MIME-Version: 1.0 X-RT-Incoming-Encryption: Not encrypted X-Original-To: dhcp-confidential@bugs.isc.org Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx.pao1.isc.org", Issuer "COMODO RSA Organization Validation Secure Server CA" (not verified)) by bugs.isc.org (Postfix) with ESMTPS id 18B7ED78A16 for ; Thu, 9 Aug 2018 09:22:21 +0000 (UTC) Received: from iscwebprod.isc.org (iscwebprod.isc.org [IPv6:2001:4f8:1:d::16]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id 2B15D3AB065 for ; Thu, 9 Aug 2018 09:22:18 +0000 (UTC) Received: from www (uid 80) (envelope-from www@iscwebprod.isc.org) id 7b7d14 by iscwebprod.isc.org (DragonFly Mail Agent v0.11); Thu, 09 Aug 2018 09:22:16 +0000 From: "sachse" Date: Thu, 9 Aug 2018 09:22:16 +0000 Delivered-To: dhcp-confidential@bugs.isc.org Return-Path: X-Spam-Status: No, score=0.5 required=5.0 tests=FREEMAIL_FORGED_FROMDOMAIN, FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS,UNPARSEABLE_RELAY autolearn=disabled version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mx.pao1.isc.org content-type: text/plain; charset="utf-8" To: dhcp-bugs@isc.org Subject: DHCP 4.3.6 - Network will be flooded with answer packackes if multiple virtual Interfaces exists on a physical interface From www@isc.org Thu Aug 9 09:22:21 2018 X-Mailer: PHPMailer 5.2.22 (https://github.com/PHPMailer/PHPMailer) Message-ID: <464d9598df24da93db8b7f7f0b03be78@www.isc.org> X-PHP-Originating-Script: 20001:class-phpmailer.php X-RT-Original-Encoding: utf-8 X-RT-Interface: Email Content-Length: 3752 Bug Report from www.isc.org: Name: sachse Email: sachse@gmx.net Software Version: DHCP 4.3.6 OS: Linux Subject:Network will be flooded with answer packackes if multiple virtual Interfaces exists on a physical interface Bug Detail =========== Handling of virtual interfaces is totally destroyed and floods the network so that switches disable there ports. Network configuration: physical: eth0 virtual: eth0:1 up to eth0:26 Old versions receives one request or information and send one answer. - CORRECT ---- 8< ---- DHCPINFORM from 192.168.100.102 via eth0 (in reality this is eth0:6) DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0 ---- 8< ---- Current version received one request or information an sends one answer per interface. - FAIL This causes in my example 27 answers instead of 1. In reality this is the same request and the same interface as in example above. It is independent which request the server receives, every request causes such a flood. ---- 8< ---- DHCPINFORM from 192.168.100.102 via eth0:26 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:26 DHCPINFORM from 192.168.100.102 via eth0:25 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:25 DHCPINFORM from 192.168.100.102 via eth0:24 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:24 DHCPINFORM from 192.168.100.102 via eth0:23 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:23 DHCPINFORM from 192.168.100.102 via eth0:22 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:22 DHCPINFORM from 192.168.100.102 via eth0:21 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:21 DHCPINFORM from 192.168.100.102 via eth0:20 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:20 DHCPINFORM from 192.168.100.102 via eth0:19 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:19 DHCPINFORM from 192.168.100.102 via eth0:18 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:18 DHCPINFORM from 192.168.100.102 via eth0:17 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:17 DHCPINFORM from 192.168.100.102 via eth0:16 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:16 DHCPINFORM from 192.168.100.102 via eth0:15 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:15 DHCPINFORM from 192.168.100.102 via eth0:14 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:14 DHCPINFORM from 192.168.100.102 via eth0:13 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:13 DHCPINFORM from 192.168.100.102 via eth0:12 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:12 DHCPINFORM from 192.168.100.102 via eth0:11 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:11 DHCPINFORM from 192.168.100.102 via eth0:10 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:10 DHCPINFORM from 192.168.100.102 via eth0:9 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:9 DHCPINFORM from 192.168.100.102 via eth0:8 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:8 DHCPINFORM from 192.168.100.102 via eth0:7 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:7 DHCPINFORM from 192.168.100.102 via eth0:6 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:6 DHCPINFORM from 192.168.100.102 via eth0:4 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:4 DHCPINFORM from 192.168.100.102 via eth0:3 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:3 DHCPINFORM from 192.168.100.102 via eth0:2 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:2 DHCPINFORM from 192.168.100.102 via eth0:1 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0:1 DHCPINFORM from 192.168.100.102 via eth0 DHCPACK to 192.168.100.102 (xx:xx:xx:xx:xx:xx) via eth0 ---- 8< ---- --- This email was received through isc.org Bug Submission Form