Hi Naveen,
On ti, 2015-07-21 at 18:16 -0700, Naveen Singh wrote:
Hi All
In our testing of new connman (version 1.29) we do see following error
print sometimes (This is happening very rarely and I do not have any easy
way to reproduce it at will):
2015-07-17 01:35:20.00 daemon.err
For VPN UserRoutes and ServerRoutes properties, the Netmask
field is the IPv4 netmask (like 255.255.255.0) for IPv4 routes.
For IPv6 routes it is the prefix length (like 64) instead.
Reported by Jaakko Hannikainen.
---
doc/vpn-connection-api.txt | 6 --
1 file changed, 4 insertions(+), 2
2015-07-17 01:35:20.00 daemon.err connmand[321]: Invalid packet
timestamp from time server
After this print we see that we are not able to communicate to connman at
all. All the DBUS messages to connman are timing out. The only way to
recover from this situation is to restart the
On Wed, Jul 22, 2015 at 12:54 AM, Peter Meerwald pme...@pmeerw.net wrote:
2015-07-17 01:35:20.00 daemon.err connmand[321]: Invalid packet
timestamp from time server
After this print we see that we are not able to communicate to connman
at
all. All the DBUS messages to connman
On Wed, Jul 22, 2015 at 12:54 AM, Peter Meerwald pme...@pmeerw.net wrote:
2015-07-17 01:35:20.00 daemon.err connmand[321]: Invalid packet
timestamp from time server
After this print we see that we are not able to communicate to connman
at
all. All the DBUS messages to connman
All three patches applied.
Thanks,
Daniel
___
connman mailing list
connman@connman.net
https://lists.connman.net/mailman/listinfo/connman
On 07/21/2015 03:33 PM, Jaakko Hannikainen wrote:
Previously when querying the SSID from client through the agent api,
the request was sent to default agent rather than sender, as
get_dbus_sender returns NULL if service-pending is NULL, causing a
request to the default agent.
Patch applied.
On 07/22/2015 09:51 AM, Jukka Rissanen wrote:
For VPN UserRoutes and ServerRoutes properties, the Netmask
field is the IPv4 netmask (like 255.255.255.0) for IPv4 routes.
For IPv6 routes it is the prefix length (like 64) instead.
Reported by Jaakko Hannikainen.
Patch applied.
Thanks,
Daniel
On 07/21/2015 01:27 PM, Jukka Rissanen wrote:
Hi,
these patches fix multiple issues in VPN connectivity.
Thanks to Jaakko Hannikainen for finding these issues.
Patch 1 fixes a crash issue in connman-vpnd. User
is able to cause segfault via connmanctl.
Another serious issue is found in