Restarting systemd-networkd normally clears your 'ip rules' routing policies

March 13, 2024

Here's something that I learned recently: if systemd-networkd restarts, for example because of a package update for it that includes an automatic daemon restart, it will clear your 'ip rules' routing policies (and also I think your routing table, although you may not notice that much). If you've set up policy based routing of your own (or some program has done that as part of its operation), this may produce unpleasant surprises.

Systemd-networkd does this fundamentally because you can set ip routing policies in .network files. When networkd is restarted, one of the things it does is re-set-up whatever routing policies you specified; if you didn't specify any, it clears them. This is a reasonably sensible decision, both to deal with changes from previously specified routing policies and to also give people a way to clean out their experiments and reset to a known good base state. Similar logic applies to routes.

This can be controlled through networkd.conf and its drop-in files, by setting ManageForeignRoutingPolicyRules=no and perhaps ManageForeignRoutes=no. Without testing it through a networkd restart, I believe that the settings I want are:

[Network]
ManageForeignRoutingPolicyRules=no
ManageForeignRoutes=no

The minor downside of this for me is that certain sorts of route updates will have to be done by hand, instead of by updating .network files and then restarting networkd.

While having an option to do this sort of clearing is sensible, I am dubious about the current default. In practice, coherently specifying routing policies through .network files is so much of a pain that I suspect that few people do it that way; instead I suspect that most people either script it to issue the 'ip rule' commands (as I do) or use software that does it for them (and I know that such software exists). It would be great if networkd could create and manage high level policies for you (such as isolated interfaces), but the current approach is both verbose and limited in what you can do with it.

(As far as I know, networkd can't express rules for networks that can be brought up and torn down, because it's not an event-based system where you can have it react to the appearance of an interface or a configured network. It's possible I'm wrong, but if so it doesn't feel well documented.)

All of this is especially unfortunate on Ubuntu servers, which normally configure their networking through netplan. Netplan will more or less silently use networkd as the backend to actually implement what you wrote in your Netplan configuration, leaving you exposed to this, and on top of that Netplan itself has limitations on what routing policies you can express (pushing you even more towards running 'ip rule' yourself).


Comments on this page:

From 193.219.181.219 at 2024-03-14 02:49:36:

This is a reasonably sensible decision, both to deal with changes from previously specified routing policies and to also give people a way to clean out their experiments and reset to a known good base state. Similar logic applies to routes.

In part it's probably also done because rules did not have (until very recently) a proto field that would allow networkd to distinguish "rules it has added before restart" from "rules added externally" (like how routing daemons generally flush only their own routes but not foreign routes).

Of course, having that field clearly doesn't stop networkd from flushing everything regardless, but it's still a prerequisite if it was ever made to not do so by default.

and on top of that Netplan itself has limitations on what routing policies you can express (pushing you even more towards running 'ip rule' yourself).

I assume Ubuntu still lets you ignore Netplan and write .network files by hand ? (Either that, or write foo.network.d/ drop-ins to extend the Netplan-generated configs, if it comes to that...)

Written on 13 March 2024.
« What do we count as 'manual' management of TLS certificates
You might want to think about if your system serial numbers are sensitive »

Page tools: View Source, View Normal.
Search:
Login: Password:

Last modified: Wed Mar 13 22:18:11 2024
This dinky wiki is brought to you by the Insane Hackers Guild, Python sub-branch.