Just a stab in the dark, but are you passing different options for different clients? Have you introduced new options or new clients that potentially are longer than the available buffer, causing this to start happening? I am assuming this is a new error when I ask this...
I would suggest capturing some traffic and comparing the contents of the packets between those that return the error and those that do not. Someone else on this list might be able to diagnose the issue without that information, but I think it will help the rest of us.
________________________________________
From: dhcp-users [
[hidden email]] on behalf of Denis Taranushin [
[hidden email]]
Sent: Monday, December 12, 2016 1:16 AM
To:
[hidden email]
Subject: option length exceeds option buffer length
Hello
I have a lot of errors in logs looks like:
Subscriber-ID: SV869_CV1549 HWAddress 3c:97:e:a5:83:20
DHCPREQUEST for 1.1.1.10 from 3c:97:0e:a5:83:20 (Lenovo-PC) via 1.1.1.1
DHCPACK on 1.1.1.10 to 3c:97:0e:a5:83:20 (Lenovo-PC) via 1.1.1.1
parse_option_buffer: malformed option ttk-su.<unknown> (code 104):
option length exceeds option buffer length.
At that moment string "ttk-su.ru" appears only in DHCPACK:
OPTION: 53 ( 1) DHCP message type 5 (DHCPACK)
OPTION: 15 ( 9) Domainname ttk-su.ru
Why "option length exceeds option buffer length"?
Why the error appears only for some client and doesn't from others?
_______________________________________________
dhcp-users mailing list
[hidden email]
https://lists.isc.org/mailman/listinfo/dhcp-users_______________________________________________
dhcp-users mailing list
[hidden email]
https://lists.isc.org/mailman/listinfo/dhcp-users