Dnsmasq 2.83 causes log spam

Hannu Nyman hannu.nyman at iki.fi
Fri Jan 22 01:10:09 EST 2021


Looks like the new dnsmasq 2.83 (and the patched 2.80 in 19.07) cause massive 
log spam, in style of:


Fri Jan 22 06:30:09 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Network unreachable
Fri Jan 22 06:30:14 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Network unreachable
Fri Jan 22 06:30:23 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Network unreachable
Fri Jan 22 06:30:25 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Address family not supported by protocol
Fri Jan 22 06:30:25 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Address family not supported by protocol
Fri Jan 22 06:30:28 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Address family not supported by protocol
Fri Jan 22 06:30:28 2021 daemon.err dnsmasq[14996]: failed to send packet: 
Address family not supported by protocol


Based on forum discussion and my own experience, this is apparently mainly 
related to Windows PCs and Macs that have ipv6.


This is being extensively discussed in the forum, starting from:

https://forum.openwrt.org/t/security-advisory-2021-01-19-1-dnsmasq-multiple-vulnerabilities/85903/22






More information about the openwrt-devel mailing list