DHCP broadcasts coming from a "mystery" interface

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I just installed a barebones Debian "Wheezy" on a SuperMicro A1SRi-2558F.
http://www.supermicro.com/products/motherboard/Atom/A1SRi-2558F.cfm

I then noticed DHCP broadcasts on the VLAN on which its eth0 is connected.
(None of the other three LAN ports, nor the IPMI port, are connected.)

19:29:50.972187 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:29:54.062182 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:17.212146 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:20.302188 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:23.392586 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:46.542248 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:49.632095 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:52.722288 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:30:54.361734 00:25:90:__:__:__ > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 98: fe80::225:90ff:fe__:____.546 > ff02::1:2.547: dhcp6 inf-req
19:31:15.871399 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:31:18.962200 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548
19:31:22.052291 00:25:90:__:__:__ > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 590: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:25:90:__:__:__, length 548

My switch associates the MAC with this new system, so I know it's the source.
But on this system:

# cat /sys/class/net/eth*/address
0c:c4:7a:__:__:04
0c:c4:7a:__:__:05
0c:c4:7a:__:__:06
0c:c4:7a:__:__:07

(All of these are SuperMicro OUIs.)

So how can I find the interface from which the 00:25:90:... packet originates,
and squelch it?

I changed "filter" INPUT policy on the source machine to DROP, but had to
explicitly DROP --dst-type BROADCAST to keep it from passing through anyway.
The packets don't hit "filter" OUTPUT at all.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux