Skip to content
This repository has been archived by the owner on Oct 9, 2021. It is now read-only.

randomize loopback range and interface port numbers #46

Closed
bwks opened this issue Aug 16, 2018 · 1 comment · Fixed by #47
Closed

randomize loopback range and interface port numbers #46

bwks opened this issue Aug 16, 2018 · 1 comment · Fixed by #47
Assignees

Comments

@bwks
Copy link
Owner

bwks commented Aug 16, 2018

at the moment, each guest takes its loopback ip and portrange from the same blocks (127.255.1.0/24) and (10000). This can result in conflicts between multiple labs for the same user or labs between users. The selection of the blocks should be randomized some how.

@bwks bwks self-assigned this Aug 17, 2018
@bwks
Copy link
Owner Author

bwks commented Aug 17, 2018

At the moment I have gone with randomizing the 2nd and 3rd octets of the loopback network. that gives ruffly 64K combinations which I think is good enough for now.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant