On Thu, 2013-03-28 at 22:34 +0900, Danny Jeongseok Seo wrote:
> Dears,
>
> I have wonder who knows about this issues.
>
> As you know, ConnMan listens DNS port of both tcp and udp requests.
> If some malicious (unconscious or by mistake) process sends tcp packet to
> ConnMan dnsproxy with just SYN and without detailed request body,
> ConnMan accepts and tries to recv its request to be parsed.
>
> Here ConnMan is frozen because of its dns requests, and doesn't make any
> response of even DBus request/response and any other DNS requests.
>
> Followings are strace logs: (ConnMan stops to recv inode 12.)
> > Process 3996 attached - interrupt to quit
> > recv(12,
>
> And inode 12 indicates local interface and dns service port.
> > tcp 0 0 ::ffff:127.0.0.1:53 ::ffff:127.0.0.1:54663
> ESTABLISHED 0 18129 3996/connmand
>
> With this logs, ConnMan don's response against any other interactions.
Thanks for the bug report. This issue should be solved by the commit
385694bb737157ca1b0b9dd153dde516b2ce0b7a in upstream git.
Cheers,
Patrik
_______________________________________________
connman mailing list
[email protected]
http://lists.connman.net/listinfo/connman