Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 22 May 2007 07:03:16 +0200
From:      Ian FREISLICH <ianf@clue.co.za>
To:        Sten Spans <sten@blinkenlights.nl>
Cc:        freebsd-current@freebsd.org
Subject:   Re: em0 hijacking traffic to port 623 
Message-ID:  <E1HqMWi-0000Tk-2X@clue.co.za>
In-Reply-To: Message from Sten Spans <sten@blinkenlights.nl> of "Tue, 22 May 2007 00:21:36 %2B0200." <Pine.LNX.4.64.0705220019390.17702@zaphod.blinkenlights.nl> 

next in thread | previous in thread | raw e-mail | index | archive | help
Sten Spans wrote:
> On Mon, 21 May 2007, Ian FREISLICH wrote:
> 
> > Hi
> >
> > We've noticed an issue on our firewalls where the first em device
> > in the system hijacks inbound port 623 tcp and udp.  The OS never
> > sees this traffic.  Interestingly, em1 and em2 do not appear to be
> > afflicted by this problem.  Some reading I've done points to a
> > similar conclusion:
> >
> > http://blogs.sun.com/shepler/entry/port_623_or_the_mount
> >
> > I've looked at the bios, but I can't find any settings that remotely
> > hint IPMI or RMCP+ or serial-over-lan.
> >
> > Does anyone know how I can stop the card or system from stealing
> > port 623 in hardware or must I just stop using em0 (and/or Intel NICS)?
> 
> Does "ifconfig em0 promisc" help ?
> That fixed firmware related vanishing ipv6 packets on fxp and em.

They are already in promiscuous mode due to carp.

Ian

--
Ian Freislich




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E1HqMWi-0000Tk-2X>