Date: Tue, 23 Jul 2013 09:22:16 -0500 From: Kevin Day <kevin@your.org> To: Zaphod Beeblebrox <zbeeble@gmail.com> Cc: FreeBSD Net <freebsd-net@freebsd.org> Subject: Re: Duplicate Address Detection misfire? Message-ID: <3341F665-B179-4A99-B48A-81EE3D0478A6@your.org> In-Reply-To: <CACpH0MdzB7hurx0Dk7Z09bMrXRmR8X%2BregphVgS0L7nGS%2B22XQ@mail.gmail.com> References: <CACpH0McSM7HDeJcQ1pLcXuEZ96n=15YmCaP4YheZghBbyEgfUw@mail.gmail.com> <06BA4BD5-BE4E-4184-AFBB-D7FD4B2597D9@your.org> <CACpH0MdBk6aQhO6CugaiKTTv0GOS6dNeegwnxFSsd4n0mUOSmA@mail.gmail.com> <CACpH0MeemqKt4MEDw4PjycgA4PE4ejihJu9_G=Y9C2kZLdzXPA@mail.gmail.com> <CACpH0MdzB7hurx0Dk7Z09bMrXRmR8X%2BregphVgS0L7nGS%2B22XQ@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
Sorry for the slow reply.
We run mainly ESXi (the bare metal version of VMware, not the desktop versions) but I do remember seeing something sort of similar on a desktop version ages ago. Basically we narrowed it down to a Windows driver bug on the host system's ethernet card. It was basically reflecting back everything it transmitted into the receive queue. This was before IPv6 was in use here, but I remember it breaking a file sharing protocol (SMB? AFP?) that also didn't like seeing its own multicasts/broadcasts echoed back to itself.
By any chance is this on a system using WiFi rather than wired ethernet? Many routers/access points/wifi adapters have problems with the idea of VMware's "bridged mode" networking - they expect only one MAC per station and do not do the right thing in some places.
I don't have an answer for you, but I'd look at the physical networking card/adapter on the host OS first if I were troubleshooting this. Updated driver/replace with something else/etc.
-- Kevin
On Jul 23, 2013, at 12:44 AM, Zaphod Beeblebrox <zbeeble@gmail.com> wrote:
> What to do when you don't trust the interface? VMWare is obviously emulating the hardware and their interpretation of what the hardware "is" is possibly different from ours.
>
> If I boot single-user and tcpdump the interface, I see two transmitted solicitations. The kernel claims to have sent one.
>
> My concern: is the vmware interface reflecting the solicitation packet because it is a broadcast packet?
>
> To determine this, I've gone over the tcpdump and pcap-filter man pages to look for a way to only dump packets leaving from or arriving at an interface. Can this be done?
>
> If VMWare is reflecting the packet back, I'm curious as to how we can fix this.
>
[-- Attachment #2 --]
0 *H
010 + 0 *H
!00Šq_Mtq40
*H
0{10 UGB10UGreater Manchester10USalford10U
Comodo CA Limited1!0UAAA Certificate Services0
040101000000Z
281231235959Z010 UUS10 UUT10USalt Lake City10U
The USERTRUST Network1!0Uhttp://www.usertrust.com1604U-UTN-USERFirst-Client Authentication and Email0"0
*H
0
9}A;bF7`u9eJGHjM5BI/|1Nd.)բdąQ5yNh{zɤ2O0nFxoY^/m/묡j.g5yiF͠v:z'[=s"HaLi.1 ,CZqYں
gT:
wetbh~GeMW(t40b0, '0#0U#0
#>)00Ug}ĝ&p KPH|=n}0U0U00U%0++0U
00U 0{Ut0r08642http://crl.comodoca.com/AAACertificateServices.crl06420http://crl.comodo.net/AAACertificateServices.crl0 `HB0
*H
<~ v9<Oૄ]Te;m|7,%T_!7OTklE`-QLf<J?VvÂOl atG@We"'gOWdZٍ/i)J /LQFĊ7N 1hǞċ~2hD*Q`Mt:C29V:RAC3'9N&9≸])&A곛wuʵeJc>D^s00mOj3""2zq0
*H
010 UUS10 UUT10USalt Lake City10U
The USERTRUST Network1!0Uhttp://www.usertrust.com1604U-UTN-USERFirst-Client Authentication and Email0
110428000000Z
200530104838Z010 UGB10UGreater Manchester10USalford10U
COMODO CA Limited1907U0COMODO Client Authentication and Secure Email CA0"0
*H
0
[KW^/@ȣSX_fe2N2}UxLUB'qi2@'Vbqi c^`ʢAjHmeC*.+c8w߱ڂ2jgo \5Tq
7
PSlY1 LR@[HhJ$:q_㬿;%qh=XF<hmz!W42~JRrd&N`ohQcB}"cөΞD\[5 K0G0U#0g}ĝ&p KPH|=n}0UzN t[xcd'/[y{0U0U0 0U
00U 0XUQ0O0MKIGhttp://crl.usertrust.com/UTN-USERFirst-ClientAuthenticationandEmail.crl0t+h0f0=+01http://crt.usertrust.com/UTNAddTrustClient_CA.crt0%+0http://ocsp.usertrust.com0
*H
־xWUm3DRB
JAIZҭsn>&|L0(B<%>
u=9fѡMo(ltZڱuz/yVtCr`9 G:eH<=%`I?C
3_н`j;:<I3B)93i.EMiڀ=]|Gm]W0KID~y83:]&XaU!ՙC@B0Ұun00 ^Reyӄ0
*H
010 UGB10UGreater Manchester10USalford10U
COMODO CA Limited1907U0COMODO Client Authentication and Secure Email CA0
130616000000Z
140616235959Z010 *H
kevin@your.org0"0
*H
0
L?PMN+h/.u[fsfR`^F^ricr2 |Us,~U*Y'TvKE_1:A{ANp&>|E"cI7d+'߭dq.ЂeD<zzn'X`逳{5OH
:Ni_IDHm^.z96/%{`W|.iH0%3.y 00U#0zN t[xcd'/[y{0U1YA^Нwf;qf0U0U0 0 U%0++10 `HB 0FU ?0=0;+10+0)+https://secure.comodo.net/CPS0WUP0N0LJHFhttp://crl.comodoca.com/COMODOClientAuthenticationandSecureEmailCA.crl0+|0z0R+0Fhttp://crt.comodoca.com/COMODOClientAuthenticationandSecureEmailCA.crt0$+0http://ocsp.comodoca.com0U0kevin@your.org0
*H
͋[,bFAHRg3OYӢ6 T4&HFZF`|&%4\XeE5RR`KBUcv+aHو3rDSVXmX므8OQK]m- *7Hګ|q!lQw\r.8v43J߳
/h<I>+5fL厐Hc
\GcX+RTЙ*100010 UGB10UGreater Manchester10USalford10U
COMODO CA Limited1907U0COMODO Client Authentication and Secure Email CA ^Reyӄ0 + 0 *H
1 *H
0 *H
1
130723142217Z0# *H
1N}I"f=C]'0 +710010 UGB10UGreater Manchester10USalford10U
COMODO CA Limited1907U0COMODO Client Authentication and Secure Email CA ^Reyӄ0*H
1010 UGB10UGreater Manchester10USalford10U
COMODO CA Limited1907U0COMODO Client Authentication and Secure Email CA ^Reyӄ0
*H
!Z+Z{6ک+*K6<=n9fE0~M+]~=L9ZnjJhң̝w¨+m
dCuׄ#ZT ?;?rm`)7ըAMT<
O~@(!zXq}n>0Tݴ5-FNTrdi1KԖYKiI7om i
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3341F665-B179-4A99-B48A-81EE3D0478A6>
