Your message dated Tue, 12 Jul 2005 19:02:25 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#317655: fixed in zeroconf 0.6-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 10 Jul 2005 13:20:08 +0000
>From [EMAIL PROTECTED] Sun Jul 10 06:20:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from kerouac.projectcolo.org.uk [80.71.3.114] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Drbj5-0003Tp-00; Sun, 10 Jul 2005 06:20:07 -0700
Received: from localhost (localhost [127.0.0.1])
        by kerouac.projectcolo.org.uk (Postfix) with ESMTP id 2F51579FB7
        for <[EMAIL PROTECTED]>; Sun, 10 Jul 2005 14:19:56 +0100 (BST)
Received: from kerouac.projectcolo.org.uk ([127.0.0.1])
        by localhost (kerouac [127.0.0.1]) (amavisd-new, port 10024)
        with ESMTP id 08740-04 for <[EMAIL PROTECTED]>;
        Sun, 10 Jul 2005 14:19:56 +0100 (BST)
Received: by kerouac.projectcolo.org.uk (Postfix, from userid 10003)
        id 0C73179DB1; Sun, 10 Jul 2005 14:19:56 +0100 (BST)
Date: Sun, 10 Jul 2005 14:19:55 +0100
From: Mark Brown <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: zeroconf: Crucifies the network
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.3.28i
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at projectcolo.org.uk
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: zeroconf
Version: 0.3-1
Severity: critical

It appears that zeroconf can get itself into a state where it
continually loops, issuing ARP requests for IP addresses which other
computers already have assigned.  Looking at the code there appears to
be no attempt to restrict the number of addresses tried and unless I
misread the code the default interval between probes is rather low.

Ideally zeroconf should either give up or back up if it encounters a
large number of conflicts in order to avoid DoSing the network.  The RFC
recommends a limit, IIRC.

Filed with raised severity since this can cause serious disruption to
the network when it happens.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-powerpc
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)

Versions of packages zeroconf depends on:
ii  ifupdown                    0.6.7        high level tools to configure netw
ii  iproute                     20041019-3   Professional tools to control the
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an

zeroconf recommends no packages.



-- 
"You grabbed my hand and we fell into it, like a daydream - or a fever."

---------------------------------------
Received: (at 317655-close) by bugs.debian.org; 12 Jul 2005 23:08:09 +0000
>From [EMAIL PROTECTED] Tue Jul 12 16:08:09 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DsTrF-0007e9-00; Tue, 12 Jul 2005 16:08:09 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DsTlh-0002xW-00; Tue, 12 Jul 2005 19:02:25 -0400
From: Anand Kumria <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#317655: fixed in zeroconf 0.6-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 12 Jul 2005 19:02:25 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 6

Source: zeroconf
Source-Version: 0.6-1

We believe that the bug you reported is fixed in the latest version of
zeroconf, which is due to be installed in the Debian FTP archive:

zeroconf_0.6-1.diff.gz
  to pool/main/z/zeroconf/zeroconf_0.6-1.diff.gz
zeroconf_0.6-1.dsc
  to pool/main/z/zeroconf/zeroconf_0.6-1.dsc
zeroconf_0.6-1_i386.deb
  to pool/main/z/zeroconf/zeroconf_0.6-1_i386.deb
zeroconf_0.6.orig.tar.gz
  to pool/main/z/zeroconf/zeroconf_0.6.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anand Kumria <[EMAIL PROTECTED]> (supplier of updated zeroconf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 11 Jul 2005 00:13:02 +1000
Source: zeroconf
Binary: zeroconf
Architecture: source i386
Version: 0.6-1
Distribution: unstable
Urgency: high
Maintainer: Anand Kumria <[EMAIL PROTECTED]>
Changed-By: Anand Kumria <[EMAIL PROTECTED]>
Description: 
 zeroconf   - IPv4 link-local address allocator
Closes: 302585 302680 302683 302684 303364 317655
Changes: 
 zeroconf (0.6-1) unstable; urgency=high
 .
   * New upstream release
   * Don't crucify Mark's network with lots of ARP packets (Closes: #317655)
     -- thus the ugency.
   * Change the name of the if-up.d script to zeroconf (Closes: #302585)
   * Copyright information is now available (Closes: #302680)
   * Ship all documentation (Closes: #302683)
   * Make the address add/remove scripts more robust so we don't cause
     (harmless) errors to appear (Closes: #303364, #302684)
Files: 
 30ea0c4465c2b1a4706c405bd5bd73b0 678 net optional zeroconf_0.6-1.dsc
 59606a0925564e15160a4ec9a018cdc2 42179 net optional zeroconf_0.6.orig.tar.gz
 aa84082fb89fab22021ce43e7d8c6b6d 3223 net optional zeroconf_0.6-1.diff.gz
 514839dacc389797ed413fae02ebd0bd 37144 net optional zeroconf_0.6-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iQCVAwUBQtRKgGRmcAD8BdppAQIA/AQAokbkBVWpmJ765ejPvnpZO+6KGYKttfzA
iqs4KBuRyw+v9MNdxB3o/vzrUVnb6IzWJAzJjRG0Mi2TkeNKZxObRO3lKg12Vx/x
QD8lRL7LF+ZL76moBRqG90F/jlyqo7NaZi7l6onoUwSZ6hateXhoyb1O3ELsC1l8
j4MleiDU/Ok=
=4i2M
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to