On Thu, 2013-03-28 at 22:34 +0900, Danny Jeongseok Seo wrote:
> Dears,
> 
> I have wonder who knows about this issues.
> 
> As you know, ConnMan listens DNS port of both tcp and udp requests.
> If some malicious (unconscious or by mistake) process sends tcp packet to
> ConnMan dnsproxy with just SYN and without detailed request body,
> ConnMan accepts and tries to recv its request to be parsed.
> 
> Here ConnMan is frozen because of its dns requests, and doesn't make any
> response of even DBus request/response and any other DNS requests.
> 
> Followings are strace logs: (ConnMan stops to recv inode 12.)
> > Process 3996 attached - interrupt to quit
> > recv(12,
> 
> And inode 12 indicates local interface and dns service port.
> > tcp        0      0 ::ffff:127.0.0.1:53         ::ffff:127.0.0.1:54663
> ESTABLISHED 0          18129      3996/connmand
> 
> With this logs, ConnMan don's response against any other interactions.

Thanks for the bug report. This issue should be solved by the commit
385694bb737157ca1b0b9dd153dde516b2ce0b7a in upstream git.

Cheers,

        Patrik
_______________________________________________
connman mailing list
[email protected]
http://lists.connman.net/listinfo/connman

Reply via email to