Yes, that does help it all make sense.
Thanks to all.
On Tue, Dec 10, 2013 at 11:43 PM, Ted Unangst t...@tedunangst.com wrote:
On Tue, Dec 10, 2013 at 22:16, Chris Smith wrote:
On Tue, Dec 10, 2013 at 8:04 PM, Chris Smith obsd_m...@chrissmith.org
wrote:
Dec 10 16:19:46 firewall dhcpd[29710]:
On Mon, Dec 9, 2013 at 3:01 PM, Kenneth R Westerback
kwesterb...@rogers.com wrote:
Malicious or confused. Or truncated packets. The log message
means that the option length as given in the packet would run
the option data outside the received packet. The confusion
might have started in an
On Tue, Dec 10, 2013 at 8:04 PM, Chris Smith obsd_m...@chrissmith.org wrote:
Dec 10 16:19:46 firewall dhcpd[29710]: Many bogus options seen in offers.
In particular the above line: Many bogus options seen in offers.
Doesn't the server make the offer? If so, why would the OpenBSD
dhcpd server
On Tue, Dec 10, 2013 at 22:16, Chris Smith wrote:
On Tue, Dec 10, 2013 at 8:04 PM, Chris Smith obsd_m...@chrissmith.org
wrote:
Dec 10 16:19:46 firewall dhcpd[29710]: Many bogus options seen in offers.
In particular the above line: Many bogus options seen in offers.
Doesn't the server make
What might be the implications of the following messages in the log?
Dec 6 15:09:39 firewall dhcpd[29710]: option option-79 (119) larger
than buffer.
Dec 6 15:09:39 firewall dhcpd[29710]: rejecting bogus offer.
Dec 9 12:15:35 firewall dhcpd[29710]:
On Mon, Dec 09, 2013 at 01:25:30PM -0500, Chris Smith wrote:
What might be the implications of the following messages in the log?
Dec 6 15:09:39 firewall dhcpd[29710]: option option-79 (119) larger
than buffer.
Dec 6 15:09:39 firewall
6 matches
Mail list logo