lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1350248549.21172.17188.camel@edumazet-glaptop> Date: Sun, 14 Oct 2012 23:02:29 +0200 From: Eric Dumazet <eric.dumazet@...il.com> To: Jan Hinnerk Stosch <janhinnerk.stosch@...il.com> Cc: netdev@...r.kernel.org Subject: Re: regression when connecting to ipv6 localhost On Sun, 2012-10-14 at 22:56 +0200, Jan Hinnerk Stosch wrote: > 2012/10/14 Eric Dumazet <eric.dumazet@...il.com>: > > On Sun, 2012-10-14 at 22:45 +0200, Eric Dumazet wrote: > > > >> OK so IPv6 UDP frames are delivered to ntpd > >> > >> could you strace it while doing one "ntpq -p" > >> > >> strace -p 368 > >> > > > > Also please post "ip -6 addr" > > > > > > ip -6 addr gives: > 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 > inet6 ::1/128 scope host > valid_lft forever preferred_lft forever > 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qlen 1000 > inet6 fe80::922b:34ff:fe33:c292/64 scope link > valid_lft forever preferred_lft forever > > And the output of "strace ntpq -p" is attached in file "ntpq-p". > > I also did a tcpdump earlier this day as told in the bugtracker. Find > the parts containing "ntpd" attached in file "tcpdump". I already got these files, thank you I asked a strace of the ntpd daemon, since we now know frames are delivered to the application. I want to check what ntpd does of these frames, since apparently it gives no answer. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists