[j-nsp] what do do with bug reports

Ola Thoresen ola at nytt.no
Mon Jun 15 03:58:20 EDT 2020


Hi,

File a JTAC problem report, either yourself via a Juniper Partner (where 
you should have support for your devices).



Rgds.

Ola Thoresen


On 15.06.2020 08:15, Baldur Norddahl wrote:
> Hello
>
> What am I supposed to do with glaring bugs? Are Juniper interested in 
> knowing those or don't they care?
>
> In this case I found out that 19.1 behaves badly if you set [system 
> services subscriber-management overrides interfaces family inet 
> receive-gratuitous-arp]. The setting is supposed to enable updating 
> the ARP table when receiving gratuitous ARP from clients. Instead it 
> makes the router reply to those ARP packets, which causes the clients 
> to reject the address.
>
> Packet monitor (somewhat shortened):
>
> 07:41:05.677882 bpf_flags 0x03,  In
>     Juniper PCAP Flags [no-L2, In]
>     -----original packet-----
>     PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
> [none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
> 255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
> 34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>     -----original packet-----
>     PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags 
> [none], proto: UDP (17), length: 319) 185.24.168.248.bootps > 
> 255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, 
> xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>     -----original packet-----
>     PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
> [none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
> 255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
> 34:21:09:xx:xx:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>     -----original packet-----
>     PFE proto 2 (ipv4): (tos 0x0, ttl 255, id 0, offset 0, flags 
> [none], proto: UDP (17), length: 319) 185.24.168.248.bootps > 
> 255.255.255.255.bootpc: [udp sum ok] BOOTP/DHCP, Reply, length 291, 
> xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>       Your-IP 212.237.x.237
>         DHCP-Message Option 53, length 1: ACK
>     -----original packet-----
>     34:21:09:x:x:e1 > Broadcast, ethertype 802.1Q (0x8100), length 
> 4294967292: vlan 301, p 0, ethertype 802.1Q, vlan 545, p 0, ethertype 
> ARP, arp who-has 212.237.x.237 tell 212.237.x.237
> 07:41:05.686691 bpf_flags 0x00, Out
>     -----original packet-----
>     e6:5d:37:84:53:17 > 34:21:09:x:x:e1, ethertype ARP (0x0806), 
> length 4294967292: arp reply 212.237.x.237 is-at e6:5d:37:84:53:17
> 07:41:05.689680 bpf_flags 0x03,  In
>     -----original packet-----
>     PFE proto 2 (ipv4): (tos 0x0, ttl  64, id 24111, offset 0, flags 
> [none], proto: UDP (17), length: 576) 0.0.0.0.bootpc > 
> 255.255.255.255.bootps: [udp sum ok] BOOTP/DHCP, Request from 
> 34:21:09:x:x:e1, length 548, xid 0x1b632c2a, Flags [Broadcast] (0x8000)
>         DHCP-Message Option 53, length 1: Decline
> ^C
> 8 packets received by filter
>
> The part that is plain wrong is "arp reply 212.237.x.237 is-at 
> e6:5d:37:84:53:17". NO! 212.237.x.237 is actually at 34:21:09:x:x:e1 
> and by responding to this, the router causes the client to believe 
> something else is using the address. Therefore the client sends 
> Decline back to the DHCP server.
>
> Proxy-arp settings makes no difference at all. Doesn't matter if you 
> have it entirely disabled or set to proxy-arp restricted. However 
> disabling receive-gratuitous-arp makes the router stop doing this.
>
> If I made a case for this I am sure they will just tell me to disable 
> receive-gratuitous-arp which is exactly what I did. I am just curious 
> if there is any way to report bugs that I will live with as is. It is 
> still clearly something that should get fixed.
>
> Regards,
>
> Baldur
>
>
>
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp


More information about the juniper-nsp mailing list