Yes, that does help it all make sense.
Thanks to all.
On Tue, Dec 10, 2013 at 11:43 PM, Ted Unangst wrote:
> On Tue, Dec 10, 2013 at 22:16, Chris Smith wrote:
>> On Tue, Dec 10, 2013 at 8:04 PM, Chris Smith
>> wrote:
>>> Dec 10 16:19:46 firewall dhcpd[29710]: Many bogus options seen in offers.
On Tue, Dec 10, 2013 at 22:16, Chris Smith wrote:
> On Tue, Dec 10, 2013 at 8:04 PM, Chris Smith
> wrote:
>> Dec 10 16:19:46 firewall dhcpd[29710]: Many bogus options seen in offers.
>
> In particular the above line: "Many bogus options seen in offers."
> Doesn't the server make the "offer"? If s
On Tue, Dec 10, 2013 at 8:04 PM, Chris Smith wrote:
> Dec 10 16:19:46 firewall dhcpd[29710]: Many bogus options seen in offers.
In particular the above line: "Many bogus options seen in offers."
Doesn't the server make the "offer"? If so, why would the OpenBSD
dhcpd server create bogus options? O
On Mon, Dec 9, 2013 at 3:01 PM, Kenneth R Westerback
wrote:
> Malicious or confused. Or truncated packets. The log message
> means that the option length as given in the packet would run
> the option data outside the received packet. The confusion
> might have started in an earlier option, unless
On Mon, Dec 09, 2013 at 01:25:30PM -0500, Chris Smith wrote:
> What might be the implications of the following messages in the log?
>
>
> Dec 6 15:09:39 firewall dhcpd[29710]: option option-79 (119) larger
> than buffer.
> Dec 6 15:09:39 firewall dhcp
What might be the implications of the following messages in the log?
Dec 6 15:09:39 firewall dhcpd[29710]: option option-79 (119) larger
than buffer.
Dec 6 15:09:39 firewall dhcpd[29710]: rejecting bogus offer.
Dec 9 12:15:35 firewall dhcpd[29710]:
6 matches
Mail list logo