On Fri, Jan 29, 2010 at 10:51 AM, James Smallacombe <u...@3.am> wrote:

> Some updates that may confuse more than inform: I caught this while it was
> happening yesterday and was able to do a tcpdump.  I saw a ton of UDP
> traffic outbound to one IP that turned out to be a colocated server in
> Chicago.  I put that IP in my ipfw rules and once I blocked "any to" that
> IP, it seemed to stop.  Since then however, the logs have show the same
> issue again and there have been a few brief service disruptions.
>
> Today's security run output showed this:
>
> +(RULE NUMBER) 16054161 131965203420 deny ip from any to (blocked IP)
>
> and more alarmingly, this:
>
> kernel log messages:
> +++ /tmp/security.BErFHSS3      2010-01-29 03:09:32.000000000 -0500
> +re0: link state changed to DOWN
> +re0: link state changed to UP
> +re0: promiscuous mode enabled
> +re0: promiscuous mode disabled
> +re0: promiscuous mode enabled
> +re0: promiscuous mode disabled
> +re0: promiscuous mode enabled
> +re0: promiscuous mode disabled
>
> re0 obviously being the Realtek Ethernet driver.  The server itself never
> went down during this time, but the Ethernet did.  Is there any DOS type of
> event that could cause this, or could the root of the problem be an Ethernet
> hardware or driver issue?  Again, it is not clear to me which is the cause
> and which is the effect.
>
> Last bit of info:  I just did a: 'tcpdump -n | grep -i udp' and saw a bunch
> of these, coming up a couple of times per second:
>

promiscuous mode entries are caused by tcpdump

-- 
Adam Vande More
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to