[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: promiscuous mode



Le sam 24/05/2003 à 00:24, Ian Goodall a écrit :
> >Try using tcpdump to investigate the problem.  Make sure you use the
> >'-p' flag to tcpdump to tell it not to set the interface into
> >promiscuous mode.  Something like
> ># tcpdump -i eth0 -p -n
> 
> I have no idea what all the output means. Below is an extract from the
> output:
> 
> 23:17:22.564132 172.16.3.195.1957 > 172.16.5.92.22: P 211401:211445(44) ack
> 1380732 win 36168 (DF)

At 23:17:22.564132, a paquet from 172.16.3.195 port 1957 was received on
172.16.5.92 port 22. remaining are related to tcp, ack and flags. Here,
there is no S (SYN) nor F (FIN) thus the connection was previously
established and continued after your capture.

Were you connected through SSH while doing your network capture? This is
a _very_ good way to generate packets :-)) Each time a packet touches
your box, ssh will send you the tcpdump line generating a packet that
will get captured and sent to you via ssh and so on :-)). See, in your
capture, packets follow each other less at sometimes less than a
millisecond! It's possible to do network captures when connecting
through the network, but then you have to exclude yourself from the
capture for it to be usefull. With tethereal the syntax is:

tethereal -n not tcp port 22

I can't remember for tcpdump but hopefully there is a "capture filter"
section in the manual.

> if it helps 172.16.3.195 is another computer directly connected to the
> switch running windows xp. This computer is 172.16.5.92 . The switch is also
> connected into the rest of the university student network. Even though the
> rest of the network is connected to the server shouldn't the traffic be
> ignored if it is not desined for it anyway?

Are you sure it's not? Of course being connected on a big network you
will receive plenty of junk, specialy as your broadcast domain seems
quite big. Any machine looking for an other (dns server, gateway,
whatever) will send an arp message that _everybody_ will receive (if
not, your ethernet will never work), windows machines hoping to make new
friends will do the same... There is very little you can do other than
taking no action (which your IP stack already does for most of this
stuff). You may additionnaly use iptables to remove this useless traffic
(just be carefull that on a busy network you may fill your logs with
useless crap) but this will not prevent the traffic from reaching you.
The only other way would be to put a router between you and the big
network, but you don't gain much I think.

Sebastien




Reply to: