Ubuntu Multicast packet bug
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Expired
|
Undecided
|
Unassigned |
Bug Description
I am using Kubuntu 10.10 for multicast data packets. I am sending multicast data packets from a windows machine which is listened for on my Kubuntu machine.
With wireshark I have confirmed that the packets are reaching the Kubuntu machine. Also I have confirmed on the windows machine of my membership addition to the multicast broadcast.
However, my c++ code is blocking on a receive from (recvfrom) function call, but my code is not receiving the data packets at all.
I tried a lot of settings to get it to work. After a day of looking, I found that flushing the ip tables, turning of the firewall and making my code listen on INADDR_ANY, then only does it work, but if we Bind to a particular IP, it does not work.
I think this is a bug because the code runs on the windows machine as is.
Also, I need to bind to aparticular IP since my LAN card has multiple IPs and I also have multiple NICs.
Is there a way to make ti work with binding and possibly have this bug fixed in Ubuntu/Kubuntu?
affects: | ubuntu → linux (Ubuntu) |
Changed in linux (Ubuntu): | |
status: | New → Confirmed |
tags: | added: maverick |
tags: | added: kubuntu |
Following settings also done
1) sudo iptables --flush IP_MULTICAST= y net/ipv4/ ip_forward
2) CONFIG_
3) echo 1 > /proc/sys/
4) net.ipv4.ip_forward = 1
in /etc/sysctl.conf ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- - conf.default. rp_filter= 0 conf.all. rp_filter= 0
-------
# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
net.ipv4.
net.ipv4.
# Uncomment the next line to enable TCP/IP SYN cookies lwn.net/ Articles/ 277146/ tcp_syncookies= 1
# See http://
# Note: This may impact IPv6 TCP sessions too
#net.ipv4.
# Uncomment the next line to enable packet forwarding for IPv4 ip_forward= 1
net.ipv4.
# Uncomment the next line to enable packet forwarding for IPv6 conf.all. forwarding= 1
# Enabling this option disables Stateless Address Autoconfiguration
# based on Router Advertisements for this host
net.ipv6.
####### ####### ####### ####### ####### ####### ####### ####### ####### #### conf.all. accept_ redirects = 0 conf.all. accept_ redirects = 0 conf.all. secure_ redirects = 1 conf.all. send_redirects = 0 conf.all. accept_ source_ route = 0 conf.all. accept_ source_ route = 0 conf.all. log_martians = 1 ------- ------- ------- ------- ------- ------- ------- ------- ------- ------- ----
# Additional settings - these settings can improve the network
# security of the host and prevent against some network attacks
# including spoofing attacks and man in the middle attacks through
# redirection. Some network environments, however, require that these
# settings are disabled so review and enable them as needed.
#
# Do not accept ICMP redirects (prevent MITM attacks)
#net.ipv4.
#net.ipv6.
# _or_
# Accept ICMP redirects only for gateways listed in our default
# gateway list (enabled by default)
# net.ipv4.
#
# Do not send ICMP redirects (we are not a router)
#net.ipv4.
#
# Do not accept IP source route packets (we are not a router)
#net.ipv4.
#net.ipv6.
#
# Log Martian Packets
#net.ipv4.
#
-------