2017-04-30 20:43 UTC

View Issue Details Jump to Notes ]
IDProjectCategoryView StatusLast Update
0013159CentOS-7dnsmasqpublic2017-04-20 19:07
Reporterjkary 
PrioritynormalSeveritymajorReproducibilityalways
StatusnewResolutionopen 
PlatformIntel VMWare VMOSCentOS-7-minimalOS Version7.3
Product Version7.3.1611 
Target VersionFixed in Version 
Summary0013159: DNSMASQ Doesn't Send DHCPOFFER for relay network.
DescriptionDNSMASQ doesn't send the DHCP Offer packet when configured to server a relay(remote) network. Logs indicate the incoming request is received and looks to be processed. Packet sniff shows no DHCP offer is ever sent out of the box.

Steps To ReproduceInstall DNSMASQ with the following configuration:

bogus-priv
log-dhcp
interface=ens192
dhcp-range=ens192,10.168.102.100,10.168.102.150,255.255.255.0,12h

IP Addrees of box: 10.168.101.20

Have a router send a DHCP relay message from 10.168.102.0/24 network to the server 10.168.101.20.
Additional Information- TCPDUMP

[root@bbt-dhcp-server ~]# tcpdump -i ens224 port 67 or port 68 -vn
tcpdump: listening on ens224, link-type EN10MB (Ethernet), capture size 65535 bytes
06:30:03.384884 IP (tos 0x10, ttl 255, id 59467, offset 0, flags [none], proto UDP (17), length 350)
    10.168.102.1.bootps > 10.168.101.20.bootps: BOOTP/DHCP, Request from 00:0c:29:65:e0:ea, length 322, hops 1, xid 0xd2ecb045, Flags [none]
             Gateway-IP 10.168.102.1
             Client-Ethernet-Address 00:0c:29:65:e0:ea
             Vendor-rfc1048 Extensions
               Magic Cookie 0x63825363
               DHCP-Message Option 53, length 1: Discover
               Parameter-Request Option 55, length 18:
                 Subnet-Mask, BR, Time-Zone, Classless-Static-Route
                 Domain-Name, Domain-Name-Server, Hostname, YD
                 YS, NTP, MTU, Option 119
                 Default-Gateway, Classless-Static-Route, Classless-Static-Route-Microsoft, Static-Route
                 Option 252, NTP
               Agent-Information Option 82, length 20:
                 Circuit-ID SubOption 1, length 10: ^A^H^@^F^@LO*^@/
                 Remote-ID SubOption 2, length 6: XM-,xM-18M-a



TagsNo tags attached.
abrt_hash
URL
Attached Files

-Relationships
+Relationships

-Notes

~0029115

jkary (reporter)

- An strace of the process looks like it's choosing the WRONG i/f to send out the DHCP response. (172.31.13.103 is the other i/f ens192)


select(11, [4 5 6 7 8 9 10], [], [], NULL) = 1 (in [4])
stat("/etc/resolv.conf", {st_mode=S_IFREG|0644, st_size=68, ...}) = 0
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0W\266\305\264\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0T\177\356R"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 308
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0W\266\305\264\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0T\177\356R"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, 0) = 308
ioctl(4, SIOCGIFNAME, {ifr_index=2, ifr_name="ens192"}) = 0
ioctl(4, SIOCGIFADDR, {ifr_name="ens192", ifr_addr={AF_INET, inet_addr("172.31.13.103")}}) = 0
sendto(5, "\24\0\0\0\26\0\5\3\t\0\0\0\0\0\0\0\2ns1", 20, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\t\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\t\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, 0) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\t\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\t\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, 0) = 20
select(11, [4 5 6 7 8 9 10], [], [], NULL) = 1 (in [4])
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0\10%|^\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\270\2\360"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 292
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0\10%|^\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\270\2\360"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, 0) = 292
ioctl(4, SIOCGIFNAME, {ifr_index=2, ifr_name="ens192"}) = 0
ioctl(4, SIOCGIFADDR, {ifr_name="ens192", ifr_addr={AF_INET, inet_addr("172.31.13.103")}}) = 0
sendto(5, "\24\0\0\0\26\0\5\3\n\0\0\0\0\0\0\0\2ns1", 20, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\n\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\n\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, 0) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\n\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\n\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, 0) = 20
select(11, [4 5 6 7 8 9 10], [], [], NULL) = 1 (in [4])
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0W\266\305\264\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0T\177\356R"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 308
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0W\266\305\264\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0T\177\356R"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, 0) = 308
ioctl(4, SIOCGIFNAME, {ifr_index=2, ifr_name="ens192"}) = 0
ioctl(4, SIOCGIFADDR, {ifr_name="ens192", ifr_addr={AF_INET, inet_addr("172.31.13.103")}}) = 0
sendto(5, "\24\0\0\0\26\0\5\3\v\0\0\0\0\0\0\0\2ns1", 20, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\v\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\v\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, 0) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\v\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\v\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, 0) = 20
select(11, [4 5 6 7 8 9 10], [], [], NULL) = 1 (in [4])
stat("/etc/resolv.conf", {st_mode=S_IFREG|0644, st_size=68, ...}) = 0
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0\10%|^\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\270\2\360"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 292
recvmsg(4, {msg_name(16)={sa_family=AF_INET, sin_port=htons(68), sin_addr=inet_addr("0.0.0.0")}, msg_iov(1)=[{"\1\1\6\0\10%|^\0\0\200\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\204\270\2\360"..., 548}], msg_controllen=32, {cmsg_len=28, cmsg_level=SOL_IP, cmsg_type=, ...}, msg_flags=0}, 0) = 292
ioctl(4, SIOCGIFNAME, {ifr_index=2, ifr_name="ens192"}) = 0
ioctl(4, SIOCGIFADDR, {ifr_name="ens192", ifr_addr={AF_INET, inet_addr("172.31.13.103")}}) = 0
sendto(5, "\24\0\0\0\26\0\5\3\f\0\0\0\0\0\0\0\2ns1", 20, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\f\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"L\0\0\0\24\0\2\0\f\0\0\0\273\n\0\0\2\10\200\376\1\0\0\0\10\0\1\0\177\0\0\1"..., 252}], msg_controllen=0, msg_flags=0}, 0) = 252
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\f\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, MSG_PEEK|MSG_TRUNC) = 20
recvmsg(5, {msg_name(12)={sa_family=AF_NETLINK, pid=0, groups=00000000}, msg_iov(1)=[{"\24\0\0\0\3\0\2\0\f\0\0\0\273\n\0\0\0\0\0\0", 252}], msg_controllen=0, msg_flags=0}, 0) = 20
select(11, [4 5 6 7 8 9 10], [], [], NULL) = 1 (in [4])
+Notes

-Issue History
Date Modified Username Field Change
2017-04-20 18:42 jkary New Issue
2017-04-20 19:07 jkary Note Added: 0029115
+Issue History