Bug #441

Fwd: [Cerowrt-devel] odhcp6c went crazy flooding Comcast with DHCPv6 SOLICITs

Added by David Taht on Mar 25, 2014. Updated on Mar 25, 2014.
Closed Normal Dave Täht

Description

———- Forwarded message ———-
From: Chuck Anderson cra@wpi.edu
Date: Tue, Mar 25, 2014 at 7:40 PM
Subject: Re: [Cerowrt-devel] odhcp6c went crazy flooding Comcast with
DHCPv6 SOLICITs
To: cerowrt-devel@lists.bufferbloat.net

This happened again, but this time it killed the eMTA in my cable
modem, knocking out my Xfinity Voice service. The Arris Telephony
Modem got stuck at Telephony-DHCP and wouldn’t boot past that point,
which is unsurprising given the large flood of DHCPv6 Solicit packets
going through it. As soon as I unplugged the CeroWrt WAN interface,
the Arris eMTA was able to boot and my phone service was restored.

This was with the CeroWrt comcast release 3.10.28-4 which has been
sitting there running for 52 days. It appears to take a long time to
see this issue, so mabye no one here has seen it because they reboot
or upgrade their CeroWrt routers more often than that, or maybe no one
is using odhcp6c anymore.

This is definitely a severe bug in odhcp6c. It should have built-in
rate limiting to prevent it from trashing the network. It is never
correct for a DHCP client to send packets this rapidly.

The odhcp6c process is currently taking all available CPU, about 86%,
with 12% taken by rngd. How can I debug this currently running
process? There is no “strace” binary to see what it is doing…

17039 1182 root R 828 1% 86% odhcp6c -s /lib/netifd/dhcpv6.script
1778 1 root S 816 1% 12% /sbin/rngd -f -r /dev/urandom -W 4000
1286 1 root S 2756 2% 0% /usr/sbin/snmpd -Lf /dev/null -p /var
20565 20081 root R 1708 1% 0% top
20064 1326 root S 1300 1% 0% dropbear -i
1601 1 root S 1216 1% 0% /usr/sbin/babeld -D -I /var/run/babel
1098 2 root SW 0 0% 0% [kworker/0:3]
1254 1 root S 4828 4% 0% /usr/sbin/lighttpd -D -f /etc/lighttp
1226 1 www-data S 4244 3% 0% /usr/sbin/lighttpd -D -f /etc/lighttp
1628 1 root S 3952 3% 0% /usr/sbin/hostapd -P /var/run/wifi-ph
1663 1 root S 3952 3% 0% /usr/sbin/hostapd -P /var/run/wifi-ph
1537 1 nobody S 2320 2% 0% avahi-daemon: running [cerowrt.local]
1450 1 root S 1756 1% 0% /usr/sbin/dbus-daemon –system
1348 1182 root S 1716 1% 0% udhcpc -p /var/run/udhcpc-ge00.pid -s
20081 20064 root S 1716 1% 0% -ash
1242 1 root S 1712 1% 0% /usr/sbin/crond -f c /etc/crontabs
1791 1 root S 1708 1% 0% /usr/sbin/ntpd -n -l -p 0.openwrt.poo
1182 1 root S 1576 1% 0% /sbin/netifd
16232 1 nobody S 1436 1% 0% /usr/sbin/dnsmasq -C /var/etc/dnsmasq
\^C233 16232 root S 1432 1% 0% /usr/sbin/dnsmasq -C /var/etc/dnsmasq

root@cerowrt:/# uptime
22:32:31 up 52 days, 1:10, load average: 1.27, 1.29, 1.26

Tcpdump output:

22:04:42.703054 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.703239 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.703422 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.703603 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.703786 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.703968 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.704151 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.704334 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.704516 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.704698 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.704881 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.705104 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.705290 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.705472 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.705655 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.705837 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.706020 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.706202 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.706385 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.706566 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.706749 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.706932 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.707116 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.707298 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.707481 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.707664 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.707846 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.708028 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.708211 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.708393 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.708576 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.708759 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.708981 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.709202 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.709387 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.709617 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.709801 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.709983 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.710167 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.710350 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.710533 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.710715 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.710898 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.752919 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.753102 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.753285 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.753468 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.753650 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.753834 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.754016 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.754199 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.754382 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.754564 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.754747 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.754931 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.755113 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.755346 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.755529 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.755712 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.755964 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.756152 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.756335 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.756517 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.756700 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.756883 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.757073 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.757256 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.757439 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.757623 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.757806 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.757990 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.758171 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.758355 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.758536 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.758719 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.890376 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.890562 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.890745 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.890928 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.891120 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.891303 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit
22:04:42.891487 IP6 fe80::2eb0:5dff:fe7f:7096.dhcpv6-client >
ff02::1:2.dhcpv6-server: dhcp6 solicit

On Sat, Feb 01, 2014 at 08:29:50AM -0500, Chuck Anderson wrote:
> This morning my Linux PC which has a direct connection to my Comcast
> cable modem (no router in between) lost its IPv4 address. During
> troubleshooting, I noticed that the dhclient was unable to get an IPv4
> address from Comcast. I ran tcpdump and discovered that the CeroWRT
> router, also connected to the same cable modem via a switch, was
> flooding the WAN with DHCPv6 SOLICIT packets with about 4700
> packets/sec, 6.6 megabits/sec of traffic! I immediately unplugged
> CeroWRT from the WAN and then my PC was able to get an IPv4 address
> from Comcast.
>
> I know CeroWrt 3.7.5-2 is old at this point, but I’m wondering if
> something else changed to cause this behavior. Maybe Comcast
> IPv6-enabled my CMTS finally? I’ve been using HE tunnels for IPv6,
> one on a Linksys OpenWRT for my “production” network and a separate
> tunnel on this CeroWRT for “testing”.
>
> There is one other change that was made to my Linux PC–I booted into
> a new kernel yesterday morning and had a similar problem with the
> inability to get an IPv4 address via DHCP from Comcast for about 30
> minutes, then it just started working on its own. (I hadn’t noticed
> initially since I was using IPv6 to get where I needed to go.) I
> didn’t have time to troubleshoot it at the time, but I assumed it was
> due to this IPv6 change in the Fedora kernel:
>
> * Wed Jan 29 2014 Justin M. Forbes jforbes@fedoraproject.org - 3.12.9-201
> - ipv6 addrconf: revert /proc/net/if_inet6 ifa_flag format (rhbz 1056711)
>
> * Tue Jan 28 2014 Josh Boyer jwboyer@fedoraproject.org
> - Add patch from Stanislaw Gruszka to fix ath9k BUG (rhbz 990955)
>
> * Mon Jan 27 2014 Justin M. Forbes jforbes@fedoraproject.org - 3.12.9-200
> - Backport new IPv6 address flag IFA_F_NOPREFIXROUTE and IFA_F_MANAGETEMPADDR (rhbz 1056711)
> - Linux v3.12.9
> - i915: remove pm_qos request on error (rhbz 1057533)
>
> See https://bugzilla.redhat.com/show_bug.cgi?id=1056711 for details
> about that.
>
> Each time this loss of IPv4 happened, I noticed the NIC link went down
> right before it started. Maybe the flooding was happening yesterday
> morning too, and the flooding caused my poor 5-port Netgear switch to
> flake out and flap the NIC links? Alternatively, maybe the link flap
> itself was what caused odhcp6c to wig out and start flooding in the
> first place? Unfortunately I don’t have a tcpdump from yesterday
> morning to confirm this.
>
> CeroWRT status:
>
> Router Name cerowrt
> Router Model NETGEAR WNDR3700v2
> Firmware Version CeroWrt Modena 3.7.5-2 / LuCI Trunk (trunk+svn)
> Kernel Version 3.7.5
> Local Time Sat Feb 1 07:54:43 2014
> Uptime 58d 6h 56m 51s
>
> The DHCPv6 client is odhcp6c:
>
> root@cerowrt:~# ps |grep dhc
> 980 root 1720 S udhcpc -p /var/run/udhcpc-ge00.pid -s /lib/netifd/dh
> 1335 root 804 R odhcp6c -s /lib/netifd/dhcpv6.script -Ntry -P60 ge00
> 3725 root 1704 S grep dhc
>
> Here is an example packet from the DHCPv6 flood:
>
> No. Time Source Destination Protocol Length Info
> 1 0.000000 fe80::c63d:c7ff:feb0:8f41 ff02::1:2 DHCPv6 179 Solicit XID: 0x45eb91 CID: 00030001c43dc7b08f41
>
> Frame 1: 179 bytes on wire (1432 bits), 179 bytes captured (1432 bits)
> Encapsulation type: Ethernet (1)
> Arrival Time: Feb 1, 2014 07:20:27.723633000 EST
> [Time shift for this packet: 0.000000000 seconds]
> Epoch Time: 1391257227.723633000 seconds
> [Time delta from previous captured frame: 0.000000000 seconds]
> [Time delta from previous displayed frame: 0.000000000 seconds]
> [Time since reference or first frame: 0.000000000 seconds]
> Frame Number: 1
> Frame Length: 179 bytes (1432 bits)
> Capture Length: 179 bytes (1432 bits)
> [Frame is marked: False]
> [Frame is ignored: False]
> [Protocols in frame: eth:ipv6:udp:dhcpv6]
> [Coloring Rule Name: UDP]
> [Coloring Rule String: udp]
> Ethernet II, Src: Netgear_b0:8f:41 (c4:3d:c7:b0:8f:41), Dst: IPv6mcast_00:01:00:02 (33:33:00:01:00:02)
> Destination: IPv6mcast_00:01:00:02 (33:33:00:01:00:02)
> Address: IPv6mcast_00:01:00:02 (33:33:00:01:00:02)
> …. ..1. …. …. …. …. = LG bit: Locally administered address (this is NOT the factory default)
> …. …1 …. …. …. …. = IG bit: Group address (multicast/broadcast)
> Source: Netgear_b0:8f:41 (c4:3d:c7:b0:8f:41)
> Address: Netgear_b0:8f:41 (c4:3d:c7:b0:8f:41)
> …. ..0. …. …. …. …. = LG bit: Globally unique address (factory default)
> …. …0 …. …. …. …. = IG bit: Individual address (unicast)
> Type: IPv6 (0x86dd)
> Internet Protocol Version 6, Src: fe80::c63d:c7ff:feb0:8f41 (fe80::c63d:c7ff:feb0:8f41), Dst: ff02::1:2 (ff02::1:2)
> 0110 …. = Version: 6
> [0110 …. = This field makes the filter “ip.version == 6” possible: 6]
> …. 0000 0000 …. …. …. …. …. = Traffic class: 0x00000000
> …. 0000 00.. …. …. …. …. …. = Differentiated Services Field: Default (0x00000000)
> …. …. ..0. …. …. …. …. …. = ECN-Capable Transport (ECT): Not set
> …. …. …0 …. …. …. …. …. = ECN-CE: Not set
> …. …. …. 0000 0000 0000 0000 0000 = Flowlabel: 0x00000000
> Payload length: 125
> Next header: UDP (17)
> Hop limit: 1
> Source: fe80::c63d:c7ff:feb0:8f41 (fe80::c63d:c7ff:feb0:8f41)
> [Source SA MAC: Netgear_b0:8f:41 (c4:3d:c7:b0:8f:41)]
> Destination: ff02::1:2 (ff02::1:2)
> [Source GeoIP: Unknown]
> [Destination GeoIP: Unknown]
> User Datagram Protocol, Src Port: dhcpv6-client (546), Dst Port: dhcpv6-server (547)
> Source port: dhcpv6-client (546)
> Destination port: dhcpv6-server (547)
> Length: 125
> Checksum: 0xda1c [validation disabled]
> [Good Checksum: False]
> [Bad Checksum: False]
> DHCPv6
> Message type: Solicit (1)
> Transaction ID: 0x45eb91
> Elapsed time
> Option: Elapsed time (8)
> Length: 2
> Value: ffff
> Elapsed-time: 655350 ms
> Option Request
> Option: Option Request (6)
> Length: 10
> Value: 00170018003800160015
> Requested Option code: DNS recursive name server (23)
> Requested Option code: Domain Search List (24)
> Requested Option code: Unknown (56)
> Requested Option code: SIP Servers IPv6 Address List (22)
> Requested Option code: SIP Server Domain Name List (21)
> Client Identifier
> Option: Client Identifier (1)
> Length: 10
> Value: 00030001c43dc7b08f41
> DUID: 00030001c43dc7b08f41
> DUID Type: link-layer address (3)
> Hardware type: Ethernet (1)
> Link-layer address: c4:3d:c7:b0:8f:41
> Reconfigure Accept
> Option: Reconfigure Accept (20)
> Length: 0
> Fully Qualified Domain Name
> Option: Fully Qualified Domain Name (39)
> Length: 10
> Value: 00076365726f77727400
> 0000 0… = Reserved: 0x00
> …. .0.. = N bit: Server should perform DNS updates
> …. ..0. = O bit: Server has not overridden client’s S bit preference
> …. …0 = S bit: Server should not perform forward DNS updates
> Domain: cerowrt
> Identity Association for Non-temporary Address
> Option: Identity Association for Non-temporary Address (3)
> Length: 12
> Value: 000000010000000000000000
> IAID: 00000001
> T1: 0
> T2: 0
> Identity Association for Prefix Delegation
> Option: Identity Association for Prefix Delegation (25)
> Length: 41
> Value: 000000010000000000000000001a00190000000000000000…
> IAID: 00000001
> T1: 0
> T2: 0
> IA Prefix
> Option: IA Prefix (26)
> Length: 25
> Value: 00000000000000003c000000000000000000000000000000…
> Preferred lifetime: 0
> Valid lifetime: 0
> Prefix length: 60
> Prefix address: :: (::)
>
> 0000 33 33 00 01 00 02 c4 3d c7 b0 8f 41 86 dd 60 00 33…..=…A..`.
> 0010 00 00 00 7d 11 01 fe 80 00 00 00 00 00 00 c6 3d …}………..=
> 0020 c7 ff fe b0 8f 41 ff 02 00 00 00 00 00 00 00 00 …..A……….
> 0030 00 00 00 01 00 02 02 22 02 23 00 7d da 1c 01 45 …….“.#.}…E
> 0040 eb 91 00 08 00 02 ff ff 00 06 00 0a 00 17 00 18 …………….
> 0050 00 38 00 16 00 15 00 01 00 0a 00 03 00 01 c4 3d .8………….=
> 0060 c7 b0 8f 41 00 14 00 00 00 27 00 0a 00 07 63 65 …A…..‘….ce
> 0070 72 6f 77 72 74 00 00 03 00 0c 00 00 00 01 00 00 rowrt………..
> 0080 00 00 00 00 00 00 00 19 00 29 00 00 00 01 00 00 ………)……
> 0090 00 00 00 00 00 00 00 1a 00 19 00 00 00 00 00 00 …………….
> 00a0 00 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 ..<………….
> 00b0 00 00 00 …
>
> The CeroWRT system log is attached. Nothing looks strange except the
> loss of ge00 link around 6:24 this morning, which is right around when
> I lost IPv4 connectivity to my Linux PC (I have a system monitoring
> this IP and it SMS’s me if it goes down). My PC’s NIC link went down
> at exactly the same time. At 7:24 is when I unplugged CeroWRT.

> Feb 1 03:44:30 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 03:47:19 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 03:49:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 03:50:22 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 03:53:35 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 03:56:41 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 03:57:04 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 03:58:00 cerowrt daemon.crit xinetd[2832]: 2832 {process_sensor} Adding 88.119.198.49 to the global_no_access list for 120 minutes
> Feb 1 03:58:28 cerowrt daemon.crit xinetd[2832]: 2832 {process_sensor} Adding 58.63.69.150 to the global_no_access list for 120 minutes
> Feb 1 03:59:08 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 03:59:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 03:59:42 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 04:02:32 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:06:00 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:08:47 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 04:09:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 04:11:20 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:13:56 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:18:43 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 04:19:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 04:20:12 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:21:43 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 04:22:12 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:28:35 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 04:29:14 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:29:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 04:31:12 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:32:44 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 04:36:44 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 04:38:16 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:39:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 04:39:44 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 04:41:10 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:44:21 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 04:47:58 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:49:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 04:50:43 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:53:37 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 04:56:01 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 04:57:45 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 04:58:14 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 04:59:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 05:01:41 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:04:28 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:07:24 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 05:09:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 05:09:54 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:13:36 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:13:40 cerowrt daemon.crit xinetd[2832]: 2832 {process_sensor} Adding 60.165.210.96 to the global_no_access list for 120 minutes
> Feb 1 05:16:00 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 05:17:49 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:19:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 05:22:10 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:25:36 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 05:26:55 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:29:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 05:29:44 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:34:45 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 05:35:04 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:37:35 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:39:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 05:43:33 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:44:03 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 05:46:24 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:49:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 05:52:14 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 05:53:29 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 05:55:50 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 05:58:48 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 05:59:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 06:00:20 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:03:02 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:04:52 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:08:20 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:09:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 06:11:32 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:12:22 cerowrt daemon.crit xinetd[2832]: 2832 {process_sensor} Adding 71.187.187.196 to the global_no_access list for 120 minutes
> Feb 1 06:13:23 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:18:19 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:19:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 06:21:03 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:21:21 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:24:12 cerowrt kern.info kernel: [5030779.328125] ge00: link down
> Feb 1 06:24:16 cerowrt kern.debug kernel: [5030783.343750] ar71xx: pll_reg 0xb8050014: 0x11110000
> Feb 1 06:24:16 cerowrt kern.info kernel: [5030783.343750] ge00: link up (1000Mbps/Full duplex)
> Feb 1 06:24:30 cerowrt kern.info kernel: [5030797.406250] ge00: link down
> Feb 1 06:24:55 cerowrt kern.debug kernel: [5030822.503906] ar71xx: pll_reg 0xb8050014: 0x11110000
> Feb 1 06:24:55 cerowrt kern.info kernel: [5030822.503906] ge00: link up (1000Mbps/Full duplex)
> Feb 1 06:27:56 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:29:14 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:29:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 06:31:07 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:36:39 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:38:47 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:38:55 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:39:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 06:44:26 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:46:36 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:47:26 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:49:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 06:52:47 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 06:54:47 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 06:56:36 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 06:59:00 cerowrt daemon.crit xinetd[2832]: 2832 {process_sensor} Adding 187.54.249.118 to the global_no_access list for 120 minutes
> Feb 1 06:59:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 07:02:03 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 07:02:53 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 07:05:08 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:07:25 cerowrt daemon.crit xinetd[2832]: 2832 {process_sensor} Adding 181.50.13.174 to the global_no_access list for 120 minutes
> Feb 1 07:09:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 07:11:33 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 07:11:35 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 07:13:52 cerowrt daemon.info xinetd[2832]: At least 1 DENY_TIME has expired, global_no_access list updated
> Feb 1 07:14:12 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:19:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 07:20:09 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 07:20:30 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 07:23:36 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:24:57 cerowrt kern.info kernel: [5034424.527343] ge00: link down
> Feb 1 07:29:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 07:29:41 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 07:29:50 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 07:32:36 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:38:52 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
> Feb 1 07:39:12 cerowrt daemon.info hostapd: sw00: STA 74:e5:43:69:09:da IEEE 802.11: authenticated
> Feb 1 07:39:12 cerowrt daemon.info hostapd: sw00: STA 74:e5:43:69:09:da IEEE 802.11: associated (aid 2)
> Feb 1 07:39:12 cerowrt daemon.info hostapd: sw00: STA 74:e5:43:69:09:da RADIUS: starting accounting session 52806EEC-0000005B
> Feb 1 07:39:12 cerowrt daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: pairwise key handshake completed (RSN)
> Feb 1 07:39:12 cerowrt daemon.info dnsmasq-dhcp[2896]: DHCPDISCOVER (sw00) 172.30.42.74 74:e5:43:69:09:da
> Feb 1 07:39:12 cerowrt daemon.info dnsmasq-dhcp[2896]: DHCPOFFER (sw00) 172.30.42.74 74:e5:43:69:09:da
> Feb 1 07:39:12 cerowrt daemon.info dnsmasq-dhcp[2896]: DHCPREQUEST (sw00) 172.30.42.74 74:e5:43:69:09:da
> Feb 1 07:39:12 cerowrt daemon.info dnsmasq-dhcp[2896]: DHCPACK (sw00) 172.30.42.74 74:e5:43:69:09:da a
> Feb 1 07:39:12 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:39:13 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-SOLICIT(sw00) 74:e5:43:69:09:da
> Feb 1 07:39:13 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:39:14 cerowrt daemon.info dnsmasq-dhcp[2896]: SLAAC-CONFIRM(sw00) 2001:470:89c6:1:76e5:43ff:fe69:9da a
> Feb 1 07:39:15 cerowrt daemon.info dnsmasq-dhcp[2896]: DHCPINFORMATION-REQUEST(sw00) 00:04:fc:3a:bd:af:bb:b3:64:10:e1:fd:72:cf:0f:0c:c1:14 a
> Feb 1 07:39:19 cerowrt authpriv.info dropbear[3709]: Child connection from 172.30.42.74:53620
> Feb 1 07:39:20 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:39:25 cerowrt authpriv.info dropbear[3709]: Exit before auth: Exited normally
> Feb 1 07:39:28 cerowrt authpriv.info dropbear[3710]: Child connection from 172.30.42.74:53621
> Feb 1 07:39:35 cerowrt authpriv.warn dropbear[3710]: Login attempt for nonexistent user from 172.30.42.74:53621
> Feb 1 07:39:37 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:39:38 cerowrt daemon.info hostapd: sw00: STA 74:e5:43:69:09:da WPA: group key handshake completed (RSN)
> Feb 1 07:39:38 cerowrt daemon.info hostapd: sw00: STA e0:75:7d:6c:67:de WPA: group key handshake completed (RSN)
> Feb 1 07:39:39 cerowrt authpriv.warn dropbear[3710]: Login attempt for nonexistent user from 172.30.42.74:53621
> Feb 1 07:39:44 cerowrt authpriv.warn dropbear[3710]: Login attempt for nonexistent user from 172.30.42.74:53621
> Feb 1 07:39:44 cerowrt authpriv.info dropbear[3710]: Exit before auth: Exited normally
> Feb 1 07:39:45 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw10) 2001:470:89c6:2::
> Feb 1 07:39:52 cerowrt kern.debug kernel: [5035318.730468] icmpv6_send: no reply to icmp error
> Feb 1 07:39:55 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:39:56 cerowrt kern.debug kernel: [5035322.816406] icmpv6_send: no reply to icmp error
> Feb 1 07:40:00 cerowrt kern.debug kernel: [5035327.488281] icmpv6_send: no reply to icmp error
> Feb 1 07:40:07 cerowrt authpriv.info dropbear[3712]: Child connection from 172.30.42.74:53629
> Feb 1 07:40:10 cerowrt kern.debug kernel: [5035336.816406] icmpv6_send: no reply to icmp error
> Feb 1 07:40:13 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(sw00) 2001:470:89c6:1::
> Feb 1 07:40:13 cerowrt authpriv.notice dropbear[3712]: Password auth succeeded for ‘root’ from 172.30.42.74:53629
> Feb 1 07:40:28 cerowrt kern.debug kernel: [5035355.472656] icmpv6_send: no reply to icmp error
> Feb 1 07:40:43 cerowrt kern.info kernel: [5035370.363281] device ge00 entered promiscuous mode
> Feb 1 07:40:44 cerowrt kern.info kernel: [5035371.164062] device ge00 left promiscuous mode
> Feb 1 07:40:46 cerowrt kern.info kernel: [5035372.847656] device ge00 entered promiscuous mode
> Feb 1 07:40:49 cerowrt kern.info kernel: [5035376.109375] device ge00 left promiscuous mode
> Feb 1 07:46:37 cerowrt daemon.info dnsmasq-dhcp[2896]: RTR-ADVERT(se00) 2001:470:89c6::
**_
Cerowrt-devel mailing list
Cerowrt-devel@lists.bufferbloat.net
https://lists.bufferbloat.net/listinfo/cerowrt-devel

History

Updated by Dave Täht on Mar 25, 2014.
fixed march 7. Am certain it’s fixed in 3.10.32-12.

This is a static export of the original bufferbloat.net issue database. As such, no further commenting is possible; the information is solely here for archival purposes.
RSS feed

Recent News & Articles

Mar 21, 2019 Wiki page
Dave Taht's Take on TCP
Mar 17, 2019 Wiki page
Jake Holland's Stance on ECN
Sep 6, 2018 Wiki page
Pete Heist's Thoughts on ECN
Sep 5, 2018 Wiki page
Dave Taht's Stance on ECN
Sep 4, 2018 Wiki page
Jonathan Morton's Take on ECN

Find us elsewhere

Bufferbloat Mailing Lists
#bufferbloat on Twitter
Google+ group
Archived Bufferbloat pages from the Wayback Machine

Sponsors

Comcast Research Innovation Fund
Nlnet Foundation
Shuttleworth Foundation
GoFundMe

Bufferbloat Related Projects

Congestion Control Blog
Lede Project (OpenWrt)
Flent Network Test Suite
Sqm-Scripts
The Cake shaper
AQMs in BSD
IETF AQM WG

Network Performance Related Resources


Jim Gettys' Blog - The chairman of the Fjord
Toke's Blog - Karlstad University's work on bloat
Voip Users Conference - Weekly Videoconference mostly about voip
Candelatech - A wifi testing company that "gets it".