Project

General

Profile

Actions

Bug #16579

open

Firewall logs do not correctly parse ``short`` packet errors

Added by Marcos M 3 days ago. Updated 3 days ago.

Status:
Feedback
Priority:
Normal
Assignee:
Category:
System Logs
Target version:
Start date:
Due date:
% Done:

100%

Estimated time:
Plus Target Version:
26.03
Release Notes:
Default
Affected Version:
Affected Architecture:

Description

Shorts packets are dropped and logged as the following:

4294967295,,,0,ix0.50,short,block,in,6,error='truncated-ip6 - 5 bytes missing!',0x00,0x74d4b,64,UDP,17,48,2001:xxx:xxxx:xx:xxxx:xxxx:xxxx:xxxx,2001:yyyy:yyyy:yy::y,41950,443,48" 

These are not parsed correctly in the Firewall Logs page. With the above output, the page shows 48 as the source address and 2001:xxx:xxxx:xx:xxxx:xxxx:xxxx:xxxx as the destination address.

Actions #1

Updated by Marcos M 3 days ago

  • Status changed from New to Feedback
  • % Done changed from 0 to 100
Actions

Also available in: Atom PDF