More Related Content
Similar to #pakeana 14(20)
More from @ otsuka752(20)
#pakeana 14
- 3. about me
• @twovs
• ネコ2人+奥さん1人+可愛い娘
• 無線LAN装置の開発(1999~2004)• 無線LAN装置の開発(1999~2004)
• オンラインゲームのシステム管理者(2004~)
• ただし,ゲームには全く興味無し
• ZFS 最高 !!! beadm 便利 !!!
- 9. Case#1
[1]# tcpdump -n -t -i eth0 not port 22
ARP, Request who-has 192.168.3.2 tell 192.168.3.1, length 46
ARP, Reply 192.168.3.2 is-at 08:00:27:75:6f:fc, length 46 (*1)
IP 192.168.3.1 > 192.168.3.2: ICMP echo request, id 16388, seq 1, length 64
IP 192.168.3.2 > 192.168.3.1: ICMP echo reply, id 16388, seq 1, length 64
IP 192.168.3.1 > 192.168.3.2: ICMP echo request, id 16388, seq 2, length 64
IP 192.168.3.2 > 192.168.3.1: ICMP echo reply, id 16388, seq 2, length 64
[2]# tcpdump -n -t -i eth0 not port 22
ARP, Request who-has 192.168.3.2 tell 192.168.3.1, length 46
ARP, Reply 192.168.3.2 is-at 08:00:27:75:6f:fc, length 28 (*2)
IP 192.168.3.1 > 192.168.3.2: ICMP echo request, id 16388, seq 1, length 64
IP 192.168.3.2 > 192.168.3.1: ICMP echo reply, id 16388, seq 1, length 64
IP 192.168.3.1 > 192.168.3.2: ICMP echo request, id 16388, seq 2, length 64
IP 192.168.3.2 > 192.168.3.1: ICMP echo reply, id 16388, seq 2, length 64
• これは正常時のパケット
- 10. Case#1
[1]# tcpdump -n -t -i eth0 not port 22
ARP, Request who-has 192.168.3.2 tell 192.168.3.1, length 46
ARP, Request who-has 192.168.3.2 tell 192.168.3.1, length 46
ARP, Request who-has 192.168.3.2 tell 192.168.3.1, length 46
• ARP Request に応答なし
• 繫がっていないんじゃね…?
• おい,ケーブル抜けてるぞ!!!
- 13. Case#2
[1]# tcpdump -n -t -i eth0 not port 22
ARP, Request who-has 192.168.3.2 tell 192.168.3.1, length 46
ARP, Reply 192.168.3.2 is-at 08:00:27:75:6f:fc, length 46
IP 192.168.3.1 > 192.168.3.2: ICMP echo request, id 25348, seq 1, length 64
IP 192.168.3.1 > 192.168.3.2: ICMP echo request, id 25348, seq 2, length 64
• ARP Request に応答(Reply)あり
• 192.168.3.2 のサーバは動いてる
• ICMP がフィルタされてるんじゃね?
- 16. Case#3
[1]# tcpdump -n -t -i eth0
IP6 fe80::1 > ff02::1:ff00:2: ICMP6, neighbor solicitation, who has fe80::2, length 32
IP6 fe80::2 > fe80::1: ICMP6, neighbor advertisement, tgt is fe80::2, length 32
IP6 fe80::1.56414 > fe80::2.ssh: Flags [S], seq 3767421192, win 14400, options [mss
IP6 fe80::2.ssh > fe80::1.56414: Flags [S.], seq 3283559780, ack 3767421193, win 14280,
IP6 fe80::1.56414 > fe80::2.ssh: Flags [.], ack 1, win 225, options [nop,nop,TS val
IP6 fe80::2.ssh > fe80::1.56414: Flags [P.], seq 1:22, ack 1, win 224, options
IP6 fe80::1.56414 > fe80::2.ssh: Flags [.], ack 22, win 225, options [nop,nop,TS valIP6 fe80::1.56414 > fe80::2.ssh: Flags [.], ack 22, win 225, options [nop,nop,TS val
IP6 fe80::1.56414 > fe80::2.ssh: Flags [P.], seq 1:22, ack 22, win 225, options
IP6 fe80::2.ssh > fe80::1.56414: Flags [.], ack 22, win 224, options [nop,nop,TS val
IP6 fe80::1.56414 > fe80::2.ssh: Flags [P.], seq 22:814, ack 22, win 225, options
IP6 fe80::2.ssh > fe80::1.56414: Flags [.], ack 814, win 248, options [nop,nop,TS val
IP6 fe80::2.ssh > fe80::1.56414: Flags [P.], seq 22:806, ack 814, win 248, options
• これは正常時のパケット
- 17. Case#3
[1]# tcpdump -n -t -i eth0
IP6 fe80::1 > ff02::1:ff00:2: ICMP6, neighbor solicitation, who has fe80::2, length 32
IP6 fe80::1 > ff02::1:ff00:2: ICMP6, neighbor solicitation, who has fe80::2, length 32
IP6 fe80::1 > ff02::1:ff00:2: ICMP6, neighbor solicitation, who has fe80::2, length 32
• neighbor solicitation に応答なし
• ICMPv6 フィルタしてるんじゃね?
- 20. Case#4
• Server#1 で tcpdump
ARP, Reply 192.168.3.2 is-at 08:00:27:75:6f:fc, length 46
• Server#2 で tcpdump• Server#2 で tcpdump
ARP, Reply 192.168.3.2 is-at 08:00:27:75:6f:fc, length 28
Ethernet Header(14(6+6+2)Byte)が含まれていない
Wireshark では 60(46+14)または 42(28+14)と表示される
- 25. Case#5
[server]# tcpdump -nn -t -i eth0 port 80 | grep "length [0-9]{5,}"
(snip)
IP (snip) Flags [.], seq 12701:14851, ack 0, win 15544, length 12150
IP (snip) Flags [.], seq 12701:13501, ack 0, win 15544, length 10800
IP (snip) Flags [.], seq 12701:13501, ack 1, win 15544, length 10800
IP (snip) Flags [.], seq 12370:44520, ack 0, win 15544, length 12150
IP (snip) Flags [.], seq 10801:21601, ack 0, win 15544, length 10800
IP (snip) Flags [.], seq 11565:14065, ack 1, win 15544, length 13500IP (snip) Flags [.], seq 11565:14065, ack 1, win 15544, length 13500
IP (snip) Flags [.], seq 65416:88366, ack 0, win 15544, length 22950
IP (snip) Flags [.], seq 68116:96466, ack 0, win 15544, length 28350
IP (snip) Flags [.], seq 68116:80266, ack 0, win 15544, length 12150
IP (snip) Flags [.], seq 44696:16846, ack 0, win 15544, length 12150
• MTU = 1500[Byte] なのに…???
- 27. まとめ
1. LAN ケーブルささってる?
2. Windows FireWall (とか)動いてない?
3. ICMPv6 フィルタしない!3. ICMPv6 フィルタしない!
4. 内部で見てる? 外部で見てる?
5. 物理サーバ? 仮想サーバ? に注意