https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283380

--- Comment #4 from Joerg Goltermann <j...@osn.de> ---
(In reply to Zhenlei Huang from comment #3)

Unfortunately, this doesn't solve our issue. Promiscuous mode is not enabled
during normal operation.

The reason we filed the report was that we received a message from the NOC of a
major peering exchange informing us about this problem. They found duplicate IP
packets with our MAC address on their peering network.


# tcpdump --no-promiscuous-mode -netttti vtnet2 host 146.185.xx.yy
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on vtnet2, link-type EN10MB (Ethernet), snapshot length 262144 bytes
2024-12-18 07:10:31.949435 fc:0a:81:xx:yy:zz > 48:f8:db:xx:yy:zz, ethertype
IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx.yy.33824: Flags [.],
ack 746869960, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697],
length 0
2024-12-18 07:10:31.949443 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype
IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx:yy.33824: Flags [.],
ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0
2024-12-18 07:10:31.949529 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype
IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx:yy.33824: Flags [.],
ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0

2024-12-18 07:10:31.949601 fc:0a:81:xx:yy:zz > 48:f8:db:xx:yy:zz, ethertype
IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.],
seq 1919842898:1919842928, ack 2070174457, win 501, options [nop,nop,TS val
2879849874 ecr 1086851336], length 30
2024-12-18 07:10:31.949605 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype
IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.],
seq 0:30, ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336],
length 30
2024-12-18 07:10:31.949702 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype
IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.],
seq 0:30, ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336],
length 30


interface state during the run of the tcpdump:

# ifconfig vtnet2 | grep flags
vtnet2: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0
mtu 1500
#

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to