Getting logs flooded with rfc
May 17 10:59:48 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 OUT=
MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1
DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51763 PROTO=UDP
SPT=53579 DPT=61112 LEN=100
May 17 10:59:54 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 OUT=
MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1
DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51764 PROTO=UDP
SPT=53580 DPT=61112 LEN=100
May 17 11:00:00 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 OUT=
MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1
DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51765 PROTO=UDP
SPT=53581 DPT=61112 LEN=100
I dont understand why I am getting these logs
Thanks ----Mike
Linux ns2.local 2.4.7-10 #1 Thu Sep 6 17:27:27 EDT 2001 i686 unknown
[root@ns2 root]# shorewall version
1.3.14
[root@ns2 root]# ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:20:af:fa:11:e5 brd ff:ff:ff:ff:ff:ff
    inet 63.231.33.57/29 brd 63.231.33.63 scope global eth0
3: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
    link/ether 00:60:08:67:fc:e8 brd ff:ff:ff:ff:ff:ff
    inet 192.168.2.1/24 brd 192.168.2.255 scope global eth1
4: tun1: <POINTOPOINT,MULTICAST,NOARP,UP> mtu 1405 qdisc pfifo_fast qlen
10
    link/ppp 
    inet 172.16.2.2 peer 172.16.2.1/32 scope global tun1
[root@ns2 root]# ip route show
172.16.2.1 dev tun1  proto kernel  scope link  src 172.16.2.2 
63.231.33.56/29 dev eth0  scope link 
192.168.2.0/24 dev eth1  scope link 
10.19.227.0/24 via 172.16.2.1 dev tun1 
127.0.0.0/8 dev lo  scope link
On Sat, 17 May 2003 11:06:02 -0700, Mike <landers@lanlinecomputers.com> wrote:> Getting logs flooded with rfc > May 17 10:59:48 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 OUT= > MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1 > DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51763 PROTO=UDP > SPT=53579 DPT=61112 LEN=100 May 17 10:59:54 ns2 kernel: > Shorewall:rfc1918:DROP:IN=eth0 OUT= > MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1 > DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51764 PROTO=UDP > SPT=53580 DPT=61112 LEN=100 May 17 11:00:00 ns2 kernel: > Shorewall:rfc1918:DROP:IN=eth0 OUT= > MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1 > DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51765 PROTO=UDP > SPT=53581 DPT=61112 LEN=100 > > I dont understand why I am getting these logs > Thanks ----Mike >You have ''norfc1918'' set on eth0 and it looks like there is at least one host connected to that through that interface that has an RFC 1918 address (192.168.0.1). -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net
Wierd then, the local subnet is 192.168.2.0/24
    Maybe one of the users has added a node without my knowledge. I believe
this is crashing the server got a call this morn and reboot fixed the
problem, the logs are going crazy. I shut off rfc1918 for now until I can
visit the location.
Thanks,
Mike
----- Original Message -----
From: "Tom Eastep" <teastep@shorewall.net>
To: "Mike" <landers@lanlinecomputers.com>;
<shorewall-users@lists.shorewall.net>
Sent: Saturday, May 17, 2003 11:50 AM
Subject: Re: [Shorewall-users] logs Flooded with Rfc1918
> On Sat, 17 May 2003 11:06:02 -0700, Mike
<landers@lanlinecomputers.com>
> wrote:
>
> > Getting logs flooded with rfc
> > May 17 10:59:48 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 OUT>
> MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1
> > DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51763
PROTO=UDP> > SPT=53579 DPT=61112 LEN=100 May 17 10:59:54 ns2 kernel:
> > Shorewall:rfc1918:DROP:IN=eth0 OUT> >
MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1
> > DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51764
PROTO=UDP> > SPT=53580 DPT=61112 LEN=100 May 17 11:00:00 ns2 kernel:
> > Shorewall:rfc1918:DROP:IN=eth0 OUT> >
MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 SRC=192.168.0.1
> > DST=255.255.255.255 LEN=120 TOS=0x00 PREC=0x00 TTL=155 ID=51765
PROTO=UDP> > SPT=53581 DPT=61112 LEN=100
> >
> > I dont understand why I am getting these logs
> > Thanks ----Mike
> >
>
> You have ''norfc1918'' set on eth0 and it looks like there
is at least one
> host connected to that through that interface that has an RFC 1918 address
> (192.168.0.1).
>
> -Tom
> --
> Tom Eastep    \ Shorewall - iptables made easy
> Shoreline,     \ http://www.shorewall.net
> Washington USA  \ teastep@shorewall.net
>
>
On Sat, 17 May 2003 11:58:29 -0700, Mike <landers@lanlinecomputers.com> wrote:> Wierd then, the local subnet is 192.168.2.0/24 > Maybe one of the users has added a node without my knowledge. I believe > this is crashing the server got a call this morn and reboot fixed the > problem, the logs are going crazy. I shut off rfc1918 for now until I can > visit the location.You could always just insert a DROP rule for that IP address near the top of /etc/shorewall/rfc1918. -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net
Thanks Tom , I will try that drop rule, sure seems weird, do you think this could have crashed the vpn? Mike ----- Original Message ----- From: "Tom Eastep" <teastep@shorewall.net> To: "Mike" <landers@lanlinecomputers.com>; <shorewall-users@lists.shorewall.net> Sent: Saturday, May 17, 2003 12:02 PM Subject: Re: [Shorewall-users] logs Flooded with Rfc1918> On Sat, 17 May 2003 11:58:29 -0700, Mike <landers@lanlinecomputers.com> > wrote: > > > Wierd then, the local subnet is 192.168.2.0/24 > > Maybe one of the users has added a node without my knowledge. I believe > > this is crashing the server got a call this morn and reboot fixed the > > problem, the logs are going crazy. I shut off rfc1918 for now until Ican> > visit the location. > > You could always just insert a DROP rule for that IP address near the top > of /etc/shorewall/rfc1918. > > -Tom > -- > Tom Eastep \ Shorewall - iptables made easy > Shoreline, \ http://www.shorewall.net > Washington USA \ teastep@shorewall.net > >
On Sat, 17 May 2003 12:10:12 -0700, Mike <landers@lanlinecomputers.com> wrote:> Thanks Tom , > I will try that drop rule, sure seems weird, do you think this could have > crashed the vpn?Don''t see how.... -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net
Just a hunch, but could someone have plugged in a little SOHO router or access point that has an unconfigured DHCP server in it? That would explain the IP address (192.168.0.1 is a common initial setting for SOHO-class gear). The MAC address is in a range assigned to the vendor ''Premax Electronics, Inc'': http://www.shmoo.com/cgi-bin/mac_search.cgi?query=00%3A20%3Ae0 These days Premax is known as Actiontec, which lends credence to the theory. Not sure what udp port 61112 is, though (it''s not listed in http://www.portsdb.org or http://www.iana.org/assignments/port-numbers). Paul> -----Original Message----- > From: shorewall-users-bounces@lists.shorewall.net > [mailto:shorewall-users-bounces@lists.shorewall.net] On Behalf Of Mike > Sent: Saturday, May 17, 2003 11:06 AM > To: shorewall-users@lists.shorewall.net > Subject: [Shorewall-users] logs Flooded with Rfc1918 > > > Getting logs flooded with rfc > May 17 10:59:48 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 > OUT= MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 > SRC=192.168.0.1 DST=255.255.255.255 LEN=120 TOS=0x00 > PREC=0x00 TTL=155 ID=51763 PROTO=UDP SPT=53579 DPT=61112 LEN=100 > May 17 10:59:54 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 > OUT= MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 > SRC=192.168.0.1 DST=255.255.255.255 LEN=120 TOS=0x00 > PREC=0x00 TTL=155 ID=51764 PROTO=UDP SPT=53580 DPT=61112 LEN=100 > May 17 11:00:00 ns2 kernel: Shorewall:rfc1918:DROP:IN=eth0 > OUT= MAC=ff:ff:ff:ff:ff:ff:00:20:e0:36:31:3b:08:00 > SRC=192.168.0.1 DST=255.255.255.255 LEN=120 TOS=0x00 > PREC=0x00 TTL=155 ID=51765 PROTO=UDP SPT=53581 DPT=61112 LEN=100 > > I don''t understand why I am getting these logs > Thanks ----Mike ><snip>