Can you try this:

rm -rf pidgin-test
mkdir pidgin-test
strace -e trace=socket,sendto pidgin -c pidgin-test 2>&1 | \
    tee pidgin.log

Hopefully you'll see some socket() call for 5353 and some sendto() calls as it sends the packets.

If so, then let's try to find out what is opening that socket. We will do that by using gdb to get a backtrace from every call to socket.

You will need gdb installed:
sudo apt install gdb

Since you're on sid, you should be able to use debuginfod (though I have never used it personally):
export DEBUGINFOD_URLS="https://debuginfod.debian.net";

More instructions here if debuginfod does not work:
https://wiki.debian.org/HowToGetABacktrace

Then run like this:

gdb pidgin
set args -c pidgin-test
set pagination off
set logging file pidgin-gdb.txt
set logging on
break socket
# say yes to the prompt
commands
bt
continue
end
run

Once it sends some packets, kill it with Ctrl-C, type quit, and confirm you are okay with gdb killing pidgin.

Send me the pidgin.log and the pidgin-gdb.txt. Hopefully I can then determine which backtrace corresponds to the socket that sends the packets. If not, then you'll have to do the gdb thing again but breaking on both socket and sendto.

--
Richard

Reply via email to