-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
arping version 2.23 or 24 returns RC 1 with unsolicited arps, 2.19 does not #56
Comments
I'm failing to reproduce this. With 2.24 and .219 I seem to get the same packets out, and always see timeout. Now, they're replies, so I don't actually expect any… replies to the replies, so I wonder what it is that you're seeing. What do you see in |
In both cases I see absolutely no difference between the two. I see a few arp requests, but none of them are related to the IP in question, along with the generated replies:
If you wish, I can post more via private email, I cannot put public IPs and such here. (But really, it's just standard arp requests without x.x.x.x IP in them, eg for other IPs.) I wondered if the 2.19 difference was a Debianism, but these patch names don't make it seem to be purposeful. Am I about to be compelled to compile from source? -rw-r--r-- 1 root root 1397 Dec 28 2018 Fall-back-to-gettimeofday-if-clock_gettime-fails.patch |
I downloaded http://ftp.se.debian.org/debian/pool/main/a/arping/arping_2.19-6_amd64.deb and tried it. For that too I see Same with http://ftp.se.debian.org/debian/pool/main/a/arping/arping_2.24-2_amd64.deb Are you sure this is a function of which version you're using, and not some unrelated factor? This is on the same machine? Really, arping should not even be looking for reply-replies when it sends unsolicited replies. I'm going to sort that out. |
It's on the same machine, a firewall. I can strace if you want. |
If you could do a strace, and a My suspicion is that there is some background ARP happening that just so happens to be picked up by arping, and that it's not version dependent but just coincidence. In any case:
|
I use arping in a variety of scripts, and I have a variety of upstream routers I must hit. Some require unsolicited arps, others not.
In the case of unsolicited, I recently upgraded arping to a newer version. A move from 2.19 to 2.23. With 2.19, even though it was simply an unsolicited packet being sent, arping (I presume) simply posted the time to send, and thus stated success.
However, with 2.23 it now does a 'timeout', even though I don't think the router should be responding to a 'reply'.
In both cases the ARP 'reply' is sent fine, as per tcpdump. In both cases, I see no response from the router.
However, a RC of 1 happens with the timeouts in 2.23, which means my scripts cannot tell the difference between 'borked command' and 'normal arping operation'.
Is it me that's borked, or arping's -P?
Thanks
The text was updated successfully, but these errors were encountered: