Activity log for bug #1671951

Date Who What changed Old value New value Message
2017-03-10 22:07:39 Ryan Harper bug added bug
2017-03-10 22:09:53 Ryan Harper attachment added ipv6_mtu.debdiff https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/4835554/+files/ipv6_mtu.debdiff
2017-03-11 00:29:47 Ubuntu Foundations Team Bug Bot tags curtin maas netplan curtin maas netplan patch
2017-03-11 00:29:54 Ubuntu Foundations Team Bug Bot bug added subscriber Ubuntu Sponsors Team
2017-03-11 01:00:39 Brian Murray tags curtin maas netplan patch curtin maas netplan patch zesty
2017-03-12 08:54:12 Mathew Hodson systemd (Ubuntu): importance Undecided Medium
2017-03-14 01:05:13 Jay Vosburgh bug added subscriber Jay Vosburgh
2017-03-14 15:47:29 Dan Streetman bug added subscriber Dan Streetman
2017-03-28 18:30:44 Jon Grimm bug added subscriber Jon Grimm
2017-08-09 18:12:38 Nish Aravamudan removed subscriber Ubuntu Sponsors Team
2017-10-04 19:50:35 Ryan Harper branch linked lp:~raharper/curtin/trunk.vmtest-remove-bug-timers
2017-10-05 15:47:33 Scott Moser systemd (Ubuntu): status New Confirmed
2018-01-26 20:14:35 Mike Pontillo bug added subscriber Mike Pontillo
2018-02-15 19:40:50 Francis Ginther tags curtin maas netplan patch zesty curtin id-5a6a5c89cfbc4063786d54f6 maas netplan patch zesty
2018-03-09 08:43:12 Eric Desrochers bug added subscriber Eric Desrochers
2018-08-16 12:24:39 Francis Ginther tags curtin id-5a6a5c89cfbc4063786d54f6 maas netplan patch zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch zesty
2018-08-29 13:33:34 Dimitri John Ledkov systemd (Ubuntu): status Confirmed Fix Released
2018-08-29 13:33:43 Dimitri John Ledkov nominated for series Ubuntu Bionic
2018-08-29 13:33:43 Dimitri John Ledkov bug task added systemd (Ubuntu Bionic)
2018-09-28 13:59:17 Scott Moser attachment added console log of curtin vmtest amd64 533 https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/5194078/+files/curtin-vmtest-devel-amd64-533-console.log
2018-09-28 14:27:21 Ryan Harper bug task added netplan.io (Ubuntu)
2018-09-28 14:29:01 Ryan Harper bug task added cloud-init (Ubuntu)
2018-09-28 14:59:46 Scott Moser cloud-init (Ubuntu): status New Confirmed
2018-09-28 14:59:49 Scott Moser cloud-init (Ubuntu Bionic): status New Confirmed
2018-10-05 14:16:29 Dimitri John Ledkov systemd (Ubuntu Bionic): status New In Progress
2018-10-08 10:14:26 Dimitri John Ledkov description 1) Zesty 2) systemd-232-19 3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section 4) networkd does not parse or read the value and does not apply this configuration to the interface. Upstream has discussed this issue here: https://github.com/systemd/systemd/pull/1533 But it's been closed in favor of only setting via RA. However, we know of multiple use-case which are currently supported in ifdupdown where we want to retain control over IPV6 MTU values outside of PMTU Discovery configurations. Some context from those discussions >> Client systems that route their ipv6 packets to a 6in4 router also >> have to have their ipv6 mtu lowered. They could lower their link mtu, >> so their ipv6 packets are small enough, but that reduces performance >> of their ipv4 network. Yes. Anything that creates a PMTUD black hole can result in situations where the higher header overhead of IPv6 will cause IPv4 to pass but IPv6 traffic to be dropped. One example here is egress from an ipsec tunnel wherein the next hop MTU is too low for IPv6 datagrams to pass. Another is VM -> whatever -> host bridge -> tunnel ingress. If the datagram cannot enter the tunnel due to size, it is dropped, and an ICMP response uses the tunnel address as a source, which may not be routable back to the origin. This one is an issue with IPv4 as well, and is one case where manually setting the IPv6 MTU lower than the (also manually set) device MTU is of benefit. In essence, any of these sort of cases that require an explicit setting of the device MTU will likely require a setting of the IPv6 mtu as well to account for its larger header overhead. = systemd = [Impact] * IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic. [Test Case] * Use IPv6MTUBytes= setting in a .network unit * Restart systemd-network * Check that there no error messages / warnings about not-recognizing this option * Check that MTU bytes, is at least IPv6MTUBytes on the interface [Regression Potential] * This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity. [Other Info] * Original bug report below = end of systemd = 1) Zesty 2) systemd-232-19 3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section 4) networkd does not parse or read the value and does not apply this configuration to the interface. Upstream has discussed this issue here: https://github.com/systemd/systemd/pull/1533 But it's been closed in favor of only setting via RA. However, we know of multiple use-case which are currently supported in ifdupdown where we want to retain control over IPV6 MTU values outside of PMTU Discovery configurations. Some context from those discussions >> Client systems that route their ipv6 packets to a 6in4 router also >> have to have their ipv6 mtu lowered. They could lower their link mtu, >> so their ipv6 packets are small enough, but that reduces performance >> of their ipv4 network.         Yes. Anything that creates a PMTUD black hole can result in situations where the higher header overhead of IPv6 will cause IPv4 to pass but IPv6 traffic to be dropped.         One example here is egress from an ipsec tunnel wherein the next hop MTU is too low for IPv6 datagrams to pass. Another is VM -> whatever -> host bridge -> tunnel ingress. If the datagram cannot enter the tunnel due to size, it is dropped, and an ICMP response uses the tunnel address as a source, which may not be routable back to the origin. This one is an issue with IPv4 as well, and is one case where manually setting the IPv6 MTU lower than the (also manually set) device MTU is of benefit.         In essence, any of these sort of cases that require an explicit setting of the device MTU will likely require a setting of the IPv6 mtu as well to account for its larger header overhead.
2018-11-19 14:02:50 Łukasz Zemczak systemd (Ubuntu Bionic): status In Progress Fix Committed
2018-11-19 14:02:53 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2018-11-19 14:02:54 Łukasz Zemczak bug added subscriber SRU Verification
2018-11-19 14:03:01 Łukasz Zemczak tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-needed verification-needed-bionic zesty
2018-12-04 12:16:52 Dimitri John Ledkov tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-needed verification-needed-bionic zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-done verification-done-bionic zesty
2019-04-08 15:07:42 Dan Streetman removed subscriber Dan Streetman
2019-05-01 12:26:22 Francis Ginther tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd maas netplan patch verification-done verification-done-bionic zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-done verification-done-bionic zesty
2019-08-20 18:07:49 Mathieu Trudel-Lapierre netplan.io (Ubuntu): status New In Progress
2019-08-22 01:13:47 Launchpad Janitor netplan.io (Ubuntu): status In Progress Fix Released
2019-08-27 16:20:19 Mathieu Trudel-Lapierre description = systemd = [Impact] * IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic. [Test Case] * Use IPv6MTUBytes= setting in a .network unit * Restart systemd-network * Check that there no error messages / warnings about not-recognizing this option * Check that MTU bytes, is at least IPv6MTUBytes on the interface [Regression Potential] * This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity. [Other Info] * Original bug report below = end of systemd = 1) Zesty 2) systemd-232-19 3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section 4) networkd does not parse or read the value and does not apply this configuration to the interface. Upstream has discussed this issue here: https://github.com/systemd/systemd/pull/1533 But it's been closed in favor of only setting via RA. However, we know of multiple use-case which are currently supported in ifdupdown where we want to retain control over IPV6 MTU values outside of PMTU Discovery configurations. Some context from those discussions >> Client systems that route their ipv6 packets to a 6in4 router also >> have to have their ipv6 mtu lowered. They could lower their link mtu, >> so their ipv6 packets are small enough, but that reduces performance >> of their ipv4 network.         Yes. Anything that creates a PMTUD black hole can result in situations where the higher header overhead of IPv6 will cause IPv4 to pass but IPv6 traffic to be dropped.         One example here is egress from an ipsec tunnel wherein the next hop MTU is too low for IPv6 datagrams to pass. Another is VM -> whatever -> host bridge -> tunnel ingress. If the datagram cannot enter the tunnel due to size, it is dropped, and an ICMP response uses the tunnel address as a source, which may not be routable back to the origin. This one is an issue with IPv4 as well, and is one case where manually setting the IPv6 MTU lower than the (also manually set) device MTU is of benefit.         In essence, any of these sort of cases that require an explicit setting of the device MTU will likely require a setting of the IPv6 mtu as well to account for its larger header overhead. = netplan.io = [Impact]  * IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic. [Test Case] * Apply a netplan configuration that specifices ipv6-mtu: network: version: 2 ethernets: eth0: dhcp4: true dhcp6: true ipv6-mtu: 6000  * Check that MTU bytes, is at least IPv6MTUBytes on the interface: $ sysctl net.ipv6.conf.eth0.mtu net.ipv6.conf.eth0.mtu = 6000 [Regression Potential]  * This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity. [Other Info]  * Original bug report below = end of netplan.io = = systemd = [Impact]  * IPv6 traffic failing to send/receive due to incompatible/low MTU setting. Specifically, IPv6 traffic may have higher MTU requirements than IPv4 traffic and thus may need to be overridden and/or set to a higher value than IPv6 traffic. [Test Case]  * Use IPv6MTUBytes= setting in a .network unit  * Restart systemd-network  * Check that there no error messages / warnings about not-recognizing this option  * Check that MTU bytes, is at least IPv6MTUBytes on the interface [Regression Potential]  * This is a future compatible backport of an additional keyword not used by default. It may result in MTU change to a higher value, which should not cause loss of connectivity. [Other Info]  * Original bug report below = end of systemd = 1) Zesty 2) systemd-232-19 3) I need to configure the IPV6 MTU for tunneling by adding an IPv6MTUBytes=1480 value in the .network file for an interface with an IPV6 static address in the [Network] section 4) networkd does not parse or read the value and does not apply this configuration to the interface. Upstream has discussed this issue here: https://github.com/systemd/systemd/pull/1533 But it's been closed in favor of only setting via RA. However, we know of multiple use-case which are currently supported in ifdupdown where we want to retain control over IPV6 MTU values outside of PMTU Discovery configurations. Some context from those discussions >> Client systems that route their ipv6 packets to a 6in4 router also >> have to have their ipv6 mtu lowered. They could lower their link mtu, >> so their ipv6 packets are small enough, but that reduces performance >> of their ipv4 network.         Yes. Anything that creates a PMTUD black hole can result in situations where the higher header overhead of IPv6 will cause IPv4 to pass but IPv6 traffic to be dropped.         One example here is egress from an ipsec tunnel wherein the next hop MTU is too low for IPv6 datagrams to pass. Another is VM -> whatever -> host bridge -> tunnel ingress. If the datagram cannot enter the tunnel due to size, it is dropped, and an ICMP response uses the tunnel address as a source, which may not be routable back to the origin. This one is an issue with IPv4 as well, and is one case where manually setting the IPv6 MTU lower than the (also manually set) device MTU is of benefit.         In essence, any of these sort of cases that require an explicit setting of the device MTU will likely require a setting of the IPv6 mtu as well to account for its larger header overhead.
2019-08-27 22:47:41 Brian Murray netplan.io (Ubuntu Bionic): status New Fix Committed
2019-08-27 22:47:48 Brian Murray tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-done verification-done-bionic zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-needed verification-needed-bionic zesty
2019-08-30 12:40:28 Francis Ginther tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 maas netplan patch verification-needed verification-needed-bionic zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-needed verification-needed-bionic zesty
2019-09-30 13:33:14 Balint Reczey systemd (Ubuntu Bionic): status Fix Committed In Progress
2019-09-30 13:33:18 Balint Reczey systemd (Ubuntu Bionic): assignee Balint Reczey (rbalint)
2019-09-30 13:38:52 Balint Reczey bug added subscriber Balint Reczey
2019-09-30 16:16:20 Dan Streetman bug added subscriber Dan Streetman
2019-09-30 20:32:37 Steve Langasek systemd (Ubuntu Bionic): status In Progress Fix Committed
2019-10-02 16:25:06 Mathieu Trudel-Lapierre tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-needed verification-needed-bionic zesty curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic
2019-10-02 17:58:59 Mathieu Trudel-Lapierre tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic verification-done-disco
2019-10-02 21:51:22 Brian Murray nominated for series Ubuntu Disco
2019-10-02 21:51:22 Brian Murray bug task added cloud-init (Ubuntu Disco)
2019-10-02 21:51:22 Brian Murray bug task added systemd (Ubuntu Disco)
2019-10-02 21:51:22 Brian Murray bug task added netplan.io (Ubuntu Disco)
2019-10-02 21:51:45 Brian Murray netplan.io (Ubuntu Disco): status New Fix Committed
2019-10-02 21:54:51 Launchpad Janitor netplan.io (Ubuntu Disco): status Fix Committed Fix Released
2019-10-02 21:55:08 Launchpad Janitor netplan.io (Ubuntu Bionic): status Fix Committed Fix Released
2019-10-02 21:55:28 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2019-10-10 02:41:46 Launchpad Janitor systemd (Ubuntu Bionic): status Fix Committed Fix Released
2019-10-25 17:23:32 Mathieu Trudel-Lapierre systemd (Ubuntu Bionic): status Fix Released Triaged
2019-10-25 17:23:35 Mathieu Trudel-Lapierre systemd (Ubuntu Disco): status New Triaged
2019-12-13 15:12:23 Dan Streetman nominated for series Ubuntu Focal
2019-12-13 15:12:23 Dan Streetman bug task added cloud-init (Ubuntu Focal)
2019-12-13 15:12:23 Dan Streetman bug task added systemd (Ubuntu Focal)
2019-12-13 15:12:23 Dan Streetman bug task added netplan.io (Ubuntu Focal)
2019-12-13 15:12:23 Dan Streetman nominated for series Ubuntu Eoan
2019-12-13 15:12:23 Dan Streetman bug task added cloud-init (Ubuntu Eoan)
2019-12-13 15:12:23 Dan Streetman bug task added systemd (Ubuntu Eoan)
2019-12-13 15:12:23 Dan Streetman bug task added netplan.io (Ubuntu Eoan)
2019-12-13 15:13:15 Dan Streetman bug watch added https://github.com/systemd/systemd/issues/13914
2019-12-13 15:13:15 Dan Streetman bug task added systemd
2019-12-13 15:14:31 Dan Streetman systemd (Ubuntu Focal): status Fix Released In Progress
2019-12-13 15:14:31 Dan Streetman systemd (Ubuntu Focal): assignee Dan Streetman (ddstreet)
2019-12-13 15:14:44 Dan Streetman systemd (Ubuntu Eoan): status New In Progress
2019-12-13 15:14:44 Dan Streetman systemd (Ubuntu Eoan): assignee Dan Streetman (ddstreet)
2019-12-13 15:14:58 Dan Streetman systemd (Ubuntu Disco): status Triaged In Progress
2019-12-13 15:14:58 Dan Streetman systemd (Ubuntu Disco): assignee Dan Streetman (ddstreet)
2019-12-13 15:15:10 Dan Streetman systemd (Ubuntu Bionic): status Triaged In Progress
2019-12-13 15:15:10 Dan Streetman systemd (Ubuntu Bionic): assignee Balint Reczey (rbalint) Dan Streetman (ddstreet)
2019-12-13 15:15:38 Dan Streetman netplan.io (Ubuntu Eoan): status New Fix Released
2019-12-13 15:20:30 Dan Streetman tags curtin id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch verification-done-bionic verification-done-disco bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco
2019-12-13 19:10:03 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ddstreet/ubuntu/+source/systemd/+git/systemd/+merge/376801
2020-01-14 13:05:45 Dan Streetman systemd (Ubuntu Disco): status In Progress Won't Fix
2020-01-23 16:26:02 Launchpad Janitor systemd (Ubuntu Focal): status In Progress Fix Released
2020-02-03 21:40:29 Steve Langasek systemd (Ubuntu Eoan): status In Progress Fix Committed
2020-02-03 21:40:37 Steve Langasek bug added subscriber Ubuntu Stable Release Updates Team
2020-02-03 21:40:48 Steve Langasek tags bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco verification-needed verification-needed-eoan
2020-02-03 21:52:33 Steve Langasek systemd (Ubuntu Bionic): status In Progress Fix Committed
2020-02-03 21:52:49 Steve Langasek tags bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-bionic verification-done-disco verification-needed verification-needed-eoan bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan
2020-02-05 14:24:25 Ryan Harper attachment added curtin vmtest logs for ipv6 mtu verification https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/5325665/+files/bug-1671951-curtin-vmtest-verification.tar.gz
2020-02-05 14:36:28 Ryan Harper tags bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-done-eoan verification-needed verification-needed-bionic
2020-02-05 14:38:02 Ryan Harper tags bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-done-eoan verification-needed verification-needed-bionic bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan
2020-02-05 16:29:38 Launchpad Janitor systemd (Ubuntu Bionic): status Fix Committed Fix Released
2020-02-05 16:29:38 Launchpad Janitor cve linked 2019-20386
2020-02-05 16:29:38 Launchpad Janitor cve linked 2019-3843
2020-02-05 16:29:38 Launchpad Janitor cve linked 2019-3844
2020-02-05 16:29:38 Launchpad Janitor cve linked 2020-1712
2020-02-06 15:22:59 Dimitri John Ledkov systemd (Ubuntu Eoan): status Fix Committed In Progress
2020-02-06 21:41:56 Steve Langasek systemd (Ubuntu Eoan): status In Progress Fix Committed
2020-02-06 21:46:00 Steve Langasek systemd (Ubuntu Bionic): status Fix Released Fix Committed
2020-02-07 22:30:42 Ryan Harper attachment added curtin vmtest logs for ipv6 mtu verification https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1671951/+attachment/5326389/+files/bug-1671951-curtin-vmtest-verification-v2.tar.gz
2020-02-10 13:42:04 Dan Streetman tags bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done-disco verification-needed verification-needed-bionic verification-needed-eoan bionic curtin ddstreet disco eoan focal id-5a6a5c89cfbc4063786d54f6 id-5b74352f76a21f210334eafd id-5cc72cfe22e00d7a830c4ce4 id-5d67fe691c14484db556d212 maas netplan patch systemd verification-done verification-done-bionic verification-done-disco verification-done-eoan
2020-02-17 09:35:40 Launchpad Janitor systemd (Ubuntu Eoan): status Fix Committed Fix Released
2020-02-17 10:07:54 Launchpad Janitor systemd (Ubuntu Bionic): status Fix Committed Fix Released
2020-07-02 19:56:15 Steve Langasek cloud-init (Ubuntu Disco): status New Won't Fix
2020-07-10 13:54:31 Launchpad Janitor merge proposal linked https://code.launchpad.net/~paride/curtin/+git/curtin/+merge/387218
2022-05-05 01:19:07 Launchpad Janitor cloud-init (Ubuntu Eoan): status New Confirmed