Setting up Ipv6-pd with dnsmasq on a linux router

This follows on from my last post, and is basically a distillation of this excellent post on Super User. 

These steps will work with Starhub Fibre ipv6 or any other provider who does IPv6 PD

I found I *didn’t* need to set up a few things the way he did  and there were a few additional steps with my firewall for things to work. Its still a little WIP (firewalld blocks ipv6 ping into my network and might have things secured already)

to /etc/sysctl.conf add lines

# Obtain IPv6 address on wan interface by Stateless autoconfiguration (SLAAC)

This enables route advertisement in the kernel. Load your changes with
sysctl -p

Install the wide dhcpv6 client. For some reason this is the only one that does prefix delegation

sudo apt install wide-dhcpv6-client

You *don’t* actually have to set up /etc/network/interfaces for ipv6

replace /etc/wide-dhcpv6/dhcp6c.conf with

profile default

  request domain-name-servers;
  request domain-name;

  script "/etc/wide-dhcpv6/dhcp6c-script";

interface enp1s0 {
    send rapid-commit;

    send ia-na 0;
    send ia-pd 0;

id-assoc na 0 {


id-assoc pd 0 {
    prefix ::/64 infinity;

    # Internal interface (LAN)
    prefix-interface br0{
        sla-len 0;
        sla-id 0;
        ifid 1;

There’s a few changes here – I had to change the sla-len to 0 since my ISP provides a /64

Set up dnsmasq

# Do router advertisements for all subnets where we're doing DHCPv6
# Unless overridden by ra-stateless, ra-names, et al, the router
# advertisements will have the M and O bits set, so that the clients
# get addresses and configuration from DHCPv6, and the A bit reset, so the
# clients don't use SLAAC addresses.
dhcp-range = ::1,constructor:br0,   ra-stateless, ra-names, 12h

restart all the things –
sudo systemctl start wide-dhcpv6-client
sudo systemctl enable wide-dhcpv6-client
sudo systemctl restart networks
sudo systemctl restart dnsmasq

for some reason things wouldn’t work until I set up some forwarding rules

firewall-cmd --direct --add-rule ipv6 filter FORWARD 0 -i br0 -o  enp1s0 -j ACCEPT

firewall-cmd --direct --add-rule ipv6 filter FORWARD 0 -i enp1s0 -o br0 -m state --state RELATED,ESTABLISHED -j ACCEPT

To test 

Check if there’s a non link local IP v6 address for the internet facing interface.

Check to see if you can ping and open IPv6 test is also a useful way to troubleshoot. 

There’s still a few bits to work out but these steps work well enough to get things running.

Leave a Comment