Re: Kernel 2.2.5 and ping problem

Brian Candler (B.Candler@pobox.com)
Wed, 7 Jul 1999 23:51:45 +0100


> I think this was discussed at length on axp-list. You might try searching
> the archives for "ping":
>
> http://www.lib.uaa.alaska.edu/axp-list/
> http://www.mail-archive.com/linux-alpha%40vger.rutgers.edu/

Aha! The following just arrived from redhat-watch-list...

Message-ID: <19990707144326.X16480@devserv.devel.redhat.com>
Date: Wed, 7 Jul 1999 14:43:26 -0400
From: Jeff Johnson <jbj@redhat.com>
To: redhat-watch-list@redhat.com
Subject: [errata] ping and traceroute problems on Red Hat 6.0/alpha.
Approved: djb@redhat.com

---------------------------------------------------------------------
Red Hat, Inc. Errata Advisory

Synopsis: ping and traceroute problems on Red Hat 6.0/alpha.
Advisory ID: RHEA-1999:019-01
Issue date: 1999-07-07
Keywords: rpm
---------------------------------------------------------------------

1. Topic:
New packages for ping and traceroute correct problems on Red Hat 6.0/alpha.
Packages are being released for all platforms in order to have the same
version on all Red Hat 6.0 platforms.

2. Bug IDs fixed:
#1284 ping -f still broken even with the bsd one
#1786 Unaligned Trap and Wrong Data Byte in ping.
#3284 Ping fails at odd bytes

3. Relevant releases/architectures:
Red Hat Linux 6.0, all architectures

4. Obsoleted by:

5. Conflicts with:

6. RPMs required:

Intel: ftp://updates.redhat.com/6.0/i386/
netkit-base-0.10-31.i386.rpm
traceroute-1.4a5-16.i386.rpm

Alpha: ftp://updates.redhat.com/6.0/alpha/
netkit-base-0.10-31.alpha.rpm
traceroute-1.4a5-16.alpha.rpm

Sparc: ftp://updates.redhat.com/6.0/sparc/
netkit-base-0.10-31.sparc.rpm
traceroute-1.4a5-16.sparc.rpm

Source rpm:
ftp://updates.redhat.com/4.2/SRPMS/netkit-base-0.10-31.src.rpm
ftp://updates.redhat.com/4.2/SRPMS/traceroute-1.4a5-16.src.rpm

7. Problem description:
On the alpha platform, ICMP packets were not correctly interpreted
because of a 64 bit long problem.

On all platforms, ICMP checksums were incorrectly computed for packets
containing an odd number of bytes. In addition, "ping -f localhost"
does not drop packets.

8. Solution:

You should install the new packages by typing (assuming Red Hat 6.0/i386)
rpm -U netkit-base-0.10-31.i386.rpm
rpm -U traceroute-1.4a5-16.i386.rpm

9. Verification:

MD5 sum Package Name
--------------------------------------------------------------------------
ba06fdfb995e6b19ce912f62a6ccf080 6.0/i386/netkit-base-0.10-31.i386.rpm
9bee746b1c2cbf9f135cd503928fc354 6.0/i386/traceroute-1.4a5-16.i386.rpm
deff8f56e05cd6525e057caf884060ae 6.0/alpha/netkit-base-0.10-31.alpha.rpm
d5f5728182d7eb70e5da01ac8cc1c077 6.0/alpha/traceroute-1.4a5-16.alpha.rpm
e7539afaba497320e7918f9076b19612 6.0/sparc/netkit-base-0.10-31.sparc.rpm
f5de9f2a4c883fcf1a17ba6633cd3260 6.0/sparc/traceroute-1.4a5-16.sparc.rpm
9f1e97953d561a099dc6cfe89a55a4c7 6.0/SRPMS/netkit-base-0.10-31.src.rpm
e59b2b9637205a50b9994aa67507a087 6.0/SRPMS/traceroute-1.4a5-16.src.rpm

These packages are also PGP signed by Red Hat Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nopgp <filename>

10. References: