Alexander,

On Thu, Nov 10, 2011 at 12:42:15PM -0500, Alexander Wittig wrote:
A> > Can you try attached patch. It reduces severity level of all ARP
A> > messages, that can be triggered by packet on network, with expection to
A> > "using my IP address".
A> > 
A> > With default syslog.conf, now ARP errors won't get to console.
A> > 
A> > Also, the multicast message lacked "\n" newline character, that's why,
A> > I suppose, syslogd failed to coalesce a number of messages into a single
A> > entry "last message repeated X times".
A> 
A> Thank you very much for the patch, and for making this particular message a 
bit more helpful by including the MAC address.
A> I tried it and indeed it stops the messages from going to the console. But 
the default syslog.conf still logs each one in /var/log/messages and they also 
show up in dmsg output. These happen quite frequently, so even on a not so busy 
network they will drown out almost everything else going on in dmsg or 
/var/log/messages. Unfortunately, having two (or more) different machines use 
these will prevent syslogd from combining messages into "last message repeated 
X times":
A> 
A> /var/log/messages:
A> [...]
A> Nov 10 12:23:44 bt kernel: in_arp: 03:bf:23:09:44:e4 is multicast
A> Nov 10 12:23:44 bt kernel: in_arp: 03:bf:23:09:44:87 is multicast
A> Nov 10 12:25:45 bt kernel: in_arp: 03:bf:23:09:44:e4 is multicast
A> Nov 10 12:25:45 bt kernel: in_arp: 03:bf:23:09:44:87 is multicast
A> [...]

Okay, I will apply patch.

A> I'm not an expert on networking, but is this condition of ignoring such an 
ARP packet really a noteworthy event? I.e. is this something that should not 
occur in "normal" operation according to the ARP specifications? If this is 
mostly for kernel developers, maybe it should only be enabled in debug kernel 
builds?

Nope, this isn't for kernel developers only but for sysadmins. Some bad traffic 
is present in your
network, and it should be noticed by sysadmin, that's why LOG_NOTICE severity 
left.

However, I understand how annoying it is when you are in a bad network, you 
don't admin it, you
can't fix it and your logging system is too chatty. I am thinking of some 
generic way of supperssing
or ratelimiting all logged events that can be triggered by host on LAN or even 
by remote host.


-- 
Totus tuus, Glebius.
_______________________________________________
freebsd-net@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Reply via email to