Hi,

On Thu, Jun 28, 2018 at 04:43:13PM +0200, free...@tango.lu wrote:
> Here is some traffic dump (on tap0) run on the Server where 192.168.5.4 
> is the address of the Server on br0:
> 
> 10:14:43.593256 1e:6f:f0:1a:74:2f > 01:00:5e:00:00:01, ethertype IPv4 
> (0x0800), length 46: 0.0.0.0 > 224.0.0.1: igmp query v2
> 10:15:01.674472 1e:6f:f0:1a:74:2f > ff:ff:ff:ff:ff:ff, ethertype ARP 
> (0x0806), length 42: Request who-has 192.168.5.23 tell 192.168.5.4, 
> length 28
> 10:15:16.282724 1e:6f:f0:1a:74:2f > ff:ff:ff:ff:ff:ff, ethertype ARP 
> (0x0806), length 42: Request who-has 192.168.5.56 tell 192.168.5.4, 
> length 28
> 10:16:49.033270 1e:6f:f0:1a:74:2f > 01:00:5e:00:00:01, ethertype IPv4 
> (0x0800), length 46: 0.0.0.0 > 224.0.0.1: igmp query v2
> 10:17:53.572669 1e:6f:f0:1a:74:2f > ff:ff:ff:ff:ff:ff, ethertype ARP 
> (0x0806), length 42: Request who-has 192.168.5.77 tell 192.168.5.4, 
> length 28
> 
> Well this seems normal to me, when the server want to know some IPs it 
> broadcasts to ff:ff:ff:ff:ff:ff and this gets forwarded to all 3 
> networks but you suggest that I should never see this traffic coming in 
> on TAP0 but only on BR0.

Indeed.  It should be "sent out" on br0, and then be bridged *out* tap0 
and tap1, but never come *in* on tap0/tap1.

The problem with generic tcpdump is that you can't see if it went
br0->tap0 or tap0->br0 when sniffing "on tap0".  So my advice was not
overly useful...  (except to confirm "there is multicast activity").

Do the timestamps of the 224.0.0.1 packets correlate to your log 
entries about the machine's own (MAC) address coming in on br0?

> About the multicast I can block it but will not solve the issue, I have 
> tried on the Server:
> 
> iptables -I OUTPUT -o tap0+ -m pkttype --pkt-type multicast -j DROP
> 
> ebtables -A OUTPUT -o tap0+ --pkttype-type multicast -j DROP
> 
> ebtables -A FORWARD -o tap0+ --pkttype-type multicast -j DROP
> ebtables -A FORWARD -i tap0+ --pkttype-type multicast -j DROP

That does the "+" signify at "tap0+"?  I've only ever used exact
interface names in filtering.

Can iptables/ebtables filter on bridge member interfaces?  (Aka: if you
set up the filter on the server side, will it stop the 224.0.0.1 traffic
from reaching the clients?)

[..]
> No effects. Of course I cannot block the broadcast otherwise on the 
> subnets the machines then won't be able to resolve the hwaddresses of 
> the other segments.

Of course.  I do not think the broadcast packets are to blame here 
(because everyone handles these quite reasonably) but multicast.

No IPv6 multicast on your network?

gert
-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to