Hello there,

thank you for pointing out that the "from" field was empty. This
helped me track down the problem to the following spot:

    while ($n = select ($niovec = $iovec, undef, undef, $sleep)) {
        my $tm1 = [gettimeofday];

        if ($! != &EINTR)
        {
            #
            # mon trap
            #
            if (vec ($niovec, fileno (TRAPSERVER), 1)) {
                my ($from, $trapbuf);
                if (!defined ($from = recv (TRAPSERVER, $trapbuf, 65536, 0))) {
                    syslog ('err', "error trying to recv a trap: $!");
                } else {
                    open DEBUG, '>>/tmp/dbg';
                    print DEBUG $trapbuf . "FROM: <$from>\n";
                    close DEBUG;

                    handle_trap ($trapbuf, $from);
                }
                next;


It turns out that "recv" returns a nonsensical value. The debug output
is as follows (excerpt):

pro='0.3807'
usr='mon'
pas='pwprotected'
spc='1'
seq='0'
typ='trap'
grp='ehring'
svc='DNS'
sta='255'
spc='1'
tsp='1110466508'
sum='ehring\20dns\20okay'
dtl='ehring\20dns\20okay'
FROM: <[EMAIL PROTECTED]@[EMAIL PROTECTED]@[EMAIL PROTECTED]@[EMAIL 
PROTECTED]@^@>



The machines that are submitting traps are on a VPN using CIPE with
the CIPEX patch over UDP. Not an unusual configuration, I would
think.

Can you help me out here?

Best regards,

Marko Riedel

-- 
+------------------------------------------------------------+
| Marko Riedel, EDV Neue Arbeit gGmbH, [EMAIL PROTECTED] |
| http://www.geocities.com/markoriedelde/index.html          |
+------------------------------------------------------------+

_______________________________________________
mon mailing list
mon@linux.kernel.org
http://linux.kernel.org/mailman/listinfo/mon

Reply via email to