[GRLUG] Rogue packet triggering reboot!

Michael Mol mikemol at gmail.com
Mon Oct 17 17:11:08 EDT 2016


On Monday, October 17, 2016 04:54:56 PM Adam Tauno Williams wrote:
> On Mon, 2016-10-17 at 14:52 -0500, L. V. Lammert wrote:
> > This SEEMS to indicate that a packet received on a public IF that has
> > no open ports triggered a reboot:
> > Oct 14 17:31:36 <machine> kernel: IPv4: martian source 206.197.251.9
> > from 60.24.136.201, on dev br3
> > Oct 14 17:31:36 <machine> kernel: ll header: 00000000: 00 e0 81 cd 21
> > b1 00 b0 c2 88 54 1c 08 00        ....!.....T...
> > Oct 14 17:31:44 <machine> systemd[1]: Received SIGINT.
> > <reboot in process>
> 
> A full EIGHT SECONDS later?  I would not automatically correlate these
> two events.
> 
> If the interface has no open ports why not discard all inbound traffic?

The "martian source" refers to a routing error.

Perhaps br3 is only for VMs, and has an interface on the VM host for routing 
guest traffic out? A VM guest may be originating traffic using one of his public 
IPs for a source address. Possibly as part of a NAT punching technique? Or 
perhaps he assigned the public IP to the guest without informing the host that 
that particular IP could be found there?

Oh, hey, looking up the WHOIS, now I know his first name! :P

-- 
:wq
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: This is a digitally signed message part.
URL: <http://shinobu.grlug.org/pipermail/grlug/attachments/20161017/edfbabea/attachment-0001.sig>


More information about the grlug mailing list