The (redacted) output of ip addr show is:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group 
default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,ALLMULTI,UP,LOWER_UP> mtu 1500 qdisc fq_codel 
state UP group default qlen 1000
    link/ether ...my mac... brd ff:ff:ff:ff:ff:ff
    inet 192.168.1.1/24 brd 192.168.1.255 scope global eth0
       valid_lft forever preferred_lft forever
    inet6 ...internet ipv6 addr.../64 scope global
       valid_lft forever preferred_lft forever
    inet6 ...internet ipv6 addr.../64 scope global
       valid_lft forever preferred_lft forever
    inet6 ...internet ipv6 addr.../64 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::21e:6ff:fe32:613b/64 scope link
       valid_lft forever preferred_lft forever
3: vlan4@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state 
UP group default qlen 1000
    link/ether ...my mac... brd ff:ff:ff:ff:ff:ff
    inet ...internet ipv4.../24 brd ...internet ipv4....255 scope global 
dynamic vlan4
       valid_lft 351763sec preferred_lft 351763sec
    inet6 fe80::21e:6ff:fe32:613b/64 scope link
       valid_lft forever preferred_lft forever
4: vlan5@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state 
UP group default qlen 1000
    link/ether ...my mac... brd ff:ff:ff:ff:ff:ff
    inet 192.168.2.1/24 brd 192.168.2.255 scope global vlan5
       valid_lft forever preferred_lft forever
    inet6 fd17:6e78:d6ba:c144::1/64 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::21e:6ff:fe32:613b/64 scope link
       valid_lft forever preferred_lft forever
5: vlan6@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state 
UP group default qlen 1000
    link/ether ...my mac... brd ff:ff:ff:ff:ff:ff
    inet 192.168.3.1/24 brd 192.168.3.255 scope global vlan6
       valid_lft forever preferred_lft forever
    inet6 fd17:6e78:d6ba:c145::1/64 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::21e:6ff:fe32:613b/64 scope link
       valid_lft forever preferred_lft forever
6: sit0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN group default qlen 1000
    link/sit 0.0.0.0 brd 0.0.0.0
7: he-ipv6@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480 qdisc noqueue state 
UNKNOWN group default qlen 1000
    link/sit ...internet ipv4... peer ...internet ipv4...
    inet6 ...internet ipv6 addr.../64 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::5ce9:ca14/64 scope link
       valid_lft forever preferred_lft forever
8: tunl0@NONE: <NOARP> mtu 1480 qdisc noop state DOWN group default qlen 1000
    link/ipip 0.0.0.0 brd 0.0.0.0
9: ipv4-tunnel@NONE: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1480 qdisc noqueue 
state UNKNOWN group default qlen 1000
    link/ipip ...internet ipv4... peer ...internet ipv4...
    inet ...internet ipv4.../32 scope global ipv4-tunnel
       valid_lft forever preferred_lft forever
    inet6 fe80::200:5efe:5ce9:ca14/64 scope link
       valid_lft forever preferred_lft forever
10: wg0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN 
group default qlen 1000
    link/none
    inet 192.168.10.1/24 scope global wg0
       valid_lft forever preferred_lft forever
    inet6 fd18:6de:3816:db02::1/64 scope global
       valid_lft forever preferred_lft forever

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/1916462

Title:
  dnsmasq failed to send packet: Network is unreachable

Status in dnsmasq package in Ubuntu:
  New

Bug description:
  the log shows this:

  Feb 22 09:37:53 myserver dnsmasq[2259]: failed to send packet: Network
  is unreachable

  repeatedly and frequently.

  This is a known bug in dnsmasq and has been fixed upstream (according
  to the thread quoted below). Apparently it is IPv6 related and
  triggered by Windows and Mac clients. An extensive thread on the
  subject is here on the OpenWRT forum:

  https://forum.openwrt.org/t/security-advisory-2021-01-19-1-dnsmasq-
  multiple-vulnerabilities/85903/123

  I think this has been reported in the fallout of the quoted security
  vulnerabilities. I don't think it is a security vulnerability in
  itself.

  dnsmasq version: 2.80-1.1ubuntu1.2

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: dnsmasq 2.80-1.1ubuntu1.2
  Uname: Linux 5.4.98-219 armv7l
  ApportVersion: 2.20.11-0ubuntu27.16
  Architecture: armhf
  CasperMD5CheckResult: skip
  Date: Mon Feb 22 09:34:12 2021
  PackageArchitecture: all
  ProcEnviron:
   TERM=xterm
   PATH=(custom, no user)
   XDG_RUNTIME_DIR=<set>
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  SourcePackage: dnsmasq
  UpgradeStatus: Upgraded to focal on 2020-11-15 (98 days ago)
  modified.conffile..etc.default.dnsmasq: [modified]
  mtime.conffile..etc.default.dnsmasq: 2018-06-27T16:10:40.086905

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/1916462/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to