[CentOS] IPv6 range provisioning question

Wed Jun 10 18:08:39 UTC 2009
Vadtec <vadtec at vadtec.net>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

A few months back, I tried to use the network scripts to provision an IPv6 range
like can be done with IPv4. I was using CentOS 5.2 at the time and was informed
that 5.2 was broken in this regard. I have upgraded to CentOS 5.3 now and I am
trying to get IPv6 to provision an entire range of IPs, but I am still getting
the old behavior and no IPs are being provisioned.

I have been following the docs provided by the link in the
/etc/sysconfig/network-scripts/ifup-ipv6 at
http://www.deepspace6.net/projects/initscripts-ipv6.html#id2801589 and using the
following configs:

/etc/sysconfig/network
NETWORKING=yes
GATEWAY=***.***.***.***
GATEWAYDEV=eth0
HOSTNAME=vadtec

NETWORKING_IPV6=yes
IPV6FORWARDING=no
IPV6_AUTOCONF=no
IPV6_AUTOTUNNEL=no
IPV6_DEFAULTDEV=eth0:1
IPV6_DEFAULTGW=2001:0470:0103:001A::1

/etc/sysconfig/network-scripts/ifcfg-eth0-1
DEVICE=eth0:1
IPV6INIT=yes
IPV6ADDR=2001:0470:0103:001A:0001:0000:0000:0000:/96
IPV6_AUTOCONF=no
IPV6_ROUTER=no
IPV6FORWARDING=no
ONBOOT=no

When I run service network restart, it doesn't even provision the default IPv6
GW on eth0:1, nor does eth0:1 even show up.

If I run tail /var/log/boot.log, boot.log is empty. If I run tail
/var/log/messages, I see varying amounts of:

Jun 10 11:42:14 localhost kernel: [208192.884652] eth0: duplicate address detected!

I see no other errors or messages saying anything is wrong or otherwise.

This is becoming very tiresome. It would be really nice to be able to provision
IPv6 ranges as needed instead of having to place scripts in rc.local to manually
provision the IPs that are needed, one by one. Any help is greatly appreciated.

Vadtec
vadtec at vadtec.net

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=1JlU
-----END PGP SIGNATURE-----