Package: tailscale
Version: 1.64.0
Severity: normal

Dear Maintainer,

I noticed that some log entries are malformed, in that the %-specifiers
are not expanded.  For example, today I see these lines in journalctl:

abr 20 18:12:14 schmee tailscaled[3288907]: [RATELIMIT] format("magicsock: %v 
active derp conns%s")
abr 20 18:12:14 schmee tailscaled[3288907]: [RATELIMIT] 
format("onPortUpdate(port=%v, network=%s)")
abr 20 18:12:33 schmee tailscaled[3288907]: [RATELIMIT] format("monitor: %s: 
src=%v, dst=%v, gw=%v, outif=%v, table=%v") (19 dropped)
abr 20 18:12:33 schmee tailscaled[3288907]: [RATELIMIT] format("magicsock: %v 
active derp conns%s") (1 dropped)
abr 20 18:12:33 schmee tailscaled[3288907]: [RATELIMIT] format("monitor: %s: 
src=%v, dst=%v, gw=%v, outif=%v, table=%v")
abr 20 18:12:34 schmee tailscaled[3288907]: [RATELIMIT] 
format("onPortUpdate(port=%v, network=%s)")
abr 20 18:12:35 schmee tailscaled[3288907]: [RATELIMIT] format("magicsock: %v 
active derp conns%s")
abr 20 18:12:38 schmee tailscaled[3288907]: [RATELIMIT] format("dns: Set: %v")

(This is a small snippet from "journalctl -u tailscaled | grep format", so
obviously there could be other lines that work in the same way).

Thanks!  I've generally found tailscale enormously useful, though I had
to mess with `ip rule` in order to make it work together with the PIA VPN.

-- System Information:
Debian Release: 12.5
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.1.0-18-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN
Locale: LANG=es_CL.UTF-8, LC_CTYPE=es_CL.UTF-8 (charmap=UTF-8), 
LANGUAGE=es_CL:es
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages tailscale depends on:
ii  iptables  1.8.9-2

Versions of packages tailscale recommends:
ii  iproute2                   6.1.0-3
ii  tailscale-archive-keyring  1.35.181

tailscale suggests no packages.

-- no debconf information

Reply via email to