network.hwaddr to something like fe:xx:xx:xx:xx:xx each x

Re: [lxc-devel] [PATCH] hwaddr templating

2014-01-06 Thread lxc
Le 06/01/2014 20:01, Serge Hallyn a écrit : Quoting Kent R. Spillner (kspill...@acm.org): On Mon, Jan 06, 2014 at 01:54:14PM +0100, Guillaume ZITTA wrote: This chage introduce also a common randinit() function that could be used to initialize random generator. Is there any reason to always

Re: [lxc-devel] [PATCH] hwaddr templating (with fixes from comments)

2014-01-06 Thread lxc
This change introduce mac address templating. By setting lxc.network.hwaddr to something like fe:xx:xx:xx:xx:xx each x will be replaced by a random value. If less significant bit of first byte is templated, it will be set to 0. This change introduce also a common randinit() function that could

Re: [lxc-devel] [PATCH] hwaddr templating

2014-01-06 Thread Serge Hallyn
Quoting l...@zitta.fr (l...@zitta.fr): Le 06/01/2014 20:01, Serge Hallyn a écrit : Quoting Kent R. Spillner (kspill...@acm.org): On Mon, Jan 06, 2014 at 01:54:14PM +0100, Guillaume ZITTA wrote: This chage introduce also a common randinit() function that could be used to initialize

Re: [lxc-devel] [PATCH] hwaddr templating

2014-01-06 Thread Kent R. Spillner
On Mon, Jan 06, 2014 at 01:01:03PM -0600, Serge Hallyn wrote: When will this ever fail on Linux? Does Android provide /dev/urandom? For one thing, when you're in a nested container and not allowed to read /dev/urandom :) Ahhh, yes, of course! :) Do we need to worry about draining the

Re: [lxc-devel] [PATCH] hwaddr templating

2014-01-06 Thread Serge Hallyn
Quoting Kent R. Spillner (kspill...@acm.org): On Mon, Jan 06, 2014 at 06:04:07PM -0600, Kent R. Spillner wrote: Hrrrmmm... My suggestion is more wasteful, but the original randinit() can still be abused to drain the pool (albeit more slowly). I wonder how bad it is in reality, however; I