Skip to content

fix(#12253): BPF, check failsafe for DHCP#12518

Open
haoadoreorange wants to merge 2 commits intoprojectcalico:masterfrom
haoadoreorange:master
Open

fix(#12253): BPF, check failsafe for DHCP#12518
haoadoreorange wants to merge 2 commits intoprojectcalico:masterfrom
haoadoreorange:master

Conversation

@haoadoreorange
Copy link
Copy Markdown

@haoadoreorange haoadoreorange commented Apr 17, 2026

When netplan apply triggers DHCP renewal, packets use source 0.0.0.0 / dest 255.255.255.255 which are not in the route table as local host IPs. The existing failsafe checks are gated on local host IP recognition, so they are skipped and DHCP is denied by policy.

Add failsafe checks for:

  • Outbound: when source IP is void (0.0.0.0)
  • Inbound: when dest has no route

@haoadoreorange haoadoreorange requested a review from a team as a code owner April 17, 2026 00:30
@marvin-tigera marvin-tigera added this to the Calico v3.33.0 milestone Apr 17, 2026
@marvin-tigera marvin-tigera added release-note-required Change has user-facing impact (no matter how small) docs-pr-required Change is not yet documented labels Apr 17, 2026
@CLAassistant
Copy link
Copy Markdown

CLAassistant commented Apr 17, 2026

CLA assistant check
All committers have signed the CLA.

Tests that failsafe ports are checked when source IP
is 0.0.0.0 and when dest has no route.

Both fail without the accompanying fix.

Signed-off-by: haoadoreorange <github@h4o.dev>
@haoadoreorange haoadoreorange changed the title fix(12253): BPF, add failing tests for DHCP failsafe fix(#12253): BPF, add failing tests for DHCP failsafe Apr 17, 2026
@haoadoreorange haoadoreorange changed the title fix(#12253): BPF, add failing tests for DHCP failsafe fix(#12253): BPF, check failsafe for DHCP Apr 17, 2026
When `netplan apply` triggers DHCP renewal, packets use
source 0.0.0.0 / dest 255.255.255.255 which are not in
the route table as local host IPs. The existing failsafe
checks are gated on local host IP recognition, so they
are skipped and DHCP is denied by policy.

Add failsafe checks for:
- Outbound: when source IP is void (0.0.0.0)
- Inbound: when dest has no route
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

docs-pr-required Change is not yet documented release-note-required Change has user-facing impact (no matter how small)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants