Open mdavidsaver opened 5 years ago
It look like somehow CMD_ORIGIN_TAG
message have been getting past, or going around, the special case handling for them in BlockingUDPTransport::processBuffer()
and triggering warnings in the regular server processing in ServerResponseHandler::handleResponse()
and ServerBadResponse::handleResponse()
.
As background:
CMD_ORIGIN_TAG
is part of the "local multicast hack" (my name for it). A unicast UDP message (according to it's sender) is redirected, by whichever socket happens to receive it (client or server), to 224.0.0.128
on which all local clients and servers are listening. When this happens a CMD_ORIGIN_TAG
message is prepended to the packet body.
The idea (as I understand it) is to allow unicast UDP search to "just work" for hosts with multiple PVA servers, without having to manually manage TCP port numbers.
The only (as yet hypothetical) problem which I know of with this idea is that it will cause both sides of a PVA gateway to see unicast searches or beacons from either sides.
redirection on the server side:
redirection on the client side:
Handling in UDP receiver common to both client and server:
Log files at SLAC have been filling up with:
Note that "header 16" is really 0x16.