Subject: Re: [ISC-Bugs #46767] [PATCH] DHCPd leaks sockets descriptors From: "Pavel Zhukov" Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mx.pao1.isc.org MIME-Version: 1.0 Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx.pao1.isc.org", Issuer "COMODO RSA Organization Validation Secure Server CA" (not verified)) by bugs.isc.org (Postfix) with ESMTPS id B3646D78B0D for ; Tue, 5 Dec 2017 12:30:16 +0000 (UTC) Received: from mail-wr0-f174.google.com (mail-wr0-f174.google.com [209.85.128.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id ADFF83AC09C for ; Tue, 5 Dec 2017 12:30:14 +0000 (UTC) Received: by mail-wr0-f174.google.com with SMTP id s66so70895wrc.9 for ; Tue, 05 Dec 2017 04:30:14 -0800 (PST) Received: from pzhukov-workstation.usersys.redhat.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id u5sm354478wmf.47.2017.12.05.04.30.11 for (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 05 Dec 2017 04:30:12 -0800 (PST) X-RT-Original-Encoding: utf-8 User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.3 (gnu/linux) Delivered-To: dhcp-confidential@bugs.isc.org X-Original-To: dhcp-confidential@bugs.isc.org References: <87d13ucw5p.fsf@pzhukov-workstation.usersys.redhat.com> X-Google-SMTP-Source: AGs4zMY5j3SwvugJVPI+0zESaKxQSU0dodbjQvCzUGNOqqhzHOH5dEx4J/HE+3qCVISrA80UYDkwpw== From pzhukov@redhat.com Tue Dec 5 12:30:16 2017 content-type: text/plain; charset="utf-8" To: "Thomas Markwalder via RT" In-Reply-To: (Thomas Markwalder via's message of "Tue, 05 Dec 2017 12:05:54 +0000") X-Google-Dkim-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:references:date:in-reply-to :message-id:user-agent:mime-version; bh=MP3KEMf3OeiTvxYpYdfZpD2auWMjCI5jiLyNY0cFFDk=; b=QUoyolhzKAmD3f7awutXK+BgZ0gGqW30UHqrTUt4eaMm5X1ePLqWv+axjKw/YXd1MF nACJLK39AwBef1orIJMEQvQXtqMKl8UvAh61UZ2flquZOXAf6ngu0dI2WlxgzfgXoWv8 n1tUiFc+NJUWijyItt/IMW9K5KWujbMTF32o+xyaUctVWz9GnM6UdQnbEOuoy96OxeJc batTS1Lt4C97+mSm6nMM/k8iGLfB9+XSWXcUTtP2WZZhrvFtKIxEFgllnvJ+fKO3ixYr cGQJvv7baBJe1alT2+zA5lQajtTLjerDTOrT8YEgMGE8nkVIlXTpwafQNEi2xatcYRoq X9jw== Message-ID: <874lp5cq7g.fsf@pzhukov-workstation.usersys.redhat.com> X-Received: by 10.223.176.27 with SMTP id f27mr16638219wra.105.1512477012703; Tue, 05 Dec 2017 04:30:12 -0800 (PST) X-GM-Message-State: AJaThX7yN7r3ltLAk6YkVaYEeBmZlSTKoP1MJyje+fdgbXwCc1fsoJ0l Y10gAXqZC2tuzQDhvnHhV2uq7vIP1Yg= X-RT-Incoming-Encryption: Not encrypted X-RT-Interface: Email Date: Tue, 05 Dec 2017 13:30:11 +0100 X-Spam-Status: No, score=-2.8 required=5.0 tests=RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2 autolearn=unavailable autolearn_force=no version=3.4.1 RT-Message-ID: Content-Length: 701 "Thomas Markwalder via RT" writes: > Hello Pavel: Hello Thomas, > > A few questions. First, what version of dhcpd are you testing? > Secondly, could you describe the exact steps you are conducting to > cause the leak? dhcp-server-4.3.5-9.fc26.x86_64 I've tested both Fedora's and RHEL versions. RHEL has 4.2.5 and Fedora 4.3.5 released. Steps to Reproduce: 1. configure omapi port and start dhcpd 2. ncat -z (or telnet <<< "" ) 3. lsof | grep dhcpd | grep TCP | wc -l > > Thanks, > > Thomas Markwalder > ISC Software Engineering -- PAVEL ZHUKOV SOFTWARE ENGINEER, RHCE, RHCVA Red Hat pzhukov@redhat.com IM: IRC: landgraf