Hello there, thank you for pointing out that the "from" field was empty. This helped me track down the problem to the following spot:
while ($n = select ($niovec = $iovec, undef, undef, $sleep)) { my $tm1 = [gettimeofday]; if ($! != &EINTR) { # # mon trap # if (vec ($niovec, fileno (TRAPSERVER), 1)) { my ($from, $trapbuf); if (!defined ($from = recv (TRAPSERVER, $trapbuf, 65536, 0))) { syslog ('err', "error trying to recv a trap: $!"); } else { open DEBUG, '>>/tmp/dbg'; print DEBUG $trapbuf . "FROM: <$from>\n"; close DEBUG; handle_trap ($trapbuf, $from); } next; It turns out that "recv" returns a nonsensical value. The debug output is as follows (excerpt): pro='0.3807' usr='mon' pas='pwprotected' spc='1' seq='0' typ='trap' grp='ehring' svc='DNS' sta='255' spc='1' tsp='1110466508' sum='ehring\20dns\20okay' dtl='ehring\20dns\20okay' FROM: <[EMAIL PROTECTED]@[EMAIL PROTECTED]@[EMAIL PROTECTED]@[EMAIL PROTECTED]@^@> The machines that are submitting traps are on a VPN using CIPE with the CIPEX patch over UDP. Not an unusual configuration, I would think. Can you help me out here? Best regards, Marko Riedel -- +------------------------------------------------------------+ | Marko Riedel, EDV Neue Arbeit gGmbH, [EMAIL PROTECTED] | | http://www.geocities.com/markoriedelde/index.html | +------------------------------------------------------------+ _______________________________________________ mon mailing list mon@linux.kernel.org http://linux.kernel.org/mailman/listinfo/mon