Skip to content

Enables mac address spoofing for WSL #11616

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
chuwza opened this issue May 24, 2024 · 2 comments
Closed

Enables mac address spoofing for WSL #11616

chuwza opened this issue May 24, 2024 · 2 comments

Comments

@chuwza
Copy link

chuwza commented May 24, 2024

Is your feature request related to a problem? Please describe.
I want to use the docker engine on the Ubuntu installation via WSL2 and use the macvlan network so I can set up containers with dedicated IP

Describe the solution you'd like
I actually use Hyper-V to create Ubuntu to get macvlan working. Two points are needed:

  1. Hyper-V with mac address spoofing turned on
    屏幕截图(413)z

  2. Ubuntu with network mixing turned on.
    "sudo ifconfig eth0 promisc"

But the problem with Ubuntu created by WSL2 is that there is no place to turn on mac address spoofing in WSL2, which is the key to macvlan not working!

Currently, I use Windows 11. WSL can be custom configured via the .wslconfig file, for example
[wsl2]
networkingMode=bridged
vmSwitch=WSLBridge
So this is how I'd like to get to the point where I can get WSL to support mac address spoofing (using the config file)
[wsl2]
macspoofing=yes

Additional context
I prefer docker engine to docker desktop, so I'd really like you guys to fix this. That way, we can both run docker on Windows with maximum efficiency, and Windows will work fine with host and macvlan mode containers!

@chuwza chuwza added the feature label May 24, 2024
Copy link

Logs are required for review from WSL team

If this a feature request, please reply with '/feature'. If this is a question, reply with '/question'.
Otherwise please attach logs by following the instructions below, your issue will not be reviewed unless they are added. These logs will help us understand what is going on in your machine.

How to collect WSL logs

Download and execute collect-wsl-logs.ps1 in an administrative powershell prompt:

Invoke-WebRequest -UseBasicParsing "https://raw.githubusercontent.com/microsoft/WSL/master/diagnostics/collect-wsl-logs.ps1" -OutFile collect-wsl-logs.ps1
Set-ExecutionPolicy Bypass -Scope Process -Force
.\collect-wsl-logs.ps1

The scipt will output the path of the log file once done.

Once completed please upload the output files to this Github issue.

Click here for more info on logging
If you choose to email these logs instead of attaching to the bug, please send them to [email protected] with the number of the github issue in the subject, and in the message a link to your comment in the github issue and reply with '/emailed-logs'.

View similar issues

Please view the issues below to see if they solve your problem, and if the issue describes your problem please consider closing this one and thumbs upping the other issue to help us prioritize it!

Open similar issues:

Closed similar issues:

Note: You can give me feedback by thumbs upping or thumbs downing this comment.

Copy link
Contributor

This issue has been automatically closed since it has not had any author activity for the past 7 days. If you're still experiencing this issue please re-file it as a new issue.

Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant