» »

Čuden icmp request

Čuden icmp request

Domini ::

LP

Mene zanima kaj je icmp 224.0.0.1 request? V wallwatcherju sem opazil ta icmp request na enega od računalnikou v mojem omrežju. Zanimivo je da se to dogaja samo na enem računalniku, ko na drugih dveh tega ni.
Malo sem že pogooglou in naj bi bil to nek Router Discovery, pa tudi multicast, ....
V services na tistem računalniku sem te zadeve use izklopil pa se to še zmeraj dogaja + na mojem routerju sem blokiral icmp ter dodal custom firewall scripto , ki gre nekako takole :

#!/bin/sh

#
# Warning! As I don't use Emule or similiar programs I can't guaranty their function.
# If you find a workable solution just add it to this wiki.
# I found testing some of the setting manually that the ipfrag settings will break emule,
# maybe some others too...
#
# Enjoy your enhanced security,
#
# St. Karitzl
# info@user1.walztech.de
# http://daywalker81.de.vu

echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
echo 1 > /proc/sys/net/ipv4/ip_forward

# the following two parametes will break at least emule and are way too low to make sense.
#echo 1024 > /proc/sys/net/ipv4/ipfrag_high_thresh
#echo 512 > /proc/sys/net/ipv4/ipfrag_low_thresh
echo 64000 > /proc/sys/net/ipv4/ipfrag_high_thresh
echo 48000 > /proc/sys/net/ipv4/ipfrag_low_thresh
#

echo 10 > /proc/sys/net/ipv4/ipfrag_time
echo 5 > /proc/sys/net/ipv4/icmp_ratelimit
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
echo 0 > /proc/sys/net/ipv4/conf/vlan0 eth1 /accept_source_route
echo 0 > /proc/sys/net/ipv4/conf/vlan0 eth1 /accept_redirects
echo 1 > /proc/sys/net/ipv4/conf/vlan0 eth1 /log_martians
echo 10 > /proc/sys/net/ipv4/neigh/vlan0 eth1 /locktime
echo 0 > /proc/sys/net/ipv4/conf/vlan0 eth1 /proxy_arp
echo 50 > /proc/sys/net/ipv4/neigh/vlan0 eth1 /gc_stale_time

#
# The following entries secure the last bit and provide a
# moderate protection against man-in-the-middle attacks.
#

echo 0 > /proc/sys/net/ipv4/conf/eth1/send_redirects
echo 0 > /proc/sys/net/ipv4/conf/eth1/secure_redirects
echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
echo 5 > /proc/sys/net/ipv4/igmp_max_memberships
echo 2 > /proc/sys/net/ipv4/igmp_max_msf
echo 1024 > /proc/sys/net/ipv4/tcp_max_orphans
echo 2 > /proc/sys/net/ipv4/tcp_syn_retries
echo 2 > /proc/sys/net/ipv4/tcp_synack_retries
echo 1 > /proc/sys/net/ipv4/tcp_abort_on_overflow
echo 10 > /proc/sys/net/ipv4/tcp_fin_timeout
echo 0 > /proc/sys/net/ipv4/route/redirect_number
echo 1 > /proc/sys/net/ipv4/conf/all/rp_filter
echo 1 > /proc/sys/net/ipv4/conf/eth1/rp_filter
echo 1 > /proc/sys/net/ipv4/tcp_syncookies
echo 0 > /proc/sys/net/ipv4/conf/all/accept_source_route
echo 61 > /proc/sys/net/ipv4/ip_default_ttl

# DoS protection by tweaking the timeouts
echo "1800" > /proc/sys/net/ipv4/tcp_keepalive_time
echo "0" > /proc/sys/net/ipv4/tcp_window_scaling
echo "0" > /proc/sys/net/ipv4/tcp_sack

# We pretend to be a Checkpoint firewall on Windows XP
echo 4096 87380 4194304 >/proc/sys/net/ipv4/tcp_rmem
echo 4096 87380 4194304 >/proc/sys/net/ipv4/tcp_wmem

# Check network overload (explicit congestion notification)
echo 1 > /proc/sys/net/ipv4/tcp_ecn

# Change port range for outgoing traffic
echo "30000 60000" > /proc/sys/net/ipv4/ip_local_port_range

# Change default queue size
# Modified for DD-WRT because of missing proc entries

echo 4096 > /proc/sys/net/ipv4/ip_conntrack_max

# LED signal feedback when script ends
sleep 1
gpio enable 3
sleep 1
gpio disable 3
sleep 1
gpio enable 3
sleep 1
gpio disable 2
sleep 1
gpio enable 2
sleep 1
gpio disable 2

# If you'd like to disable the web interface uncomment
# the following line
#killall httpd

Kakor sem tudi zasledil ta icmp naj nebi bil kaj preveč varen. Če mi lahko kdo razloži to zadevo, in kako naj se tega icmpja znebim.

LP
Asus Rampage Formula X48, Core 2 Quad Q9300, Ballistic Tracer Black 2Gb 1066,
Asus Nvidia GTX280 1GB, Western Digital 750GB, Thermaltake Shark, LC8850 850W

Izi ::

Class A 0.0.0.0 - 127.255.255.255
Class B 128.0.0.0 - 191.255.255.255
Class C 192.0.0.0 - 223.255.255.255
Multicast 224.0.0.0 - 239.255.255.255
Rezervirano 240.0.0.0 - 247.255.255.255

Teli naslovi niso dodeljeni nikomur posebej zato ne skrbi če vidiš katerega od njih.
Konkretno 224.0.0.1 je enako "all hosts", če pingaš ta naslov bo prošnja za odgovor poslana prav na vse računalnike hkrati, ki jih imaš v svojem omrežju.
224.0.0.2 je enako "all-routers" ...

Se pravi ti naslovi so rezervirani za lokalne zadeve in naj te nič ne skrbijo.
Verjetno samo tvoj računalnik preverja če so v tvojem lokalnem omrežju priključeni še kakšni drugi računalniki.

Domini ::

Zanimivo, poučno, ... hvala za razlago Izi

LP
Asus Rampage Formula X48, Core 2 Quad Q9300, Ballistic Tracer Black 2Gb 1066,
Asus Nvidia GTX280 1GB, Western Digital 750GB, Thermaltake Shark, LC8850 850W


Vredno ogleda ...

TemaSporočilaOglediZadnje sporočilo
TemaSporočilaOglediZadnje sporočilo
»

Linux CC kot router... problem

Oddelek: Operacijski sistemi
141728 (1480) kitarist
»

Problemi z mrežo in morda še čim

Oddelek: Omrežja in internet
7932 (771) frenk
»

pomoč pri iptables

Oddelek: Omrežja in internet
102606 (2435) HellRaiseR
»

iptables skripta

Oddelek: Omrežja in internet
72119 (1899) karafeka
»

DEBIAN problem

Oddelek: Omrežja in internet
161824 (1634) AirBladE

Več podobnih tem