Date: Wed, 18 Dec 2024 06:36:17 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 283380] FreeBSD accepts and processes IPv4 packets destined to non-local MAC addresses instead of dropping them Message-ID: <bug-283380-7501-kTMpFByrdN@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-283380-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-283380-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283380 --- Comment #4 from Joerg Goltermann <jgm@osn.de> --- (In reply to Zhenlei Huang from comment #3) Unfortunately, this doesn't solve our issue. Promiscuous mode is not enabled during normal operation. The reason we filed the report was that we received a message from the NOC of a major peering exchange informing us about this problem. They found duplicate IP packets with our MAC address on their peering network. # tcpdump --no-promiscuous-mode -netttti vtnet2 host 146.185.xx.yy tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on vtnet2, link-type EN10MB (Ethernet), snapshot length 262144 bytes 2024-12-18 07:10:31.949435 fc:0a:81:xx:yy:zz > 48:f8:db:xx:yy:zz, ethertype IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx.yy.33824: Flags [.], ack 746869960, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0 2024-12-18 07:10:31.949443 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx:yy.33824: Flags [.], ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0 2024-12-18 07:10:31.949529 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx:yy.33824: Flags [.], ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0 2024-12-18 07:10:31.949601 fc:0a:81:xx:yy:zz > 48:f8:db:xx:yy:zz, ethertype IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.], seq 1919842898:1919842928, ack 2070174457, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336], length 30 2024-12-18 07:10:31.949605 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.], seq 0:30, ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336], length 30 2024-12-18 07:10:31.949702 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.], seq 0:30, ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336], length 30 interface state during the run of the tcpdump: # ifconfig vtnet2 | grep flags vtnet2: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1500 # -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-283380-7501-kTMpFByrdN>
