I was able to lab it up and confirm and recreate the bug. I realize
that this subject has been beaten to death now but I wanted to chime
in saying:
* Yes, it's definitely fixed in -current. This isn't new information
but good info for my organization.
* There's a simple way to reliable reproduce it for anyone who's curious.
Here's how to create the issue with just two devices- openbsd and any
other ospf capable device- I just used an old C2600. I took it to the
extreme and created ~500 loopback interfaces so my updates and
database would be large. The easy way to do it was:
--- start ---
#!/bin/sh
CONF=/etc/ospfd-bad.conf
echo "area 0.0.0.0 {" > $CONF
echo "interface em0 {}" >> $CONF
for S in 1 2
do
for I in `jot 254`
do
echo "inet 10.1$S.$I.1 255.255.255.0" > /etc/hostname.lo$S$I
echo "interface lo$S$I { passive }" >> $CONF
done
done
echo "}" >> $CONF
--- end ---
As soon as it gets an LS request from its neighbor (.254) you get the
flood from ospfd (.1):
http://falz.net/static/openbsd/lab-ospfd-bug-screenshot.png
--Chris