Forums » Linux

/tmp/udp.log

Jul 29, 2006 mr_spuck link
Is that a new that ven writes to it or is the system networking stuff doing that?

The file is growing pretty large if I don't restart my computer for a few days and since my /tmp is a tmpfs it's limited in size.

I guess I could point it to /dev/null or something if it gets anoying. :P
Jul 30, 2006 roguelazer link
I don't think VO makes that. At least, I haven't got one on my system. Are you sure it's not just, like, iptables output or something? Why don't you post the first few lines?
Jul 30, 2006 mr_spuck link
0x9461df8 3156581054 Sending packet type fd seq 0 len 8 space 1997 ack []
sendto(15, 0x82c1b60, 11, 204.11.209.42:21141) = 11 (OK)
[204.11.209.42:udp/21141] recvfrom = 13
0x9461df8 3156581240 Received packet len 13(8) type fe seq 0 ack [0] MRU 8
got HS2; pkt_syncid: 7c773848 local_syncid: 7c773848
probing MTU 1468
0x9461df8 3156581240 Sending packet type ff seq 1 len 4 space 2005 ack [0 ]
sendto(15, 0x82c1b60, 9, 204.11.209.42:21141) = 9 (OK)
0x9461df8 3156581240 Sending packet type fa seq 2 len 1453 space 509 ack []
sendto(15, 0x82c1b60, 1457, 204.11.209.42:21141) = 1457 (OK)
[204.11.209.42:udp/21141] recvfrom = 1458
0x9461df8 3156581431 Received packet len 1458(1453) type fa seq 1 ack [1] MRU 8
0x9461df8 3156581432 Sending packet type fb seq ff len 0 space 549 ack [1 ]
sendto(15, 0x82c1b60, 4, 204.11.209.42:21141) = 4 (OK)
[204.11.209.42:udp/21141] recvfrom = 4
0x9461df8 3156581486 Received packet len 4(0) type fb ack [2] MRU 1456
Got new MRU (MTU lower bound): 1456
Settled on MTU 1456
0x9461df8 3156581486 Sending packet type 05 seq 3 len 8 space 1997 ack []
sendto(15, 0x82c1b60, 12, 204.11.209.42:21141) = 12 (OK)
[204.11.209.42:udp/21141] recvfrom = 8
0x9461df8 3156581671 Received packet len 8(0) type fb ack [3] MRU 1456
[204.11.209.42:udp/21141] recvfrom = 23
0x9461df8 3156581671 Received packet len 23(15) type 05 seq 2 MRU 1456
0x9461df8 3156581671 Sending packet type 05 seq 4 len 23 space 1981 ack [2 ]
sendto(15, 0x82c1b60, 28, 204.11.209.42:21141) = 28 (OK)
[204.11.209.42:udp/21141] recvfrom = 8
0x9461df8 3156581857 Received packet len 8(0) type fb ack [4] MRU 1456
[204.11.209.42:udp/21141] recvfrom = 670
0x9461df8 3156581926 Received packet len 670(662) type 05 seq 3 MRU 1456
0x9461df8 3156581934 Sending packet type fb seq ff len 0 space 2045 ack [3 ]
sendto(15, 0x82c1b60, 4, 204.11.209.42:21141) = 4 (OK)
[204.11.209.42:udp/21141] recvfrom = 672
0x9461df8 3156581935 Received packet len 672(665) type 05 seq 4
0x9461df8 3156581935 Sending packet type fb seq ff len 0 space 2045 ack [4 ]
sendto(15, 0x82c1b60, 4, 204.11.209.42:21141) = 4 (OK)
[204.11.209.42:udp/21141] recvfrom = 298
.
.
.

I don't run iptables right now.

There's something about probing MTU in there. Are you using the automatic or compaibility network option?
Jul 31, 2006 roguelazer link
auto. And that does rather look like Vendetta's output, like the network errors output that you see at a high verbose level. Hmm.
Jul 31, 2006 a1k0n link
Oh fuxor, you have to be kidding me.

I can't believe I released that.

Yeah, Vendetta makes that. I didn't realize I had that uncommented for the released version. I'll release a patch to take that out.
Jul 31, 2006 a1k0n link
ok, 1.6.10.2 released to get rid of that. sorry about that.
Aug 01, 2006 avirulence link
Heh, I could've sworn you reacted differently yesterday. :P