Your message dated Tue, 12 Jul 2005 19:02:25 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#317655: fixed in zeroconf 0.6-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 10 Jul 2005 13:20:08 +0000 >From [EMAIL PROTECTED] Sun Jul 10 06:20:07 2005 Return-path: <[EMAIL PROTECTED]> Received: from kerouac.projectcolo.org.uk [80.71.3.114] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Drbj5-0003Tp-00; Sun, 10 Jul 2005 06:20:07 -0700 Received: from localhost (localhost [127.0.0.1]) by kerouac.projectcolo.org.uk (Postfix) with ESMTP id 2F51579FB7 for <[EMAIL PROTECTED]>; Sun, 10 Jul 2005 14:19:56 +0100 (BST) Received: from kerouac.projectcolo.org.uk ([127.0.0.1]) by localhost (kerouac [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 08740-04 for <[EMAIL PROTECTED]>; Sun, 10 Jul 2005 14:19:56 +0100 (BST) Received: by kerouac.projectcolo.org.uk (Postfix, from userid 10003) id 0C73179DB1; Sun, 10 Jul 2005 14:19:56 +0100 (BST) Date: Sun, 10 Jul 2005 14:19:55 +0100 From: Mark Brown <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: zeroconf: Crucifies the network Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.28i X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at projectcolo.org.uk Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: zeroconf Version: 0.3-1 Severity: critical It appears that zeroconf can get itself into a state where it continually loops, issuing ARP requests for IP addresses which other computers already have assigned. Looking at the code there appears to be no attempt to restrict the number of addresses tried and unless I misread the code the default interval between probes is rather low. Ideally zeroconf should either give up or back up if it encounters a large number of conflicts in order to avoid DoSing the network. The RFC recommends a limit, IIRC. Filed with raised severity since this can cause serious disruption to the network when it happens. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: powerpc (ppc) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.11-powerpc Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Versions of packages zeroconf depends on: ii ifupdown 0.6.7 high level tools to configure netw ii iproute 20041019-3 Professional tools to control the ii libc6 2.3.2.ds1-22 GNU C Library: Shared libraries an zeroconf recommends no packages. -- "You grabbed my hand and we fell into it, like a daydream - or a fever." --------------------------------------- Received: (at 317655-close) by bugs.debian.org; 12 Jul 2005 23:08:09 +0000 >From [EMAIL PROTECTED] Tue Jul 12 16:08:09 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DsTrF-0007e9-00; Tue, 12 Jul 2005 16:08:09 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DsTlh-0002xW-00; Tue, 12 Jul 2005 19:02:25 -0400 From: Anand Kumria <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#317655: fixed in zeroconf 0.6-1 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Tue, 12 Jul 2005 19:02:25 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 6 Source: zeroconf Source-Version: 0.6-1 We believe that the bug you reported is fixed in the latest version of zeroconf, which is due to be installed in the Debian FTP archive: zeroconf_0.6-1.diff.gz to pool/main/z/zeroconf/zeroconf_0.6-1.diff.gz zeroconf_0.6-1.dsc to pool/main/z/zeroconf/zeroconf_0.6-1.dsc zeroconf_0.6-1_i386.deb to pool/main/z/zeroconf/zeroconf_0.6-1_i386.deb zeroconf_0.6.orig.tar.gz to pool/main/z/zeroconf/zeroconf_0.6.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Anand Kumria <[EMAIL PROTECTED]> (supplier of updated zeroconf package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 11 Jul 2005 00:13:02 +1000 Source: zeroconf Binary: zeroconf Architecture: source i386 Version: 0.6-1 Distribution: unstable Urgency: high Maintainer: Anand Kumria <[EMAIL PROTECTED]> Changed-By: Anand Kumria <[EMAIL PROTECTED]> Description: zeroconf - IPv4 link-local address allocator Closes: 302585 302680 302683 302684 303364 317655 Changes: zeroconf (0.6-1) unstable; urgency=high . * New upstream release * Don't crucify Mark's network with lots of ARP packets (Closes: #317655) -- thus the ugency. * Change the name of the if-up.d script to zeroconf (Closes: #302585) * Copyright information is now available (Closes: #302680) * Ship all documentation (Closes: #302683) * Make the address add/remove scripts more robust so we don't cause (harmless) errors to appear (Closes: #303364, #302684) Files: 30ea0c4465c2b1a4706c405bd5bd73b0 678 net optional zeroconf_0.6-1.dsc 59606a0925564e15160a4ec9a018cdc2 42179 net optional zeroconf_0.6.orig.tar.gz aa84082fb89fab22021ce43e7d8c6b6d 3223 net optional zeroconf_0.6-1.diff.gz 514839dacc389797ed413fae02ebd0bd 37144 net optional zeroconf_0.6-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iQCVAwUBQtRKgGRmcAD8BdppAQIA/AQAokbkBVWpmJ765ejPvnpZO+6KGYKttfzA iqs4KBuRyw+v9MNdxB3o/vzrUVnb6IzWJAzJjRG0Mi2TkeNKZxObRO3lKg12Vx/x QD8lRL7LF+ZL76moBRqG90F/jlyqo7NaZi7l6onoUwSZ6hateXhoyb1O3ELsC1l8 j4MleiDU/Ok= =4i2M -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]