Closed Handsome1080P closed 2 years ago
Is this the client or server? Seems that there is something that is attempting to connect to Phantun, you can tcpdump
to figure out what it is.
It shouldn't affect the performance of Phantun, but certainly annoying.
It's client log,I using tcpdump to capture the Phantun interface but not see some unusual logs.Only server ip to the client peer ip and client peer ip to server ip.
It's client log,I using tcpdump to capture the Phantun interface but not see some unusual logs.Only server ip to the client peer ip and client peer ip to server ip.
Only got this log from tcpdump.This tunnel I have not set the ipv6 address,but there are some ipv6 connection logs.But the another one I using ipv6 will get the same unknown tcp packages logs too.The two phantun one using ipv4 endpoint,one using ipv6 endpoint and different ports.So its so weird.
11:35:03.208074 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 45) server_ip.25565 > 10.221.0.2.55350: Flags [.], cksum 0x4700 (correct), seq 543164463:543164468, ack 1856256, win 65535, length 5 11:35:04.753562 IP6 (flowlabel 0x361bf, hlim 1, next-header UDP (17) payload length: 345) fe80::898d:d31a:959f:b940.65116 > ff12::8384.21027: [udp sum ok] UDP, length 337
IPv6 packets are auto ignored so they should not be a problem. You log says the unknown TCP packets are from 10.221.0.1:37892
but the dump does not seems to be from that address. Maybe something else is connecting to Phantun from the machine that is running it (10.221.0.1
in this case)?
How often do those Unknown TCP packet
logs appear? Do they appear consistently or just sometimes? It will be helpful if you can capture one of these actual packets that's causing RST and the RST with it.
IPv6 packets are auto ignored so they should not be a problem. You log says the unknown TCP packets are from
10.221.0.1:37892
but the dump does not seems to be from that address. Maybe something else is connecting to Phantun from the machine that is running it (10.221.0.1
in this case)?How often do those
Unknown TCP packet
logs appear? Do they appear consistently or just sometimes? It will be helpful if you can capture one of these actual packets that's causing RST and the RST with it.
I have set the tcpdump filter to RST to background,I will show u if there is a result.The unknown tcp packages logs appear irregular.
If that is the case then it is probably no cause for alarm. Occasional RSTs shouldn't cause any performance issue anyway.
I suspect it is something trying to connect to Phantun on the local machine, but only capture can tell what it actually is.
If that is the case then it is probably no cause for alarm. Occasional RSTs shouldn't cause any performance issue anyway.
I suspect it is something trying to connect to Phantun on the local machine, but only capture can tell what it actually is.
It's true,there are some spam ips try to connect my client,== .It seems IGMP,I will try to use Iptables reject them
root@cisco:~# tcpdump -i phan2 -vv tcp[tcpflags] == 'tcp-rst' tcpdump: listening on phan2, link-type RAW (Raw IP), capture size 262144 bytes 12:13:35.376710 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 239.255.255.250.1900 > 10.221.0.1.20759: Flags [R], cksum 0xbc12 (correct), seq 1294816069, win 65535, length 0 12:13:35.379287 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 239.255.255.250.1900 > 10.221.0.1.34939: Flags [R], cksum 0x84ae (correct), seq 1294816069, win 65535, length 0 12:13:35.385842 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) igmp.mcast.net.0 > 10.221.0.1.37892: Flags [R], cksum 0x30e7 (correct), seq 1, win 65535, length 0 12:13:36.377919 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) igmp.mcast.net.0 > 10.221.0.1.37892: Flags [R], cksum 0x30e7 (correct), seq 1, win 65535, length 0 12:13:45.398074 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) igmp.mcast.net.0 > 10.221.0.1.37892: Flags [R], cksum 0x30e7 (correct), seq 1, win 65535, length 0 12:13:45.721922 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) igmp.mcast.net.0 > 10.221.0.1.37892: Flags [R], cksum 0x30e7 (correct), seq 1, win 65535, length 0
Looks like https://en.wikipedia.org/wiki/Simple_Service_Discovery_Protocol. It shouldn't cause any harm
If you are really annoyed you can drop all multicast IP addresses on iptables
when forwarding to Phantun.
Looks like https://en.wikipedia.org/wiki/Simple_Service_Discovery_Protocol. It shouldn't cause any harm
If you are really annoyed you can drop all multicast IP addresses on
iptables
when forwarding to Phantun.
thx a lot
Client got a lot of this logs,I don't know it's normal or not.