Re: [j-nsp] what do do with bug reports

2020-06-15 Thread Richard McGovern via juniper-nsp
--- Begin Message ---
For 100% sure you should open a JTAC Case, like P3, as you have a current 
workaround.  JTAC should then reproduce your issue, at which time they will 
create a PR for Engg to work on.  PR will be scheduled to be fixed in some 
future release.  JTAC should be able to provide that feedback to you once Engg 
has updated the PR.  Do NOT let JTAC close your case, until you get at least 
this far.  Also make sure that JTAC ties your Case to the PR.  Customer logged 
(CL) PRs have priority over Internal logged (IL) PRs.  You should also now be 
able to view PR via external PR tool.

You can then keep case open until you actually get a fix, or allow JTAC to 
close the case while you wait for the fix.  Case would be 100% in monitor 
during this time.  Case closure time is a top metric for TAC.

If you do nothing, Juniper will also do nothing, as no one outside of you knows 
about this.  If situation is known by Juniper (PR already open) your case can 
be tied to that PR, or new PR can be marked as a duplicate of older PR.

FYI only, Rich

Richard McGovern
Sr Sales Engineer, Juniper Networks
978-618-3342

I’d rather be lucky than good, as I know I am not good
I don’t make the news, I just report it


On 6/15/20, 9:28 AM, "Jeffrey Haas"  wrote:



> On Jun 15, 2020, at 2:15 AM, Baldur Norddahl  wrote:
>
>
> What am I supposed to do with glaring bugs? Are Juniper interested in
> knowing those or don't they care?

Treat the following as "I do not speak for official Juniper support policy".

It is to your benefit to open JTAC tickets on issues found.  This means 
that when it becomes a Problem Report (PR) in the internal bug system, it's 
tagged with the impacted customers.  Customers reporting issues will often 
change prioritization of how issues are dealt with vs. some random developer 
filing the PR.

And it absolutely doesn't hurt if you note any PR# that's associated with 
an issue, if one gets back to you.  It means that devs that are watching things 
with some knowledge of the issue may be able to add it to the report.

-- Jeff




Juniper Business Use Only
--- End Message ---
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] what do do with bug reports

2020-06-15 Thread Jeffrey Haas via juniper-nsp
--- Begin Message ---


> On Jun 15, 2020, at 2:15 AM, Baldur Norddahl  wrote:
> 
> 
> What am I supposed to do with glaring bugs? Are Juniper interested in
> knowing those or don't they care?

Treat the following as "I do not speak for official Juniper support policy".  

It is to your benefit to open JTAC tickets on issues found.  This means that 
when it becomes a Problem Report (PR) in the internal bug system, it's tagged 
with the impacted customers.  Customers reporting issues will often change 
prioritization of how issues are dealt with vs. some random developer filing 
the PR.  

And it absolutely doesn't hurt if you note any PR# that's associated with an 
issue, if one gets back to you.  It means that devs that are watching things 
with some knowledge of the issue may be able to add it to the report. 

-- Jeff

--- End Message ---
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] what do do with bug reports

2020-06-15 Thread Ola Thoresen

Hi,

File a JTAC problem report, either yourself via a Juniper Partner (where 
you should have support for your devices).




Rgds.

Ola Thoresen


On 15.06.2020 08:15, Baldur Norddahl wrote:

Hello

What am I supposed to do with glaring bugs? Are Juniper interested in 
knowing those or don't they care?


In this case I found out that 19.1 behaves badly if you set [system 
services subscriber-management overrides interfaces family inet 
receive-gratuitous-arp]. The setting is supposed to enable updating 
the ARP table when receiving gratuitous ARP from clients. Instead it 
makes the router reply to those ARP packets, which causes the clients 
to reject the address.


Packet monitor (somewhat shortened):

07:41:05.677882 bpf_flags 0x03,  In
    Juniper PCAP Flags [no-L2, In]
    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
[none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)

    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags 
[none], proto: UDP (17), length: 319) 185.24.168.248.bootps > 
255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, 
xid 0x1b632c2a, Flags [Broadcast] (0x8000)

    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
[none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
34:21:09:xx:xx:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)

    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags 
[none], proto: UDP (17), length: 319) 185.24.168.248.bootps > 
255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, 
xid 0x1b632c2a, Flags [Broadcast] (0x8000)

      Your-IP 212.237.x.237
        DHCP-Message Option 53, length 1: ACK
    -original packet-
    34:21:09:x:x:e1 > Broadcast, ethertype 802.1Q (0x8100), length 
4294967292: vlan 301, p 0, ethertype 802.1Q, vlan 545, p 0, ethertype 
ARP, arp who-has 212.237.x.237 tell 212.237.x.237

07:41:05.686691 bpf_flags 0x00, Out
    -original packet-
    e6:5d:37:84:53:17 > 34:21:09:x:x:e1, ethertype ARP (0x0806), 
length 4294967292: arp reply 212.237.x.237 is-at e6:5d:37:84:53:17

07:41:05.689680 bpf_flags 0x03,  In
    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
[none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)

        DHCP-Message Option 53, length 1: Decline
^C
8 packets received by filter

The part that is plain wrong is "arp reply 212.237.x.237 is-at 
e6:5d:37:84:53:17". NO! 212.237.x.237 is actually at 34:21:09:x:x:e1 
and by responding to this, the router causes the client to believe 
something else is using the address. Therefore the client sends 
Decline back to the DHCP server.


Proxy-arp settings makes no difference at all. Doesn't matter if you 
have it entirely disabled or set to proxy-arp restricted. However 
disabling receive-gratuitous-arp makes the router stop doing this.


If I made a case for this I am sure they will just tell me to disable 
receive-gratuitous-arp which is exactly what I did. I am just curious 
if there is any way to report bugs that I will live with as is. It is 
still clearly something that should get fixed.


Regards,

Baldur



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] what do do with bug reports

2020-06-15 Thread Wojciech Janiszewski
Hi Baldur,

You should not give up and just report the bug.
JTAC may ask you to disable feature that is causing an impact, but in the
meantime they will work on resolving it.

Mind that it might take some time to replicate the problem, prepare the fix
and implement it in the next official software release.

Regards,


pon., 15 cze 2020, 08:23 użytkownik Baldur Norddahl 
napisał:

> Hello
>
> What am I supposed to do with glaring bugs? Are Juniper interested in
> knowing those or don't they care?
>
> In this case I found out that 19.1 behaves badly if you set [system
> services subscriber-management overrides interfaces family inet
> receive-gratuitous-arp]. The setting is supposed to enable updating the
> ARP table when receiving gratuitous ARP from clients. Instead it makes
> the router reply to those ARP packets, which causes the clients to
> reject the address.
>
> Packet monitor (somewhat shortened):
>
> 07:41:05.677882 bpf_flags 0x03,  In
>  Juniper PCAP Flags [no-L2, In]
>  -original packet-
>  PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags
> [none], proto: UDP (17), length: 576) 0.0.0.0.bootpc >
> 255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from
> 34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>  -original packet-
>  PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags
> [none], proto: UDP (17), length: 319) 185.24.168.248.bootps >
> 255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, xid
> 0x1b632c2a, Flags [Broadcast] (0x8000)
>  -original packet-
>  PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags
> [none], proto: UDP (17), length: 576) 0.0.0.0.bootpc >
> 255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from
> 34:21:09:xx:xx:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>  -original packet-
>  PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags
> [none], proto: UDP (17), length: 319) 185.24.168.248.bootps >
> 255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, xid
> 0x1b632c2a, Flags [Broadcast] (0x8000)
>Your-IP 212.237.x.237
>  DHCP-Message Option 53, length 1: ACK
>  -original packet-
>  34:21:09:x:x:e1 > Broadcast, ethertype 802.1Q (0x8100), length
> 4294967292: vlan 301, p 0, ethertype 802.1Q, vlan 545, p 0, ethertype
> ARP, arp who-has 212.237.x.237 tell 212.237.x.237
> 07:41:05.686691 bpf_flags 0x00, Out
>  -original packet-
>  e6:5d:37:84:53:17 > 34:21:09:x:x:e1, ethertype ARP (0x0806), length
> 4294967292: arp reply 212.237.x.237 is-at e6:5d:37:84:53:17
> 07:41:05.689680 bpf_flags 0x03,  In
>  -original packet-
>  PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags
> [none], proto: UDP (17), length: 576) 0.0.0.0.bootpc >
> 255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from
> 34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>  DHCP-Message Option 53, length 1: Decline
> ^C
> 8 packets received by filter
>
> The part that is plain wrong is "arp reply 212.237.x.237 is-at
> e6:5d:37:84:53:17". NO! 212.237.x.237 is actually at 34:21:09:x:x:e1 and
> by responding to this, the router causes the client to believe something
> else is using the address. Therefore the client sends Decline back to
> the DHCP server.
>
> Proxy-arp settings makes no difference at all. Doesn't matter if you
> have it entirely disabled or set to proxy-arp restricted. However
> disabling receive-gratuitous-arp makes the router stop doing this.
>
> If I made a case for this I am sure they will just tell me to disable
> receive-gratuitous-arp which is exactly what I did. I am just curious if
> there is any way to report bugs that I will live with as is. It is still
> clearly something that should get fixed.
>
> Regards,
>
> Baldur
>
>
>
> ___
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


[j-nsp] what do do with bug reports

2020-06-14 Thread Baldur Norddahl

Hello

What am I supposed to do with glaring bugs? Are Juniper interested in 
knowing those or don't they care?


In this case I found out that 19.1 behaves badly if you set [system 
services subscriber-management overrides interfaces family inet 
receive-gratuitous-arp]. The setting is supposed to enable updating the 
ARP table when receiving gratuitous ARP from clients. Instead it makes 
the router reply to those ARP packets, which causes the clients to 
reject the address.


Packet monitor (somewhat shortened):

07:41:05.677882 bpf_flags 0x03,  In
    Juniper PCAP Flags [no-L2, In]
    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
[none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)

    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags 
[none], proto: UDP (17), length: 319) 185.24.168.248.bootps > 
255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, xid 
0x1b632c2a, Flags [Broadcast] (0x8000)

    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
[none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
34:21:09:xx:xx:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)

    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags 
[none], proto: UDP (17), length: 319) 185.24.168.248.bootps > 
255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, xid 
0x1b632c2a, Flags [Broadcast] (0x8000)

      Your-IP 212.237.x.237
        DHCP-Message Option 53, length 1: ACK
    -original packet-
    34:21:09:x:x:e1 > Broadcast, ethertype 802.1Q (0x8100), length 
4294967292: vlan 301, p 0, ethertype 802.1Q, vlan 545, p 0, ethertype 
ARP, arp who-has 212.237.x.237 tell 212.237.x.237

07:41:05.686691 bpf_flags 0x00, Out
    -original packet-
    e6:5d:37:84:53:17 > 34:21:09:x:x:e1, ethertype ARP (0x0806), length 
4294967292: arp reply 212.237.x.237 is-at e6:5d:37:84:53:17

07:41:05.689680 bpf_flags 0x03,  In
    -original packet-
    PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
[none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)

        DHCP-Message Option 53, length 1: Decline
^C
8 packets received by filter

The part that is plain wrong is "arp reply 212.237.x.237 is-at 
e6:5d:37:84:53:17". NO! 212.237.x.237 is actually at 34:21:09:x:x:e1 and 
by responding to this, the router causes the client to believe something 
else is using the address. Therefore the client sends Decline back to 
the DHCP server.


Proxy-arp settings makes no difference at all. Doesn't matter if you 
have it entirely disabled or set to proxy-arp restricted. However 
disabling receive-gratuitous-arp makes the router stop doing this.


If I made a case for this I am sure they will just tell me to disable 
receive-gratuitous-arp which is exactly what I did. I am just curious if 
there is any way to report bugs that I will live with as is. It is still 
clearly something that should get fixed.


Regards,

Baldur



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp