2013-04-09 16:41:00 -04:00
|
|
|
<?xml version='1.0'?> <!--*-nxml-*-->
|
2016-04-06 16:55:34 +02:00
|
|
|
<?xml-stylesheet type="text/xsl" href="http://docbook.sourceforge.net/release/xsl/current/xhtml/docbook.xsl"?>
|
2013-04-09 16:41:00 -04:00
|
|
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
2016-04-06 16:55:34 +02:00
|
|
|
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd" [
|
|
|
|
|
<!ENTITY % entities SYSTEM "common.ent" >
|
|
|
|
|
%entities;
|
|
|
|
|
]>
|
2013-04-09 16:41:00 -04:00
|
|
|
|
|
|
|
|
<!--
|
2016-04-06 16:42:19 +02:00
|
|
|
NetworkManager.conf(5) manual page
|
|
|
|
|
|
|
|
|
|
Copyright 2010 - 2016 Red Hat, Inc.
|
|
|
|
|
|
|
|
|
|
Permission is granted to copy, distribute and/or modify this document
|
|
|
|
|
under the terms of the GNU Free Documentation License, Version 1.1
|
|
|
|
|
or any later version published by the Free Software Foundation;
|
|
|
|
|
with no Invariant Sections, no Front-Cover Texts, and no Back-Cover
|
|
|
|
|
Texts. You may obtain a copy of the GNU Free Documentation License
|
|
|
|
|
from the Free Software Foundation by visiting their Web site or by
|
|
|
|
|
writing to:
|
|
|
|
|
|
|
|
|
|
Free Software Foundation, Inc.,
|
|
|
|
|
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
2013-04-09 16:41:00 -04:00
|
|
|
-->
|
|
|
|
|
|
|
|
|
|
<refentry id="NetworkManager.conf">
|
|
|
|
|
<refentryinfo>
|
|
|
|
|
<title>NetworkManager.conf</title>
|
2013-05-07 09:54:28 +02:00
|
|
|
<author>NetworkManager developers</author>
|
2013-04-09 16:41:00 -04:00
|
|
|
</refentryinfo>
|
|
|
|
|
|
|
|
|
|
<refmeta>
|
|
|
|
|
<refentrytitle>NetworkManager.conf</refentrytitle>
|
|
|
|
|
<manvolnum>5</manvolnum>
|
2013-05-07 09:54:28 +02:00
|
|
|
<refmiscinfo class="source">NetworkManager</refmiscinfo>
|
|
|
|
|
<refmiscinfo class="manual">Configuration</refmiscinfo>
|
2016-04-06 16:55:34 +02:00
|
|
|
<refmiscinfo class="version">&NM_VERSION;</refmiscinfo>
|
2013-04-09 16:41:00 -04:00
|
|
|
</refmeta>
|
|
|
|
|
|
|
|
|
|
<refnamediv>
|
|
|
|
|
<refname>NetworkManager.conf</refname>
|
|
|
|
|
<refpurpose>NetworkManager configuration file</refpurpose>
|
|
|
|
|
</refnamediv>
|
|
|
|
|
|
|
|
|
|
<refsynopsisdiv>
|
|
|
|
|
<para><filename>/etc/NetworkManager/NetworkManager.conf</filename>,
|
2015-06-08 17:51:04 +02:00
|
|
|
<filename>/etc/NetworkManager/conf.d/<replaceable>name</replaceable>.conf</filename>,
|
2015-06-24 20:11:42 +02:00
|
|
|
<filename>/usr/lib/NetworkManager/conf.d/<replaceable>name</replaceable>.conf</filename>,
|
|
|
|
|
<filename>/var/lib/NetworkManager/NetworkManager-intern.conf</filename>
|
2013-04-09 16:41:00 -04:00
|
|
|
</para>
|
|
|
|
|
</refsynopsisdiv>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
|
<title>Description</title>
|
2015-06-24 20:11:42 +02:00
|
|
|
<para><literal>NetworkManager.conf</literal> is the configuration file for NetworkManager. It is used
|
2013-04-09 16:41:00 -04:00
|
|
|
to set up various aspects of NetworkManager's behavior. The
|
2015-06-24 20:11:42 +02:00
|
|
|
location of the main file and configuration directories may be changed
|
|
|
|
|
through use of the <option>--config</option>, <option>--config-dir</option>,
|
|
|
|
|
<option>--system-config-dir</option>, and <option>--intern-config</option>
|
|
|
|
|
argument for NetworkManager, respectively.
|
2013-04-09 16:41:00 -04:00
|
|
|
</para>
|
|
|
|
|
<para>If a default <literal>NetworkManager.conf</literal> is
|
|
|
|
|
provided by your distribution's packages, you should not modify
|
|
|
|
|
it, since your changes may get overwritten by package
|
|
|
|
|
updates. Instead, you can add additional <literal>.conf</literal>
|
2015-06-08 17:51:04 +02:00
|
|
|
files to the <literal>/etc/NetworkManager/conf.d</literal> directory.
|
|
|
|
|
These will be read in order, with later files overriding earlier ones.
|
|
|
|
|
Packages might install further configuration snippets to <literal>/usr/lib/NetworkManager/conf.d</literal>.
|
|
|
|
|
This directory is parsed first, even before <literal>NetworkManager.conf</literal>.
|
|
|
|
|
The loading of a file <literal>/usr/lib/NetworkManager/conf.d/<replaceable>name</replaceable>.conf</literal>
|
|
|
|
|
can be prevented by adding a file <literal>/etc/NetworkManager/conf.d/<replaceable>name</replaceable>.conf</literal>.
|
|
|
|
|
In this case, the file from the etc configuration shadows the file from the
|
|
|
|
|
system configuration directory.
|
2013-04-09 16:41:00 -04:00
|
|
|
</para>
|
2015-06-24 20:11:42 +02:00
|
|
|
<para>
|
|
|
|
|
NetworkManager can overwrite certain user configuration options via D-Bus or other internal
|
|
|
|
|
operations. In this case it writes those changes to <literal>/var/lib/NetworkManager/NetworkManager-intern.conf</literal>.
|
|
|
|
|
This file is not intended to be modified by the user, but it is read last and can shadow
|
|
|
|
|
user configuration from <literal>NetworkManager.conf</literal>.
|
|
|
|
|
</para>
|
2016-05-30 16:43:39 +02:00
|
|
|
<para>
|
|
|
|
|
Certain settings from the configuration can be reloaded at runtime either by sending SIGHUP signal or via
|
|
|
|
|
D-Bus' Reload call.
|
|
|
|
|
</para>
|
2013-04-09 16:41:00 -04:00
|
|
|
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
|
<title>File Format</title>
|
|
|
|
|
<para>
|
|
|
|
|
The configuration file format is so-called key file (sort of
|
|
|
|
|
ini-style format). It consists of sections (groups) of
|
|
|
|
|
key-value pairs. Lines beginning with a '#' and blank lines are
|
|
|
|
|
considered comments. Sections are started by a header line
|
|
|
|
|
containing the section enclosed in '[' and ']', and ended
|
|
|
|
|
implicitly by the start of the next section or the end of the
|
|
|
|
|
file. Each key-value pair must be contained in a section.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
For keys that take a list of devices as their value, you can
|
|
|
|
|
specify devices by their MAC addresses or interface names, or
|
2015-06-07 12:03:19 +02:00
|
|
|
"*" to specify all devices. See <xref linkend="device-spec"/>
|
|
|
|
|
below.
|
2013-04-09 16:41:00 -04:00
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Minimal system settings configuration file looks like this:
|
|
|
|
|
<programlisting>
|
2016-01-27 12:54:18 +01:00
|
|
|
[main]
|
|
|
|
|
plugins=keyfile
|
|
|
|
|
</programlisting>
|
2013-04-09 16:41:00 -04:00
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
As an extension to the normal keyfile format, you can also
|
|
|
|
|
append a value to a previously-set list-valued key by doing:
|
|
|
|
|
<programlisting>
|
2016-01-27 12:54:18 +01:00
|
|
|
plugins+=another-plugin
|
|
|
|
|
plugins-=remove-me
|
|
|
|
|
</programlisting>
|
2013-04-09 16:41:00 -04:00
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
2013-12-23 13:37:10 -05:00
|
|
|
<title><literal>main</literal> section</title>
|
2013-04-09 16:41:00 -04:00
|
|
|
<variablelist>
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>plugins</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
Lists system settings plugin names separated by ','. These
|
|
|
|
|
plugins are used to read and write system-wide
|
|
|
|
|
connections. When multiple plugins are specified, the
|
|
|
|
|
connections are read from all listed plugins. When writing
|
|
|
|
|
connections, the plugins will be asked to save the
|
|
|
|
|
connection in the order listed here; if the first plugin
|
|
|
|
|
cannot write out that connection type (or can't write out
|
|
|
|
|
any connections) the next plugin is tried, etc. If none of
|
|
|
|
|
the plugins can save the connection, an error is returned
|
|
|
|
|
to the user.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
If NetworkManager defines a distro-specific
|
|
|
|
|
network-configuration plugin for your system, then that
|
|
|
|
|
will normally be listed here. (See below for the available
|
|
|
|
|
plugins.) Note that the <literal>keyfile</literal> plugin
|
|
|
|
|
is always appended to the end of this list (if it doesn't
|
|
|
|
|
already appear earlier in the list), so if there is no
|
|
|
|
|
distro-specific plugin for your system then you can leave
|
|
|
|
|
this key unset and NetworkManager will fall back to using
|
|
|
|
|
<literal>keyfile</literal>.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
2013-05-23 19:05:40 -03:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>monitor-connection-files</varname></term>
|
|
|
|
|
<listitem><para>Whether the configured settings plugin(s)
|
|
|
|
|
should set up file monitors and immediately pick up changes
|
|
|
|
|
made to connection files while NetworkManager is running. This
|
|
|
|
|
is disabled by default; NetworkManager will only read
|
|
|
|
|
the connection files at startup, and when explicitly requested
|
|
|
|
|
via the ReloadConnections D-Bus call. If this key is set to
|
|
|
|
|
'<literal>true</literal>', then NetworkManager will reload
|
2016-03-31 14:42:54 +02:00
|
|
|
connection files any time they changed.
|
2016-03-31 20:46:09 +02:00
|
|
|
Automatic reloading is not advised because there are race conditions
|
2016-03-31 14:42:54 +02:00
|
|
|
involved and it depends on the way how the editor updates the file.
|
|
|
|
|
In some situations, NetworkManager might first delete and add the
|
|
|
|
|
connection anew, instead of updating the existing one. Also, NetworkManager
|
|
|
|
|
might pick up incomplete settings while the user is still editing the files.
|
|
|
|
|
</para></listitem>
|
2013-05-23 19:05:40 -03:00
|
|
|
</varlistentry>
|
2014-08-14 13:34:57 +02:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>auth-polkit</varname></term>
|
|
|
|
|
<listitem><para>Whether the system uses PolicyKit for authorization.
|
|
|
|
|
If <literal>false</literal>, all requests will be allowed. If
|
|
|
|
|
<literal>true</literal>, non-root requests are authorized using PolicyKit.
|
2016-04-06 16:55:34 +02:00
|
|
|
The default value is <literal>&NM_CONFIG_DEFAULT_AUTH_POLKIT_TEXT;</literal>.
|
2016-01-27 12:54:18 +01:00
|
|
|
</para></listitem>
|
2014-08-14 13:34:57 +02:00
|
|
|
</varlistentry>
|
2013-04-09 16:41:00 -04:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>dhcp</varname></term>
|
|
|
|
|
<listitem><para>This key sets up what DHCP client
|
|
|
|
|
NetworkManager will use. Allowed values are
|
|
|
|
|
<literal>dhclient</literal>, <literal>dhcpcd</literal>, and
|
|
|
|
|
<literal>internal</literal>. The <literal>dhclient</literal>
|
|
|
|
|
and <literal>dhcpcd</literal> options require the indicated
|
|
|
|
|
clients to be installed. The <literal>internal</literal>
|
|
|
|
|
option uses a built-in DHCP client which is not currently as
|
2016-02-21 11:43:34 +01:00
|
|
|
featureful as the external clients.</para>
|
2016-01-27 12:54:18 +01:00
|
|
|
<para>If this key is missing, available DHCP clients are
|
|
|
|
|
looked for in this order: <literal>dhclient</literal>,
|
|
|
|
|
<literal>dhcpcd</literal>,
|
|
|
|
|
<literal>internal</literal>.</para></listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>no-auto-default</varname></term>
|
|
|
|
|
<listitem><para>Specify devices for which
|
|
|
|
|
NetworkManager shouldn't create default wired connection
|
|
|
|
|
(Auto eth0). By default, NetworkManager creates a temporary
|
|
|
|
|
wired connection for any Ethernet device that is managed and
|
|
|
|
|
doesn't have a connection configured. List a device in this
|
|
|
|
|
option to inhibit creating the default connection for the
|
|
|
|
|
device. May have the special value <literal>*</literal> to
|
|
|
|
|
apply to all devices.</para>
|
|
|
|
|
<para>When the default wired connection is deleted or saved
|
|
|
|
|
to a new persistent connection by a plugin, the device is
|
|
|
|
|
added to a list in the file
|
|
|
|
|
<filename>/var/run/NetworkManager/no-auto-default.state</filename>
|
|
|
|
|
to prevent creating the default connection for that device
|
|
|
|
|
again.</para>
|
|
|
|
|
<para>See <xref linkend="device-spec"/> for the syntax how to
|
|
|
|
|
specify a device.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Example:
|
|
|
|
|
<programlisting>
|
2015-02-09 15:33:28 +01:00
|
|
|
no-auto-default=00:22:68:5c:5d:c4,00:1e:65:ff:aa:ee
|
|
|
|
|
no-auto-default=eth0,eth1
|
|
|
|
|
no-auto-default=*
|
2016-01-27 12:54:18 +01:00
|
|
|
</programlisting>
|
2016-01-27 12:54:18 +01:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>ignore-carrier</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
config: make "ignore-carrier" a per-device configuration option
NetworkManager.conf already contains several per-device settings,
that is, settings that have a device-spec as argument.
main.ignore-carrier
main.no-auto-default
main.assume-ipv6ll-only
keyfile.unmanged-devices
Optimally, these settings should be moved to the new [device*]
section.
For now, only move main.ignore-carrier there. For the others
it may not make sense to do so:
- main.no-auto-default: is already merged with internal state
from /var/lib/NetworkManager/no-auto-default.state. While
NMConfig's write API would be fine to also persist and merge
the no-auto-default setting, we'd still have to read the old
file too. Thus, deprecating this setting gets quite cumbersome
to still handle the old state file.
Also, it seems a less useful setting to configure in the
global configuration aside setting main.no-auto-default=*.
- main.assume-ipv6ll-only: one day, I hope that we no longer
assume connections at all, and this setting becomes entirely
obsolete.
- keyfile.unmanged-devices: this sets NM_UNMANAGED_USER_SETTINGS,
which cannot be overruled via D-Bus. For a future device.managed
setting we want it it to be overwritable via D-Bus by an explicit
user action. Thus, a device.managed property should have a different
semantic, this should be more like a device.unmanaged-force setting,
which could be done.
2016-06-22 13:43:08 +02:00
|
|
|
This setting is deprecated for the per-device setting
|
|
|
|
|
<literal>ignore-carrier</literal> which overwrites this setting
|
2016-08-26 20:52:28 +02:00
|
|
|
if specified (See <xref linkend="ignore-carrier"/>).
|
config: make "ignore-carrier" a per-device configuration option
NetworkManager.conf already contains several per-device settings,
that is, settings that have a device-spec as argument.
main.ignore-carrier
main.no-auto-default
main.assume-ipv6ll-only
keyfile.unmanged-devices
Optimally, these settings should be moved to the new [device*]
section.
For now, only move main.ignore-carrier there. For the others
it may not make sense to do so:
- main.no-auto-default: is already merged with internal state
from /var/lib/NetworkManager/no-auto-default.state. While
NMConfig's write API would be fine to also persist and merge
the no-auto-default setting, we'd still have to read the old
file too. Thus, deprecating this setting gets quite cumbersome
to still handle the old state file.
Also, it seems a less useful setting to configure in the
global configuration aside setting main.no-auto-default=*.
- main.assume-ipv6ll-only: one day, I hope that we no longer
assume connections at all, and this setting becomes entirely
obsolete.
- keyfile.unmanged-devices: this sets NM_UNMANAGED_USER_SETTINGS,
which cannot be overruled via D-Bus. For a future device.managed
setting we want it it to be overwritable via D-Bus by an explicit
user action. Thus, a device.managed property should have a different
semantic, this should be more like a device.unmanaged-force setting,
which could be done.
2016-06-22 13:43:08 +02:00
|
|
|
Otherwise, it is a list of matches to specify for which device
|
|
|
|
|
carrier should be ignored. See <xref linkend="device-spec"/> for the
|
|
|
|
|
syntax how to specify a device.
|
2016-01-27 12:54:18 +01:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
|
|
|
|
|
2015-05-20 11:36:37 +02:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>assume-ipv6ll-only</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
Specify devices for which NetworkManager will try to
|
|
|
|
|
generate a connection based on initial configuration when
|
|
|
|
|
the device only has an IPv6 link-local address.
|
|
|
|
|
</para>
|
|
|
|
|
<para>See <xref linkend="device-spec"/> for the syntax how to
|
|
|
|
|
specify a device.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2015-05-20 11:36:37 +02:00
|
|
|
</varlistentry>
|
|
|
|
|
|
2014-05-23 13:24:15 +02:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>configure-and-quit</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
When set to '<literal>true</literal>', NetworkManager quits after
|
|
|
|
|
performing initial network configuration but spawns small helpers
|
|
|
|
|
to preserve DHCP leases and IPv6 addresses. This is useful in
|
|
|
|
|
environments where network setup is more or less static or it is
|
|
|
|
|
desirable to save process time but still handle some dynamic
|
|
|
|
|
configurations. When this option is <literal>true</literal>,
|
|
|
|
|
network configuration for WiFi, WWAN, Bluetooth, ADSL, and PPPoE
|
|
|
|
|
interfaces cannot be preserved due to their use of external
|
|
|
|
|
services, and these devices will be deconfigured when NetworkManager
|
|
|
|
|
quits even though other interface's configuration may be preserved.
|
|
|
|
|
Also, to preserve DHCP addresses the '<literal>dhcp</literal>' option
|
|
|
|
|
must be set to '<literal>internal</literal>'. The default value of
|
|
|
|
|
the '<literal>configure-and-quit</literal>' option is
|
|
|
|
|
'<literal>false</literal>', meaning that NetworkManager will continue
|
|
|
|
|
running after initial network configuration and continue responding
|
|
|
|
|
to system and hardware events, D-Bus requests, and user commands.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2014-05-23 13:24:15 +02:00
|
|
|
</varlistentry>
|
|
|
|
|
|
2013-04-09 16:41:00 -04:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>dns</varname></term>
|
|
|
|
|
<listitem><para>Set the DNS (<filename>resolv.conf</filename>) processing mode.</para>
|
|
|
|
|
<para><literal>default</literal>: The default if the key is
|
|
|
|
|
not specified. NetworkManager will update
|
|
|
|
|
<filename>resolv.conf</filename> to reflect the nameservers
|
|
|
|
|
provided by currently active connections.</para>
|
|
|
|
|
<para><literal>dnsmasq</literal>: NetworkManager will run
|
|
|
|
|
dnsmasq as a local caching nameserver, using a "split DNS"
|
|
|
|
|
configuration if you are connected to a VPN, and then update
|
|
|
|
|
<filename>resolv.conf</filename> to point to the local
|
|
|
|
|
nameserver.</para>
|
|
|
|
|
<para><literal>unbound</literal>: NetworkManager will talk
|
|
|
|
|
to unbound and dnssec-triggerd, providing a "split DNS"
|
|
|
|
|
configuration with DNSSEC support. The /etc/resolv.conf
|
|
|
|
|
will be managed by dnssec-trigger daemon.</para>
|
|
|
|
|
<para><literal>none</literal>: NetworkManager will not
|
2016-05-23 08:46:27 +02:00
|
|
|
modify resolv.conf. This implies
|
|
|
|
|
<literal>rc-manager</literal> <literal>unmanaged</literal></para>
|
2016-01-27 12:54:18 +01:00
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
2014-03-06 22:04:44 +01:00
|
|
|
|
2015-04-20 14:45:09 +02:00
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>rc-manager</varname></term>
|
|
|
|
|
<listitem><para>Set the <filename>resolv.conf</filename>
|
2016-09-02 17:04:37 +02:00
|
|
|
management mode. The default value depends on NetworkManager build
|
|
|
|
|
options, and this version of NetworkManager was build with a default of
|
|
|
|
|
"<literal>&NM_CONFIG_DEFAULT_DNS_RC_MANAGER;</literal>".
|
2016-05-19 16:43:48 +02:00
|
|
|
Regardless of this setting, NetworkManager will
|
2016-03-21 21:01:25 +01:00
|
|
|
always write resolv.conf to its runtime state directory.</para>
|
2016-04-21 16:41:40 +02:00
|
|
|
<para><literal>symlink</literal>: NetworkManager will symlink
|
2016-03-21 21:01:25 +01:00
|
|
|
<filename>/etc/resolv.conf</filename> to its private
|
2016-04-29 21:54:45 +02:00
|
|
|
resolv.conf file in the runtime state directory. If
|
|
|
|
|
<filename>/etc/resolv.conf</filename>
|
|
|
|
|
already is a symlink pointing to a different location, the file
|
|
|
|
|
will not be modified. This allows the user to disable managing
|
|
|
|
|
by pointing the link <filename>/etc/resolv.conf</filename> to
|
|
|
|
|
somewhere else.</para>
|
2016-03-21 21:01:25 +01:00
|
|
|
<para><literal>file</literal>: NetworkManager will write
|
2016-06-03 10:33:54 +02:00
|
|
|
<filename>/etc/resolv.conf</filename> as file. If it finds
|
|
|
|
|
a symlink, it will follow the symlink and update the target
|
|
|
|
|
instead.</para>
|
2016-01-27 12:54:18 +01:00
|
|
|
<para><literal>resolvconf</literal>: NetworkManager will run
|
|
|
|
|
resolvconf to update the DNS configuration.</para>
|
|
|
|
|
<para><literal>netconfig</literal>: NetworkManager will run
|
|
|
|
|
netconfig to update the DNS configuration.</para>
|
2016-04-21 18:44:48 +02:00
|
|
|
<para><literal>unmanaged</literal>: don't touch
|
2016-04-29 21:54:45 +02:00
|
|
|
<filename>/etc/resolv.conf</filename>.</para>
|
2016-04-21 16:41:40 +02:00
|
|
|
<para><literal>none</literal>: deprecated alias for
|
|
|
|
|
<literal>symlink</literal>.</para>
|
2016-01-27 12:54:18 +01:00
|
|
|
</listitem>
|
2015-04-20 14:45:09 +02:00
|
|
|
</varlistentry>
|
|
|
|
|
|
2014-03-06 22:04:44 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>debug</varname></term>
|
|
|
|
|
<listitem><para>Comma separated list of options to aid
|
|
|
|
|
debugging. This value will be combined with the environment
|
|
|
|
|
variable <literal>NM_DEBUG</literal>. Currently the following
|
|
|
|
|
values are supported:</para>
|
|
|
|
|
<para>
|
|
|
|
|
<literal>RLIMIT_CORE</literal>: set ulimit -c unlimited
|
2015-03-31 07:41:56 +02:00
|
|
|
to write out core dumps. Beware, that a core dump can contain
|
|
|
|
|
sensitive information such as passwords or configuration settings.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
<literal>fatal-warnings</literal>: set g_log_set_always_fatal()
|
|
|
|
|
to core dump on warning messages from glib. This is equivalent
|
|
|
|
|
to the --g-fatal-warnings command line option.
|
2014-03-06 22:04:44 +01:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
|
2013-04-09 16:41:00 -04:00
|
|
|
</variablelist>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>keyfile</literal> section</title>
|
2013-12-23 13:37:10 -05:00
|
|
|
<para>This section contains keyfile-plugin-specific options, and
|
|
|
|
|
is normally only used when you are not using any other
|
|
|
|
|
distro-specific plugin.</para>
|
2013-04-09 16:41:00 -04:00
|
|
|
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>hostname</varname></term>
|
|
|
|
|
<listitem><para>This key is deprecated and has no effect
|
|
|
|
|
since the hostname is now stored in /etc/hostname or other
|
|
|
|
|
system configuration files according to build options.
|
|
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
2015-10-09 18:16:42 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>path</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>The location where keyfiles are read and stored.
|
2016-04-06 16:55:34 +02:00
|
|
|
This defaults to "<filename>&sysconfdir;/NetworkManager/conf.d</filename>".
|
2015-10-09 18:16:42 +02:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>unmanaged-devices</varname></term>
|
|
|
|
|
<listitem><para>Set devices that should be ignored by
|
|
|
|
|
NetworkManager.
|
|
|
|
|
</para>
|
|
|
|
|
<para>See <xref linkend="device-spec"/> for the syntax how to
|
|
|
|
|
specify a device.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Example:
|
|
|
|
|
<programlisting>
|
2013-04-09 16:41:00 -04:00
|
|
|
unmanaged-devices=interface-name:em4
|
|
|
|
|
unmanaged-devices=mac:00:22:68:1c:59:b1;mac:00:1E:65:30:D1:C4;interface-name:eth2
|
2016-01-27 12:54:18 +01:00
|
|
|
</programlisting>
|
2016-01-27 12:54:18 +01:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2013-04-09 16:41:00 -04:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>ifupdown</literal> section</title>
|
2013-12-23 13:37:10 -05:00
|
|
|
<para>This section contains ifupdown-specific options and thus only
|
|
|
|
|
has effect when using the <literal>ifupdown</literal> plugin.</para>
|
2013-04-09 16:41:00 -04:00
|
|
|
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>managed</varname></term>
|
|
|
|
|
<listitem><para>If set to <literal>true</literal>, then
|
|
|
|
|
interfaces listed in
|
|
|
|
|
<filename>/etc/network/interfaces</filename> are managed by
|
|
|
|
|
NetworkManager. If set to <literal>false</literal>, then
|
|
|
|
|
any interface listed in
|
|
|
|
|
<filename>/etc/network/interfaces</filename> will be ignored
|
|
|
|
|
by NetworkManager. Remember that NetworkManager controls the
|
|
|
|
|
default route, so because the interface is ignored,
|
|
|
|
|
NetworkManager may assign the default route to some other
|
|
|
|
|
interface.</para>
|
|
|
|
|
<para>
|
|
|
|
|
The default value is <literal>false</literal>.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2013-04-09 16:41:00 -04:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>logging</literal> section</title>
|
|
|
|
|
<para>This section controls NetworkManager's logging. Any
|
|
|
|
|
settings here are overridden by the <option>--log-level</option>
|
|
|
|
|
and <option>--log-domains</option> command-line options.</para>
|
|
|
|
|
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>level</varname></term>
|
|
|
|
|
<listitem><para>The default logging verbosity level.
|
|
|
|
|
One of <literal>OFF</literal>, <literal>ERR</literal>,
|
|
|
|
|
<literal>WARN</literal>, <literal>INFO</literal>,
|
|
|
|
|
<literal>DEBUG</literal>, <literal>TRACE</literal>. The ERR
|
|
|
|
|
level logs only critical errors. WARN logs warnings that may
|
|
|
|
|
reflect operation. INFO logs various informational messages that
|
|
|
|
|
are useful for tracking state and operations. DEBUG enables
|
|
|
|
|
verbose logging for debugging purposes. TRACE enables even more
|
|
|
|
|
verbose logging then DEBUG level. Subsequent levels also log
|
|
|
|
|
all messages from earlier levels; thus setting the log level
|
|
|
|
|
to INFO also logs error and warning messages.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>domains</varname></term>
|
|
|
|
|
<listitem><para>The following log domains are available:
|
|
|
|
|
PLATFORM, RFKILL, ETHER, WIFI, BT, MB, DHCP4, DHCP6, PPP,
|
|
|
|
|
WIFI_SCAN, IP4, IP6, AUTOIP4, DNS, VPN, SHARING, SUPPLICANT,
|
|
|
|
|
AGENTS, SETTINGS, SUSPEND, CORE, DEVICE, OLPC, WIMAX,
|
|
|
|
|
INFINIBAND, FIREWALL, ADSL, BOND, VLAN, BRIDGE, DBUS_PROPS,
|
2016-05-17 19:29:38 +02:00
|
|
|
TEAM, CONCHECK, DCB, DISPATCH, AUDIT, SYSTEMD, VPN_PLUGIN.</para>
|
2016-01-27 12:54:18 +01:00
|
|
|
<para>In addition, these special domains can be used: NONE,
|
|
|
|
|
ALL, DEFAULT, DHCP, IP.</para>
|
|
|
|
|
<para>You can specify per-domain log level overrides by
|
|
|
|
|
adding a colon and a log level to any domain. E.g.,
|
|
|
|
|
"<literal>WIFI:DEBUG,WIFI_SCAN:OFF</literal>".</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
2014-01-15 17:32:07 +01:00
|
|
|
<para>Domain descriptions:
|
|
|
|
|
<simplelist type="horiz" columns="1">
|
|
|
|
|
<member>PLATFORM : OS (platform) operations</member>
|
|
|
|
|
<member>RFKILL : RFKill subsystem operations</member>
|
|
|
|
|
<member>ETHER : Ethernet device operations</member>
|
|
|
|
|
<member>WIFI : Wi-Fi device operations</member>
|
|
|
|
|
<member>BT : Bluetooth operations</member>
|
|
|
|
|
<member>MB : Mobile broadband operations</member>
|
|
|
|
|
<member>DHCP4 : DHCP for IPv4</member>
|
|
|
|
|
<member>DHCP6 : DHCP for IPv6</member>
|
|
|
|
|
<member>PPP : Point-to-point protocol operations</member>
|
|
|
|
|
<member>WIFI_SCAN : Wi-Fi scanning operations</member>
|
|
|
|
|
<member>IP4 : IPv4-related operations</member>
|
|
|
|
|
<member>IP6 : IPv6-related operations</member>
|
2015-04-20 18:13:41 +02:00
|
|
|
<member>AUTOIP4 : AutoIP operations</member>
|
2014-01-15 17:32:07 +01:00
|
|
|
<member>DNS : Domain Name System related operations</member>
|
2014-01-16 09:55:48 +01:00
|
|
|
<member>VPN : Virtual Private Network connections and operations</member>
|
2014-01-15 17:32:07 +01:00
|
|
|
<member>SHARING : Connection sharing</member>
|
|
|
|
|
<member>SUPPLICANT : WPA supplicant related operations</member>
|
|
|
|
|
<member>AGENTS : Secret agents operations and communication</member>
|
|
|
|
|
<member>SETTINGS : Settings/config service operations</member>
|
|
|
|
|
<member>SUSPEND : Suspend/resume</member>
|
|
|
|
|
<member>CORE : Core daemon and policy operations</member>
|
|
|
|
|
<member>DEVICE : Activation and general interface operations</member>
|
|
|
|
|
<member>OLPC : OLPC Mesh device operations</member>
|
|
|
|
|
<member>WIMAX : WiMAX device operations</member>
|
|
|
|
|
<member>INFINIBAND : InfiniBand device operations</member>
|
|
|
|
|
<member>FIREWALL : FirewallD related operations</member>
|
|
|
|
|
<member>ADSL : ADSL device operations</member>
|
|
|
|
|
<member>BOND : Bonding operations</member>
|
|
|
|
|
<member>VLAN : VLAN operations</member>
|
|
|
|
|
<member>BRIDGE : Bridging operations</member>
|
2014-01-16 09:55:48 +01:00
|
|
|
<member>DBUS_PROPS : D-Bus property changes</member>
|
2014-01-15 17:32:07 +01:00
|
|
|
<member>TEAM : Teaming operations</member>
|
|
|
|
|
<member>CONCHECK : Connectivity check</member>
|
|
|
|
|
<member>DCB : Data Center Bridging (DCB) operations</member>
|
2014-04-24 17:27:47 +02:00
|
|
|
<member>DISPATCH : Dispatcher scripts</member>
|
2015-07-13 10:19:33 +02:00
|
|
|
<member>AUDIT : Audit records</member>
|
2016-05-17 19:57:55 +02:00
|
|
|
<member>SYSTEMD : Messages from internal libsystemd</member>
|
2016-05-17 19:29:38 +02:00
|
|
|
<member>VPN_PLUGIN : logging messages from VPN plugins</member>
|
2014-01-15 17:32:07 +01:00
|
|
|
<member> </member>
|
|
|
|
|
<member>NONE : when given by itself logging is disabled</member>
|
|
|
|
|
<member>ALL : all log domains</member>
|
|
|
|
|
<member>DEFAULT : default log domains</member>
|
|
|
|
|
<member>DHCP : shortcut for "DHCP4,DHCP6"</member>
|
|
|
|
|
<member>IP : shortcut for "IP4,IP6"</member>
|
2014-05-12 19:12:28 +02:00
|
|
|
<member> </member>
|
|
|
|
|
<member>HW : deprecated alias for "PLATFORM"</member>
|
2014-01-15 17:32:07 +01:00
|
|
|
</simplelist>
|
|
|
|
|
</para>
|
2016-05-17 19:29:38 +02:00
|
|
|
<para>
|
|
|
|
|
In general, the logfile should not contain passwords or private data. However,
|
|
|
|
|
you are always advised to check the file before posting it online or attaching
|
2016-06-16 22:30:41 +02:00
|
|
|
to a bug report. <literal>VPN_PLUGIN</literal> is special as it might reveal
|
|
|
|
|
private information of the VPN plugins with verbose levels. Therefore this domain
|
|
|
|
|
will be excluded when setting <literal>ALL</literal> or <literal>DEFAULT</literal>
|
|
|
|
|
to more verbose levels then <literal>INFO</literal>.
|
|
|
|
|
</para>
|
2014-01-15 17:32:07 +01:00
|
|
|
</varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>backend</varname></term>
|
|
|
|
|
<listitem><para>The logging backend. Supported values
|
|
|
|
|
are "<literal>debug</literal>", "<literal>syslog</literal>",
|
logging: change logging format to drop "[file:line] func():" part
Choose a new logging format.
- the logging format must not be configurable and it must be the
same for all backends. It is neat that journal supports additional
fields, but an average user still posts the output of plain
journalctl, without "--output verbose" (which would also be hard
to read).
Also, we get used to a certain logging format, so having different
formats is confusing. If one format is better then another, it should
be used for all backends: syslog, journal and debug.
The only question is, what is the best format.
- the timestamp: I find it useful to see how much time between two
events passed. The timestamp printed by syslog doesn't have sufficient
granularity, and the internal journal fields are not readily available.
We used to print the timestamps for <error>, <debug> and <trace>,
but ommited them for <info> and <warn> levels. We now print them for
all levels, which has a uniform alignment.
- the location: the "[file:line] func():" part is mostly redundant
and results in wide lines. It also causes a misalignment of the
logging lines, or -- as I recently added alignment of the location --
it results in awkward whitespace and truncation.
But the location is really just necessary because our logging messages
are bad:
"<debug> [1456397604.038226] (9) 11-dhclient succeeded"
The solution to this is not
"<debug> [1456397604.038226] [nm-dispatcher.c:358] dispatcher_results_process(): (9) 11-dhclient succeeded"
but a properly worded message:
"<debug> [1456397604.038226] dispatcher: request #9, script 11-dhclient succeeded"
- logging-message: we need to write better logging messages.
I like some form of "tags" that are easy to grep:
"platform: signal: link changed: 4: ..."
Downside is, that this is not nice to read as a full sentence.
So, especially for <info> and <warn> logging, more human readable
messages are better.
We should find a compromise, where the log message explains what
happens, but is still concise and contains patterns that are easy
to grep and identify visually.
https://mail.gnome.org/archives/networkmanager-list/2016-February/msg00077.html
2016-02-25 17:21:29 +01:00
|
|
|
"<literal>journal</literal>".
|
2016-01-27 12:54:18 +01:00
|
|
|
"<literal>debug</literal>" uses syslog and logs to standard error.
|
|
|
|
|
If NetworkManager is started in debug mode (<literal>--debug</literal>)
|
|
|
|
|
this option is ignored and "<literal>debug</literal>" is always used.
|
2016-04-06 16:55:34 +02:00
|
|
|
Otherwise, the default is "<literal>&NM_CONFIG_LOGGING_BACKEND_DEFAULT_TEXT;</literal>".
|
2016-01-27 12:54:18 +01:00
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>audit</varname></term>
|
|
|
|
|
<listitem><para>Whether the audit records are delivered to
|
|
|
|
|
auditd, the audit daemon. If <literal>false</literal>, audit
|
|
|
|
|
records will be sent only to the NetworkManager logging
|
|
|
|
|
system. If set to <literal>true</literal>, they will be also
|
2016-04-06 16:55:34 +02:00
|
|
|
sent to auditd. The default value is <literal>&NM_CONFIG_DEFAULT_LOGGING_AUDIT_TEXT;</literal>.
|
2016-01-27 12:54:18 +01:00
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
2013-04-09 16:41:00 -04:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
2015-05-15 11:36:28 +02:00
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>connection</literal> section</title>
|
2016-01-27 13:30:25 +01:00
|
|
|
<para>Specify default values for connections.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Example:
|
|
|
|
|
<programlisting>
|
|
|
|
|
[connection]
|
|
|
|
|
ipv6.ip6-privacy=0
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
<refsect2>
|
|
|
|
|
<title>Supported Properties</title>
|
2015-05-15 11:36:28 +02:00
|
|
|
<para>
|
2016-01-27 13:30:25 +01:00
|
|
|
Not all properties can be overwritten, only the following
|
|
|
|
|
properties are supported to have their default values configured
|
2016-05-30 20:24:32 +02:00
|
|
|
(see <link linkend='nm-settings'><citerefentry><refentrytitle>nm-settings</refentrytitle><manvolnum>5</manvolnum></citerefentry></link> for details).
|
2016-01-27 13:30:25 +01:00
|
|
|
A default value is only consulted if the corresponding per-connection value
|
|
|
|
|
explicitly allows for that.
|
|
|
|
|
<variablelist>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>connection.autoconnect-slaves</varname></term>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>connection.lldp</varname></term>
|
|
|
|
|
</varlistentry>
|
device: extend MAC address handling including randomization for ethernet and wifi
Extend the "ethernet.cloned-mac-address" and "wifi.cloned-mac-address"
settings. Instead of specifying an explicit MAC address, the additional
special values "permanent", "preserve", "random", "random-bia", "stable" and
"stable-bia" are supported.
"permanent" means to use the permanent hardware address. Previously that
was the default if no explict cloned-mac-address was set. The default is
thus still "permanent", but it can be overwritten by global
configuration.
"preserve" means not to configure the MAC address when activating the
device. That was actually the default behavior before introducing MAC
address handling with commit 1b49f941a69af910b0e68530be7339e8053068e5.
"random" and "random-bia" use a randomized MAC address for each
connection. "stable" and "stable-bia" use a generated, stable
address based on some token. The "bia" suffix says to generate a
burned-in address. The stable method by default uses as token the
connection UUID, but the token can be explicitly choosen via
"stable:<TOKEN>" and "stable-bia:<TOKEN>".
On a D-Bus level, the "cloned-mac-address" is a bytestring and thus
cannot express the new forms. It is replaced by the new
"assigned-mac-address" field. For the GObject property, libnm's API,
nmcli, keyfile, etc. the old name "cloned-mac-address" is still used.
Deprecating the old field seems more complicated then just extending
the use of the existing "cloned-mac-address" field, although the name
doesn't match well with the extended meaning.
There is some overlap with the "wifi.mac-address-randomization" setting.
https://bugzilla.gnome.org/show_bug.cgi?id=705545
https://bugzilla.gnome.org/show_bug.cgi?id=708820
https://bugzilla.gnome.org/show_bug.cgi?id=758301
2016-05-24 15:57:16 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ethernet.cloned-mac-address</varname></term>
|
|
|
|
|
<listitem><para>If left unspecified, it defaults to "permanent".</para></listitem>
|
|
|
|
|
</varlistentry>
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ethernet.generate-mac-address-mask</varname></term>
|
|
|
|
|
</varlistentry>
|
2016-01-27 13:30:25 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ethernet.wake-on-lan</varname></term>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ipv4.dad-timeout</varname></term>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ipv4.dhcp-timeout</varname></term>
|
|
|
|
|
<listitem><para>If left unspecified, the default value for
|
|
|
|
|
the interface type is used.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ipv4.route-metric</varname></term>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ipv6.ip6-privacy</varname></term>
|
|
|
|
|
<listitem><para>If <literal>ipv6.ip6-privacy</literal> is unset, use the content of
|
|
|
|
|
"/proc/sys/net/ipv6/conf/default/use_tempaddr" as last fallback.
|
|
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>ipv6.route-metric</varname></term>
|
|
|
|
|
</varlistentry>
|
2016-02-11 17:19:28 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>vpn.timeout</varname></term>
|
|
|
|
|
<listitem><para>If left unspecified, default value of 60 seconds is used.</para></listitem>
|
|
|
|
|
</varlistentry>
|
device: extend MAC address handling including randomization for ethernet and wifi
Extend the "ethernet.cloned-mac-address" and "wifi.cloned-mac-address"
settings. Instead of specifying an explicit MAC address, the additional
special values "permanent", "preserve", "random", "random-bia", "stable" and
"stable-bia" are supported.
"permanent" means to use the permanent hardware address. Previously that
was the default if no explict cloned-mac-address was set. The default is
thus still "permanent", but it can be overwritten by global
configuration.
"preserve" means not to configure the MAC address when activating the
device. That was actually the default behavior before introducing MAC
address handling with commit 1b49f941a69af910b0e68530be7339e8053068e5.
"random" and "random-bia" use a randomized MAC address for each
connection. "stable" and "stable-bia" use a generated, stable
address based on some token. The "bia" suffix says to generate a
burned-in address. The stable method by default uses as token the
connection UUID, but the token can be explicitly choosen via
"stable:<TOKEN>" and "stable-bia:<TOKEN>".
On a D-Bus level, the "cloned-mac-address" is a bytestring and thus
cannot express the new forms. It is replaced by the new
"assigned-mac-address" field. For the GObject property, libnm's API,
nmcli, keyfile, etc. the old name "cloned-mac-address" is still used.
Deprecating the old field seems more complicated then just extending
the use of the existing "cloned-mac-address" field, although the name
doesn't match well with the extended meaning.
There is some overlap with the "wifi.mac-address-randomization" setting.
https://bugzilla.gnome.org/show_bug.cgi?id=705545
https://bugzilla.gnome.org/show_bug.cgi?id=708820
https://bugzilla.gnome.org/show_bug.cgi?id=758301
2016-05-24 15:57:16 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>wifi.cloned-mac-address</varname></term>
|
|
|
|
|
<listitem><para>If left unspecified, it defaults to "permanent".</para></listitem>
|
|
|
|
|
</varlistentry>
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>wifi.generate-mac-address-mask</varname></term>
|
|
|
|
|
</varlistentry>
|
2016-02-11 17:19:28 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>wifi.mac-address-randomization</varname></term>
|
2016-06-20 12:28:04 +02:00
|
|
|
<listitem><para>If left unspecified, MAC address randomization is disabled.
|
|
|
|
|
This setting is deprecated for <literal>wifi.cloned-mac-address</literal>.
|
|
|
|
|
</para></listitem>
|
2016-02-11 17:19:28 +01:00
|
|
|
</varlistentry>
|
2016-02-10 16:46:34 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>wifi.powersave</varname></term>
|
|
|
|
|
<listitem><para>If left unspecified, the default value
|
|
|
|
|
"<literal>ignore</literal>" will be used.</para></listitem>
|
|
|
|
|
</varlistentry>
|
2016-01-27 13:30:25 +01:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect2>
|
|
|
|
|
|
2016-08-26 14:58:19 +02:00
|
|
|
<refsect2 id="connection-sections" xreflabel="“Sections” under the section called “CONNECTION SECTION”">
|
2016-01-27 13:30:25 +01:00
|
|
|
<title>Sections</title>
|
|
|
|
|
<para>
|
|
|
|
|
You can configure multiple <literal>connection</literal>
|
|
|
|
|
sections, by having different sections with a name that all start
|
|
|
|
|
with "connection".
|
2015-05-15 11:36:28 +02:00
|
|
|
Example:
|
|
|
|
|
<programlisting>
|
|
|
|
|
[connection]
|
|
|
|
|
ipv6.ip6-privacy=0
|
2015-06-09 16:05:10 +02:00
|
|
|
connection.autoconnect-slaves=1
|
2015-09-17 12:39:56 +02:00
|
|
|
vpn.timeout=120
|
2015-05-15 11:36:28 +02:00
|
|
|
|
|
|
|
|
[connection-wifi-wlan0]
|
|
|
|
|
match-device=interface-name:wlan0
|
|
|
|
|
ipv4.route-metric=50
|
|
|
|
|
|
|
|
|
|
[connection-wifi-other]
|
|
|
|
|
match-device=type:wifi
|
|
|
|
|
ipv4.route-metric=55
|
|
|
|
|
ipv6.ip6-privacy=1
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
|
|
|
|
|
<para>
|
2015-06-25 13:02:10 +02:00
|
|
|
The sections within one file are considered in order of appearance, with the
|
2015-05-15 11:36:28 +02:00
|
|
|
exception that the <literal>[connection]</literal> section is always
|
|
|
|
|
considered last. In the example above, this order is <literal>[connection-wifi-wlan0]</literal>,
|
|
|
|
|
<literal>[connection-wlan-other]</literal>, and <literal>[connection]</literal>.
|
2016-01-27 12:32:07 +01:00
|
|
|
When checking for a default configuration value, the sections are searched until
|
2015-05-15 11:36:28 +02:00
|
|
|
the requested value is found.
|
|
|
|
|
In the example above, "ipv4.route-metric" for wlan0 interface is set to 50,
|
|
|
|
|
and for all other Wi-Fi typed interfaces to 55. Also, Wi-Fi devices would have
|
|
|
|
|
IPv6 private addresses enabled by default, but other devices would have it disabled.
|
|
|
|
|
Note that also "wlan0" gets "ipv6.ip6-privacy=1", because although the section
|
|
|
|
|
"[connection-wifi-wlan0]" matches the device, it does not contain that property
|
|
|
|
|
and the search continues.
|
|
|
|
|
</para>
|
2015-06-25 13:02:10 +02:00
|
|
|
<para>
|
|
|
|
|
When having different sections in multiple files, sections from files that are read
|
|
|
|
|
later have higher priority. So within one file the priority of the sections is
|
|
|
|
|
top-to-bottom. Across multiple files later definitions take precedence.
|
|
|
|
|
</para>
|
2015-05-15 11:36:28 +02:00
|
|
|
|
|
|
|
|
<para>
|
2016-01-27 13:30:25 +01:00
|
|
|
The following properties further control how a connection section applies.
|
2015-05-15 11:36:28 +02:00
|
|
|
<variablelist>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>match-device</varname></term>
|
|
|
|
|
<listitem><para>An optional device spec that restricts
|
|
|
|
|
when the section applies. See <xref linkend="device-spec"/>
|
|
|
|
|
for the possible values.
|
|
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>stop-match</varname></term>
|
|
|
|
|
<listitem><para>An optional boolean value which defaults to
|
|
|
|
|
<literal>no</literal>. If the section matches (based on
|
|
|
|
|
<literal>match-device</literal>), further sections will not be
|
|
|
|
|
considered even if the property in question is not present. In
|
|
|
|
|
the example above, if <literal>[connection-wifi-wlan0]</literal> would
|
|
|
|
|
have <literal>stop-match</literal> set to <literal>yes</literal>,
|
2016-05-13 15:02:55 +02:00
|
|
|
the device <literal>wlan0</literal> would have <literal>ipv6.ip6-privacy</literal>
|
|
|
|
|
property unspecified. That is, the search for the property would not continue
|
|
|
|
|
in the connection sections <literal>[connection-wifi-other]</literal>
|
|
|
|
|
or <literal>[connection]</literal>.
|
2015-05-15 11:36:28 +02:00
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
2016-01-27 13:30:25 +01:00
|
|
|
</refsect2>
|
2015-05-15 11:36:28 +02:00
|
|
|
</refsect1>
|
|
|
|
|
|
2016-06-22 13:14:10 +02:00
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>device</literal> section</title>
|
|
|
|
|
<para>Contains per-device persistent configuration.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Example:
|
|
|
|
|
<programlisting>
|
|
|
|
|
[device]
|
|
|
|
|
match-device=interface-name:eth3
|
|
|
|
|
unmanaged=1
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
<refsect2>
|
|
|
|
|
<title>Supported Properties</title>
|
|
|
|
|
<para>
|
|
|
|
|
The following properties can be configured per-device.
|
|
|
|
|
<variablelist>
|
config: make "ignore-carrier" a per-device configuration option
NetworkManager.conf already contains several per-device settings,
that is, settings that have a device-spec as argument.
main.ignore-carrier
main.no-auto-default
main.assume-ipv6ll-only
keyfile.unmanged-devices
Optimally, these settings should be moved to the new [device*]
section.
For now, only move main.ignore-carrier there. For the others
it may not make sense to do so:
- main.no-auto-default: is already merged with internal state
from /var/lib/NetworkManager/no-auto-default.state. While
NMConfig's write API would be fine to also persist and merge
the no-auto-default setting, we'd still have to read the old
file too. Thus, deprecating this setting gets quite cumbersome
to still handle the old state file.
Also, it seems a less useful setting to configure in the
global configuration aside setting main.no-auto-default=*.
- main.assume-ipv6ll-only: one day, I hope that we no longer
assume connections at all, and this setting becomes entirely
obsolete.
- keyfile.unmanged-devices: this sets NM_UNMANAGED_USER_SETTINGS,
which cannot be overruled via D-Bus. For a future device.managed
setting we want it it to be overwritable via D-Bus by an explicit
user action. Thus, a device.managed property should have a different
semantic, this should be more like a device.unmanaged-force setting,
which could be done.
2016-06-22 13:43:08 +02:00
|
|
|
<varlistentry id="ignore-carrier">
|
|
|
|
|
<term><varname>ignore-carrier</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
Specify devices for which NetworkManager will (partially)
|
|
|
|
|
ignore the carrier state. Normally, for
|
|
|
|
|
device types that support carrier-detect, such as Ethernet
|
|
|
|
|
and InfiniBand, NetworkManager will only allow a
|
|
|
|
|
connection to be activated on the device if carrier is
|
|
|
|
|
present (ie, a cable is plugged in), and it will
|
|
|
|
|
deactivate the device if carrier drops for more than a few
|
|
|
|
|
seconds.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
A device with carrier ignored will allow activating connections on
|
|
|
|
|
that device even when it does not have carrier, provided
|
|
|
|
|
that the connection uses only statically-configured IP
|
|
|
|
|
addresses. Additionally, it will allow any active
|
|
|
|
|
connection (whether static or dynamic) to remain active on
|
|
|
|
|
the device when carrier is lost.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Note that the "carrier" property of NMDevices and device D-Bus
|
|
|
|
|
interfaces will still reflect the actual device state; it's just
|
|
|
|
|
that NetworkManager will not make use of that information.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
This setting overwrites the deprecated <literal>main.ignore-carrier</literal>
|
|
|
|
|
setting above.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2016-06-22 14:42:20 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>wifi.scan-rand-mac-address</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-06-30 09:22:12 +02:00
|
|
|
Configures MAC address randomization of a Wi-Fi device during
|
|
|
|
|
scanning. This defaults to <literal>yes</literal> in which case
|
|
|
|
|
a random, locally-administered MAC address will be used.
|
|
|
|
|
The setting <literal>wifi.scan-generate-mac-address-mask</literal>
|
|
|
|
|
allows to influence the generated MAC address to use certain vendor
|
|
|
|
|
OUIs.
|
|
|
|
|
If disabled, the MAC address during scanning is left unchanged to
|
|
|
|
|
whatever is configured.
|
|
|
|
|
For the configured MAC address while the device is associated, see instead
|
2016-06-22 14:42:20 +02:00
|
|
|
the per-connection setting <literal>wifi.cloned-mac-address</literal>.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>wifi.scan-generate-mac-address-mask</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-06-30 09:22:12 +02:00
|
|
|
Like the per-connection settings <literal>ethernet.generate-mac-address-mask</literal>
|
|
|
|
|
and <literal>wifi.generate-mac-address-mask</literal>, this allows to configure the
|
|
|
|
|
generated MAC addresses during scanning. See <citerefentry><refentrytitle>nm-settings</refentrytitle><manvolnum>5</manvolnum></citerefentry>
|
all: make MAC address randomization algorithm configurable
For the per-connection settings "ethernet.cloned-mac-address"
and "wifi.cloned-mac-address", and for the per-device setting
"wifi.scan-rand-mac-address", we may generate MAC addresses using
either the "random" or "stable" algorithm.
Add new properties "generate-mac-address-mask" that allow to configure
which bits of the MAC address will be scrambled.
By default, the "random" and "stable" algorithms scamble all bits
of the MAC address, including the OUI part and generate a locally-
administered, unicast address.
By specifying a MAC address mask, we can now configure to perserve
parts of the current MAC address of the device. For example, setting
"FF:FF:FF:00:00:00" will preserve the first 3 octects of the current
MAC address.
One can also explicitly specify a MAC address to use instead of the
current MAC address. For example, "FF:FF:FF:00:00:00 68:F7:28:00:00:00"
sets the OUI part of the MAC address to "68:F7:28" while scrambling
the last 3 octects.
Similarly, "02:00:00:00:00:00 00:00:00:00:00:00" will scamble
all bits of the MAC address, except clearing the second-least
significant bit. Thus, creating a burned-in address, globally
administered.
One can also supply a list of MAC addresses like
"FF:FF:FF:00:00:00 68:F7:28:00:00:00 00:0C:29:00:00:00 ..." in which
case a MAC address is choosen randomly.
To fully scamble the MAC address one can configure
"02:00:00:00:00:00 00:00:00:00:00:00 02:00:00:00:00:00".
which also randomly creates either a locally or globally administered
address.
With this, the following macchanger options can be implemented:
`macchanger --random`
This is the default if no mask is configured.
-> ""
while is the same as:
-> "00:00:00:00:00:00"
-> "02:00:00:00:00:00 02:00:00:00:00:00"
`macchanger --random --bia`
-> "02:00:00:00:00:00 00:00:00:00:00:00"
`macchanger --ending`
This option cannot be fully implemented, because macchanger
uses the current MAC address but also implies --bia.
-> "FF:FF:FF:00:00:00"
This would yields the same result only if the current MAC address
is already a burned-in address too. Otherwise, it has not the same
effect as --ending.
-> "FF:FF:FF:00:00:00 <MAC_ADDR>"
Alternatively, instead of using the current MAC address,
spell the OUI part out. But again, that is not really the
same as macchanger does because you explictly have to name
the OUI part to use.
`machanger --another`
`machanger --another_any`
-> "FF:FF:FF:00:00:00 <MAC_ADDR> <MAC_ADDR> ..."
"$(printf "FF:FF:FF:00:00:00 %s\n" "$(sed -n 's/^\([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) \([0-9a-fA-F][0-9a-fA-F]\) .*/\1:\2:\3:00:00:00/p' /usr/share/macchanger/wireless.list | xargs)")"
2016-06-22 20:31:39 +02:00
|
|
|
for details.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2016-06-22 13:14:10 +02:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect2>
|
|
|
|
|
|
|
|
|
|
<refsect2>
|
|
|
|
|
<title>Sections</title>
|
|
|
|
|
<para>
|
|
|
|
|
The <literal>[device]</literal> section works the same as the <literal>[connection]</literal> section.
|
|
|
|
|
That is, multiple sections that all start with the prefix "device" can be specified.
|
|
|
|
|
The settings "match-device" and "stop-match" are available to match a device section
|
|
|
|
|
on a device. The order of multiple sections is also top-down within the file and
|
|
|
|
|
later files overwrite previous settings. See <xref linkend="connection-sections"/>
|
|
|
|
|
for details.
|
|
|
|
|
</para>
|
|
|
|
|
</refsect2>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
2013-04-09 16:41:00 -04:00
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>connectivity</literal> section</title>
|
|
|
|
|
<para>This section controls NetworkManager's optional connectivity
|
|
|
|
|
checking functionality. This allows NetworkManager to detect
|
|
|
|
|
whether or not the system can actually access the internet or
|
|
|
|
|
whether it is behind a captive portal.</para>
|
|
|
|
|
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>uri</varname></term>
|
|
|
|
|
<listitem><para>The URI of a web page to periodically
|
|
|
|
|
request when connectivity is being checked. This page
|
|
|
|
|
should return the header "X-NetworkManager-Status" with a
|
|
|
|
|
value of "online". Alternatively, it's body content should
|
|
|
|
|
be set to "NetworkManager is online". The body content
|
|
|
|
|
check can be controlled by the <literal>response</literal>
|
|
|
|
|
option. If this option is blank or missing, connectivity
|
|
|
|
|
checking is disabled.
|
|
|
|
|
</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>interval</varname></term>
|
|
|
|
|
<listitem><para>Specified in seconds; controls how often
|
|
|
|
|
connectivity is checked when a network connection exists. If
|
|
|
|
|
set to 0 connectivity checking is disabled. If missing, the
|
|
|
|
|
default is 300 seconds.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>response</varname></term>
|
|
|
|
|
<listitem><para>If set controls what body content
|
|
|
|
|
NetworkManager checks for when requesting the URI for
|
|
|
|
|
connectivity checking. If missing, defaults to
|
|
|
|
|
"NetworkManager is online" </para></listitem>
|
|
|
|
|
</varlistentry>
|
2013-04-09 16:41:00 -04:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
2015-06-29 15:59:44 +02:00
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>global-dns</literal> section</title>
|
|
|
|
|
<para>This section specifies global DNS settings that override
|
|
|
|
|
connection-specific configuration.</para>
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>searches</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
A list of search domains to be used during hostname lookup.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>options</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
A list of of options to be passed to the hostname resolver.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2015-06-29 15:59:44 +02:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>global-dns-domain</literal> sections</title>
|
|
|
|
|
<para>Sections with a name starting with the "global-dns-domain-"
|
|
|
|
|
prefix allow to define global DNS configuration for specific
|
|
|
|
|
domains. The part of section name after "global-dns-domain-"
|
|
|
|
|
specifies the domain name a section applies to. More specific
|
|
|
|
|
domains have the precedence over less specific ones and the
|
|
|
|
|
default domain is represented by the wildcard "*". A default
|
|
|
|
|
domain section is mandatory.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
2016-01-27 12:54:18 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>servers</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
A list of addresses of DNS servers to be used for the given domain.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>options</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
A list of domain-specific DNS options. Not used at the moment.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
2015-06-29 15:59:44 +02:00
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
config: allow to enable/disable configuration snippets
Support a new configuration option
[.config]
enable=<ENABLED>
for configuration snippets.
This new [.config] section is only relevant within the snippet itself
and it is not merged into the combined configuration.
Currently only the "enable" key is supported. If the "enable" key is
missing, it obviously defaults to being enabled. It allows snippets
to be skipped from loading. The main configuration "NetworkManager.conf"
cannot be skipped.
<ENABLED> can be a boolean value (false), to skip a configuration
snippet from loading.
It can also be a string to match against the NetworkManager version,
like "enable=nm-version-min:1.1,nm-version-min:1.0.6"
There are several motivations for this:
- the user can disable an entire configuration snippet by toggeling
one entry.
This generalizes the functionality of the global-dns.enable
setting, but in a way that applies to configuration on a per-file
basis.
- for developing, we often switch between different versions of
NetworkManager. Thus, we might want to use different configuration.
E.g. before global-dns options, I want to use "dns=none" and manage
resolv.conf myself. Now, I can use global-dns setting to do that.
That can be achieved with something like the following (not exactly,
it's an example only):
[.config]
enable=nm-version-min:1.1
[main]
dns=default
[global-dns-domain-*]
nameserver=127.0.0.1
Arguably, this would be more awesome, if we would bump our micro devel
version (1.1.0) more often while developing 1.2.0 (*hint*).
- in principle, packages could drop configuration snippets and enable
them based on the NetworkManager version.
- with the "env:" spec, you can enable/disable snippets by configuring
an environment variable. Again, useful for testing and developing.
2015-10-01 10:43:33 +02:00
|
|
|
<refsect1>
|
|
|
|
|
<title><literal>.config</literal> sections</title>
|
|
|
|
|
<para>This is a special section that contains options which apply
|
|
|
|
|
to the configuration file that contains the option.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term><varname>enable</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
Defaults to "<literal>true</literal>". If "<literal>false</literal>",
|
|
|
|
|
the configuration file will be skipped during loading.
|
2015-12-24 09:48:20 +01:00
|
|
|
Note that the main configuration file <literal>NetworkManager.conf</literal>
|
config: allow to enable/disable configuration snippets
Support a new configuration option
[.config]
enable=<ENABLED>
for configuration snippets.
This new [.config] section is only relevant within the snippet itself
and it is not merged into the combined configuration.
Currently only the "enable" key is supported. If the "enable" key is
missing, it obviously defaults to being enabled. It allows snippets
to be skipped from loading. The main configuration "NetworkManager.conf"
cannot be skipped.
<ENABLED> can be a boolean value (false), to skip a configuration
snippet from loading.
It can also be a string to match against the NetworkManager version,
like "enable=nm-version-min:1.1,nm-version-min:1.0.6"
There are several motivations for this:
- the user can disable an entire configuration snippet by toggeling
one entry.
This generalizes the functionality of the global-dns.enable
setting, but in a way that applies to configuration on a per-file
basis.
- for developing, we often switch between different versions of
NetworkManager. Thus, we might want to use different configuration.
E.g. before global-dns options, I want to use "dns=none" and manage
resolv.conf myself. Now, I can use global-dns setting to do that.
That can be achieved with something like the following (not exactly,
it's an example only):
[.config]
enable=nm-version-min:1.1
[main]
dns=default
[global-dns-domain-*]
nameserver=127.0.0.1
Arguably, this would be more awesome, if we would bump our micro devel
version (1.1.0) more often while developing 1.2.0 (*hint*).
- in principle, packages could drop configuration snippets and enable
them based on the NetworkManager version.
- with the "env:" spec, you can enable/disable snippets by configuring
an environment variable. Again, useful for testing and developing.
2015-10-01 10:43:33 +02:00
|
|
|
cannot be disabled.
|
|
|
|
|
<programlisting>
|
|
|
|
|
# always skip loading the config file
|
|
|
|
|
[.config]
|
|
|
|
|
enable=false
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
You can also match against the version of NetworkManager. For example
|
|
|
|
|
the following are valid configurations:
|
|
|
|
|
<programlisting>
|
|
|
|
|
# only load on version 1.0.6
|
|
|
|
|
[.config]
|
|
|
|
|
enable=nm-version:1.0.6
|
|
|
|
|
|
|
|
|
|
# load on all versions 1.0.x, but not 1.2.x
|
|
|
|
|
[.config]
|
|
|
|
|
enable=nm-version:1.0
|
|
|
|
|
|
|
|
|
|
# only load on versions >= 1.1.6. This does not match
|
|
|
|
|
# with version 1.2.0 or 1.4.4. Only the last digit is considered.
|
|
|
|
|
[.config]
|
|
|
|
|
enable=nm-version-min:1.1.6
|
|
|
|
|
|
|
|
|
|
# only load on versions >= 1.2. Contrary to the previous
|
|
|
|
|
# example, this also matches with 1.2.0, 1.2.10, 1.4.4, etc.
|
|
|
|
|
[.config]
|
|
|
|
|
enable=nm-version-min:1.2
|
|
|
|
|
|
|
|
|
|
# Match against the maximum allowed version. The example matches
|
|
|
|
|
# versions 1.2.0, 1.2.2, 1.2.4. Again, only the last version digit
|
|
|
|
|
# is allowed to be smaller. So this would not match match on 1.1.10.
|
|
|
|
|
[.config]
|
|
|
|
|
enable=nm-version-max:1.2.6
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
You can also match against the value of the environment variable
|
|
|
|
|
<literal>NM_CONFIG_ENABLE_TAG</literal>, like:
|
|
|
|
|
<programlisting>
|
|
|
|
|
# always skip loading the file when running NetworkManager with
|
|
|
|
|
# environment variable "NM_CONFIG_ENABLE_TAG=TAG1"
|
|
|
|
|
[.config]
|
|
|
|
|
enable=env:TAG1
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
More then one match can be specified. The configuration will be
|
|
|
|
|
enabled if one of the predicates matches ("or"). The special prefix "except:" can
|
|
|
|
|
be used to negate the match. Note that if one except-predicate
|
|
|
|
|
matches, the entire configuration will be disabled.
|
|
|
|
|
In other words, a except predicate always wins over other predicates.
|
|
|
|
|
<programlisting>
|
|
|
|
|
# enable the configuration either when the environment variable
|
|
|
|
|
# is present or the version is at least 1.2.0.
|
|
|
|
|
[.config]
|
|
|
|
|
enable=env:TAG2,nm-version-min:1.2
|
|
|
|
|
|
|
|
|
|
# enable the configuration for version >= 1.2.0, but disable
|
|
|
|
|
# it when the environment variable is set to "TAG3"
|
|
|
|
|
[.config]
|
|
|
|
|
enable=except:env:TAG3,nm-version-min:1.2
|
|
|
|
|
|
|
|
|
|
# enable the configuration on >= 1.3, >= 1.2.6, and >= 1.0.16.
|
|
|
|
|
# Useful if a certain feature is only present since those releases.
|
|
|
|
|
[.config]
|
|
|
|
|
enable=nm-version-min:1.3,nm-version-min:1.2.6,nm-version-min:1.0.16
|
|
|
|
|
</programlisting>
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
2013-04-09 16:41:00 -04:00
|
|
|
<refsect1>
|
|
|
|
|
<title>Plugins</title>
|
|
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>keyfile</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
The <literal>keyfile</literal> plugin is the generic
|
|
|
|
|
plugin that supports all the connection types and
|
|
|
|
|
capabilities that NetworkManager has. It writes files out
|
|
|
|
|
in an .ini-style format in
|
|
|
|
|
/etc/NetworkManager/system-connections.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
The stored connection file may contain passwords and
|
|
|
|
|
private keys, so it will be made readable only to root,
|
|
|
|
|
and the plugin will ignore files that are readable or
|
|
|
|
|
writable by any user or group other than root.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
This plugin is always active, and will automatically be
|
|
|
|
|
used to store any connections that aren't supported by any
|
|
|
|
|
other active plugin.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>ifcfg-rh</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
This plugin is used on the Fedora and Red Hat Enterprise
|
|
|
|
|
Linux distributions to read and write configuration from
|
|
|
|
|
the standard
|
|
|
|
|
<filename>/etc/sysconfig/network-scripts/ifcfg-*</filename>
|
|
|
|
|
files. It currently supports reading Ethernet, Wi-Fi,
|
|
|
|
|
InfiniBand, VLAN, Bond, Bridge, and Team connections.
|
|
|
|
|
Enabling <literal>ifcfg-rh</literal> implicitly enables
|
|
|
|
|
<literal>ibft</literal> plugin, if it is available.
|
|
|
|
|
This can be disabled by adding <literal>no-ibft</literal>.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>ifcfg-suse</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
This plugin is deprecated and its selection has no effect.
|
|
|
|
|
The <literal>keyfile</literal> plugin should be used
|
|
|
|
|
instead.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>ifupdown</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
This plugin is used on the Debian and Ubuntu
|
|
|
|
|
distributions, and reads Ethernet and Wi-Fi connections
|
|
|
|
|
from <filename>/etc/network/interfaces</filename>.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
This plugin is read-only; any connections (of any type)
|
|
|
|
|
added from within NetworkManager when you are using this
|
|
|
|
|
plugin will be saved using the <literal>keyfile</literal>
|
|
|
|
|
plugin instead.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2013-04-09 16:41:00 -04:00
|
|
|
</varlistentry>
|
2014-10-21 09:24:06 +02:00
|
|
|
|
|
|
|
|
<varlistentry>
|
2016-01-27 12:54:18 +01:00
|
|
|
<term><varname>ibft</varname>, <varname>no-ibft</varname></term>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
This plugin allows to read iBFT configuration (iSCSI Boot Firmware Table).
|
|
|
|
|
The configuration is read using /sbin/iscsiadm. Users are expected to
|
|
|
|
|
configure iBFT connections via the firmware interfaces.
|
|
|
|
|
If ibft support is available, it is automatically enabled after
|
|
|
|
|
<literal>ifcfg-rh</literal>. This can be disabled by <literal>no-ibft</literal>.
|
|
|
|
|
You can also explicitly specify <literal>ibft</literal> to load the
|
|
|
|
|
plugin without <literal>ifcfg-rh</literal> or to change the plugin order.
|
|
|
|
|
</para>
|
2016-09-02 13:35:00 +02:00
|
|
|
<para>
|
|
|
|
|
Note that ibft plugin uses /sbin/iscsiadm and thus requires CAP_SYS_ADMIN capability.
|
|
|
|
|
</para>
|
2016-01-27 12:54:18 +01:00
|
|
|
</listitem>
|
2014-10-21 09:24:06 +02:00
|
|
|
</varlistentry>
|
|
|
|
|
|
2013-04-09 16:41:00 -04:00
|
|
|
</variablelist>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
2015-02-09 15:33:28 +01:00
|
|
|
<refsect1>
|
|
|
|
|
<title>Appendix</title>
|
|
|
|
|
<refsect2 id="device-spec">
|
|
|
|
|
<title>Device List Format</title>
|
|
|
|
|
<para>
|
|
|
|
|
The configuration options <literal>main.no-auto-default</literal>, <literal>main.ignore-carrier</literal>,
|
config: make "ignore-carrier" a per-device configuration option
NetworkManager.conf already contains several per-device settings,
that is, settings that have a device-spec as argument.
main.ignore-carrier
main.no-auto-default
main.assume-ipv6ll-only
keyfile.unmanged-devices
Optimally, these settings should be moved to the new [device*]
section.
For now, only move main.ignore-carrier there. For the others
it may not make sense to do so:
- main.no-auto-default: is already merged with internal state
from /var/lib/NetworkManager/no-auto-default.state. While
NMConfig's write API would be fine to also persist and merge
the no-auto-default setting, we'd still have to read the old
file too. Thus, deprecating this setting gets quite cumbersome
to still handle the old state file.
Also, it seems a less useful setting to configure in the
global configuration aside setting main.no-auto-default=*.
- main.assume-ipv6ll-only: one day, I hope that we no longer
assume connections at all, and this setting becomes entirely
obsolete.
- keyfile.unmanged-devices: this sets NM_UNMANAGED_USER_SETTINGS,
which cannot be overruled via D-Bus. For a future device.managed
setting we want it it to be overwritable via D-Bus by an explicit
user action. Thus, a device.managed property should have a different
semantic, this should be more like a device.unmanaged-force setting,
which could be done.
2016-06-22 13:43:08 +02:00
|
|
|
<literal>keyfile.unmanaged-devices</literal>, <literal>connection*.match-device</literal> and
|
|
|
|
|
<literal>device*.match-device</literal> select devices based on a list of matchings.
|
2015-02-09 15:33:28 +01:00
|
|
|
Devices can be specified using the following format:
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
<variablelist>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>*</term>
|
|
|
|
|
<listitem><para>Matches every device.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>IFNAME</term>
|
|
|
|
|
<listitem><para>Case sensitive match of interface name of the device. Globbing is not supported.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>HWADDR</term>
|
2016-06-15 11:25:29 +02:00
|
|
|
<listitem><para>Match the permanent MAC address of the device. Globbing is not supported</para></listitem>
|
2015-02-09 15:33:28 +01:00
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>interface-name:IFNAME</term>
|
|
|
|
|
<term>interface-name:~IFNAME</term>
|
|
|
|
|
<listitem><para>Case sensitive match of interface name of the device. Simple globbing is supported with
|
|
|
|
|
<literal>*</literal> and <literal>?</literal>. Ranges and escaping is not supported.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>interface-name:=IFNAME</term>
|
|
|
|
|
<listitem><para>Case sensitive match of interface name of the device. Globbing is disabled and <literal>IFNAME</literal>
|
|
|
|
|
is taken literally.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>mac:HWADDR</term>
|
2016-06-15 11:25:29 +02:00
|
|
|
<listitem><para>Match the permanent MAC address of the device. Globbing is not supported</para></listitem>
|
2015-02-09 15:33:28 +01:00
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>s390-subchannels:HWADDR</term>
|
|
|
|
|
<listitem><para>Match the device based on the subchannel address. Globbing is not supported</para></listitem>
|
|
|
|
|
</varlistentry>
|
2015-05-15 14:30:40 +02:00
|
|
|
<varlistentry>
|
|
|
|
|
<term>type:TYPE</term>
|
|
|
|
|
<listitem><para>Match the device type. Valid type names are as reported by "<literal>nmcli -f GENERAL.TYPE device show</literal>".
|
|
|
|
|
Globbing is not supported.</para></listitem>
|
|
|
|
|
</varlistentry>
|
2015-02-09 15:33:28 +01:00
|
|
|
<varlistentry>
|
|
|
|
|
<term>except:SPEC</term>
|
|
|
|
|
<listitem><para>Negative match of a device. <literal>SPEC</literal> must be explicitly qualified with
|
|
|
|
|
a prefix such as <literal>interface-name:</literal>. A negative match has higher priority then the positive
|
|
|
|
|
matches above.</para></listitem>
|
|
|
|
|
</varlistentry>
|
|
|
|
|
<varlistentry>
|
|
|
|
|
<term>SPEC[,;]SPEC</term>
|
2015-12-24 09:48:20 +01:00
|
|
|
<listitem><para>Multiple specs can be concatenated with commas or semicolons. The order does not matter as
|
2015-12-09 13:28:11 +01:00
|
|
|
matches are either inclusive or negative (<literal>except:</literal>), with negative matches having higher
|
|
|
|
|
priority.
|
|
|
|
|
</para>
|
2015-02-09 15:33:28 +01:00
|
|
|
<para>Backslash is supported to escape the separators ';' and ',', and to express special
|
|
|
|
|
characters such as newline ('\n'), tabulator ('\t'), whitespace ('\s') and backslash ('\\'). The globbing of
|
2015-12-09 13:28:11 +01:00
|
|
|
interface names cannot be escaped. Whitespace is not a separator but will be trimmed between
|
|
|
|
|
two specs (unless escaped as '\s').
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2015-02-09 15:33:28 +01:00
|
|
|
</varlistentry>
|
|
|
|
|
</variablelist>
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Example:
|
|
|
|
|
<programlisting>
|
|
|
|
|
interface-name:em4
|
|
|
|
|
mac:00:22:68:1c:59:b1;mac:00:1E:65:30:D1:C4;interface-name:eth2
|
|
|
|
|
interface-name:vboxnet*,except:interface-name:vboxnet2
|
|
|
|
|
*,except:mac:00:22:68:1c:59:b1
|
2016-01-27 12:54:18 +01:00
|
|
|
</programlisting>
|
2015-02-09 15:33:28 +01:00
|
|
|
</para>
|
|
|
|
|
</refsect2>
|
|
|
|
|
</refsect1>
|
|
|
|
|
|
2013-04-09 16:41:00 -04:00
|
|
|
<refsect1>
|
|
|
|
|
<title>See Also</title>
|
|
|
|
|
<para>
|
2016-05-30 20:24:32 +02:00
|
|
|
<link linkend='NetworkManager'><citerefentry><refentrytitle>NetworkManager</refentrytitle><manvolnum>8</manvolnum></citerefentry></link>,
|
|
|
|
|
<link linkend='nmcli'><citerefentry><refentrytitle>nmcli</refentrytitle><manvolnum>1</manvolnum></citerefentry></link>,
|
|
|
|
|
<link linkend='nmcli-examples'><citerefentry><refentrytitle>nmcli-examples</refentrytitle><manvolnum>7</manvolnum></citerefentry></link>,
|
|
|
|
|
<link linkend='nm-online'><citerefentry><refentrytitle>nm-online</refentrytitle><manvolnum>1</manvolnum></citerefentry></link>,
|
|
|
|
|
<link linkend='nm-settings'><citerefentry><refentrytitle>nm-settings</refentrytitle><manvolnum>5</manvolnum></citerefentry></link>,
|
2013-04-09 16:41:00 -04:00
|
|
|
<citerefentry><refentrytitle>nm-applet</refentrytitle><manvolnum>1</manvolnum></citerefentry>,
|
|
|
|
|
<citerefentry><refentrytitle>nm-connection-editor</refentrytitle><manvolnum>1</manvolnum></citerefentry>
|
|
|
|
|
</para>
|
|
|
|
|
</refsect1>
|
|
|
|
|
</refentry>
|