Re: neighbor table overflow

Linux Advanced Routing and Traffic Control

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Marco C. Coelho wrote:
> Looking into it further an ip route shows:
>
> 64.0.0.0/8 via 64.202.224.1 dev eth0  proto zebra  metric 20 equalize
This /8 doesn't affect the neighbor table. There must be a problem on
the site that announce it
>
> So the 64.0.0.0 announce is coming into this box through OSPF  (zebra)
>
> The 169.254.0.0/16 is being automajically added through the sysconfig
> network scripts.  I'm looking into why.
>
> In either case I still don't see why these entries would make the
> neighbor table overflow.  Could it have been the previous fix to the
> hosts file?
Well, when somebody try to make traffic with somebody from
169.254.0.0/16 throught you, your server will ask for arp on eth3, and
most probably will record an <incomplete> entry in arp table. Virii and
others can make this worse. Another quick fix is to drop arps from/to
169.254.0.0/16 with arptables.
>
> mc
>
> Alexandru Dragoi wrote:
>> Marco C. Coelho wrote:
>>   
>>> the ip route with a grep for link returns:
>>>
>>> snip** too long
>>> 64.202.227.198 dev ppp436  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.196 dev ppp421  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.197 dev ppp211  proto kernel  scope link  src 10.20.0.1
>>> 64.202.227.194 dev ppp13  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.192 dev ppp404  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.254 dev ppp194  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.253 dev ppp130  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.252 dev ppp243  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.249 dev ppp195  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.248 dev ppp254  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.247 dev ppp235  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.242 dev ppp78  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.240 dev ppp328  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.237 dev ppp44  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.236 dev ppp122  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.234 dev ppp316  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.232 dev ppp132  proto kernel  scope link  src 10.20.1.1
>>> 64.202.227.231 dev ppp104  proto kernel  scope link  src 10.20.0.1
>>> 64.202.227.226 dev ppp179  proto kernel  scope link  src 10.20.0.1
>>> 64.202.224.0/24 dev eth0  proto kernel  scope link  src 64.202.224.8
>>> 192.168.1.0/24 dev eth3  proto kernel  scope link  src 192.168.1.8
>>> 169.254.0.0/16 dev eth3  scope link
>>>     
>>
>> The one above must be deleted, many redhat-like distros attach
>> 169.254.0.0/16.
>>   
>>> All the pppoe terminations (pppd) are shown, as well as the last three
>>> subnets.  I'll have to see where the 169.254.0.0/16 is coming from?
>>>
>>> mc
>>>
>>>
>>>
>>>
>>> Alexandru Dragoi wrote:
>>>     
>>>> Marco C. Coelho wrote:
>>>>   
>>>>       
>>>>> This box is doing a lot.  It terminates 1000 PPPoE connections,
>>>>> provides traffic shaping using TC/HTB, authenticates all users via
>>>>> Radius.  It also runs OSPF routing for the internal network.  Looking
>>>>> at a simple route output I see all the PPP connections coming through
>>>>> the box, and due to the OSPF I also see the rest of my network
>>>>> announcements.  The only strange things are:
>>>>>
>>>>> 1.  The last man working on this box had mistakenly edited the hosts
>>>>> file and added the machine name and complete domain name to the local
>>>>> host 127.0.0.1 name.  It should only be pointed to the eth0
>>>>> interface.   I have changed this.
>>>>>
>>>>> 2.  The route output is making an announcement
>>>>>
>>>>>    64.0.0.0        argontech.net   255.0.0.0       UG    20    
>>>>> 0        0 eth0
>>>>>     
>>>>>         
>>>> This doesn't look dangerous for your problem, I was only talking about
>>>> directly connected networks:
>>>>
>>>> # ip route |grep link
>>>>
>>>>   
>>>>       
>>>>> My public IP space is a /20 within that space, not the whole Class A. 
>>>>> I have not found which box is announcing this within my network yet.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Jeff Welling wrote:
>>>>>     
>>>>>         
>>>>>>> On 10/23/07 06:56, Alexandru Dragoi wrote:
>>>>>>>         
>>>>>>>             
>>>>>>>> What about checking your routing table? you may have link routes
>>>>>>>> for massive subnets (like 85.0.0.0/8 or 140.20.0.0/16). Some
>>>>>>>> programs prefer to use "standard" netmask of classes A and B.
>>>>>>>>           
>>>>>>>>               
>>>>>>> I'm betting that the OP has other things going on seeing has how
>>>>>>> s/he mentioned PPPoE, which to my knowledge is a layer 2 protocol,
>>>>>>> and thus not subject to typical routing scenarios.  In essence the
>>>>>>> OP could have thousands of PPPoE connections terminating on one
>>>>>>> system with the ARP cache having to deal with where to send traffic
>>>>>>> to which MAC address. There is not a lot of room for routing in such
>>>>>>> a scenario.
>>>>>>>
>>>>>>>         
>>>>>>>             
>>>>>> I agree with Peter's suggestion, arpd.  I ran into the neighbor table
>>>>>> overflow problem recently, at the hands of our ISP.  I was in the
>>>>>> process of recompiling the kernel and mucking with arpd (I couldn't
>>>>>> get it to run/start properly) when the problem disappeared as quickly
>>>>>> as it showed up.  Lucky for me, this was some kind of ISP problem, I
>>>>>> was able to determine that much through `tcpdump -i X -n arpd`.
>>>>>>
>>>>>> My 'two cents' is that you try arpd, I did a bit of looking when I
>>>>>> came across that problem and it seemed to be the last ditch effort
>>>>>> when changing the gc threshold had no effect.  Wasn't able to confirm
>>>>>> that it worked for sure though.
>>>>>>
>>>>>> Cheers.
>>>>>> _______________________________________________
>>>>>> LARTC mailing list
>>>>>> LARTC@xxxxxxxxxxxxxxx
>>>>>> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>>>>>>
>>>>>>       
>>>>>>           
>>>>> _______________________________________________
>>>>> LARTC mailing list
>>>>> LARTC@xxxxxxxxxxxxxxx
>>>>> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>>>>>     
>>>>>         
>>>>   
>>>>       
>>> ------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> LARTC mailing list
>>> LARTC@xxxxxxxxxxxxxxx
>>> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>>>   
>>>     
>>
>>
>>   

_______________________________________________
LARTC mailing list
LARTC@xxxxxxxxxxxxxxx
http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc

[Index of Archives]     [LARTC Home Page]     [Netfilter]     [Netfilter Development]     [Network Development]     [Bugtraq]     [GCC Help]     [Yosemite News]     [Linux Kernel]     [Fedora Users]
  Powered by Linux