I can confirm this bug, and i can confirm that was not present on lenny's arpwatch version, appeared only on squeeze (2.1a15-1.1).
As possible, i've worked out the trouble at switch level, modifying the configuration and removing at the source unwanted traffic. But there's no possible to do that generally, and i've had to disable arpwatch on some server to prevent logfile hog, because i've a ''duble LAN configuration, one on a phisical interface (eth0) and one on a vlan over that (eth0.666). I hope it will be fixed soon. I don't know if there's some iptables rule that are able to filter VLAN-ed ARP request on the main interface, without breaking all the ARP resolution protocol. ;-) Thanks. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org