netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Treason uncloaked / Broken peer again
@ 2009-02-21 19:58 Greg Lindahl
  2009-02-21 21:34 ` Ilpo Järvinen
  0 siblings, 1 reply; 10+ messages in thread
From: Greg Lindahl @ 2009-02-21 19:58 UTC (permalink / raw)
  To: netdev

A recent set of fiddling to our web crawler has resulted in crawled
Linux hosts frequently getting "Treason uncloaked" messages in their
dmesg. This has resulted in a modest amount of hate mail, surprisingly
little given that we crawl millions of hosts per day.

We're running the RHEL 5.2's kernel, and I have a remote webserver of
my own running RHEL 5.2 that's getting the messages. If you look in
your own webserver dmesg and see treason emanating from
38.108.180.XXX/24, that's me.

Unfortunately, I haven't made the thing deterministic. My suspicion is
that there's another bug similar to:

http://github.com/github/linux-2.6/commit/2ad41065d9fe518759b695fc2640cf9c07261dd2

Any advice on how to narrow down the bug? I was hoping I could get a
tcpdump of a treasonous conversation and hand it over to you guys.

-- greg



^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2009-03-10 19:37 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-02-21 19:58 Treason uncloaked / Broken peer again Greg Lindahl
2009-02-21 21:34 ` Ilpo Järvinen
2009-02-21 21:50   ` Greg Lindahl
2009-02-26  6:30   ` Greg Lindahl
2009-02-26  8:58     ` Herbert Xu
2009-02-26  9:30       ` Ilpo Järvinen
2009-02-27 21:22         ` Greg Lindahl
2009-02-27 21:27           ` Greg Lindahl
2009-02-28  0:31           ` David Miller
2009-03-10 19:37             ` Greg Lindahl

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).