LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 07-20-2005, 03:56 AM   #1
Linux.tar.gz
Senior Member
 
Registered: Dec 2003
Location: Paris
Distribution: Slackware forever.
Posts: 2,534

Rep: Reputation: 100Reputation: 100
How can we block arp packets?


I have annoying arp flood like this:
19.804989 JuniperN_32:00:c3 -> Broadcast ARP Who has 81.95.88.34? Tell 81.95.88.1
19.805593 JuniperN_32:00:c3 -> Broadcast ARP Who has 81.95.153.33? Tell 81.95.153.1
19.806004 JuniperN_32:00:c3 -> Broadcast ARP Who has 81.95.89.147? Tell 81.95.88.1
etc...
I tried ebtables -A INPUT -p ARP -j DROP, but ARP is still showing in tcpdump and ethereal.

Last edited by Linux.tar.gz; 07-20-2005 at 04:03 AM.
 
Old 07-20-2005, 04:09 AM   #2
keefaz
LQ Guru
 
Registered: Mar 2004
Distribution: Slackware
Posts: 6,552

Rep: Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872
Try :
Code:
ifconfig eth0 -arp
To re-enable arp :
Code:
ifconfig eth0 arp
 
Old 07-20-2005, 04:52 AM   #3
Linux.tar.gz
Senior Member
 
Registered: Dec 2003
Location: Paris
Distribution: Slackware forever.
Posts: 2,534

Original Poster
Rep: Reputation: 100Reputation: 100
It doesn't work .

Last edited by Linux.tar.gz; 09-09-2011 at 02:06 PM.
 
Old 07-20-2005, 06:30 AM   #4
keefaz
LQ Guru
 
Registered: Mar 2004
Distribution: Slackware
Posts: 6,552

Rep: Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872Reputation: 872
What does not work ?
Maybe try :
Code:
/sbin/ip link set dev eth0 arp off
 
Old 07-20-2005, 11:19 AM   #5
Linux.tar.gz
Senior Member
 
Registered: Dec 2003
Location: Paris
Distribution: Slackware forever.
Posts: 2,534

Original Poster
Rep: Reputation: 100Reputation: 100
I still got arp traffic. I tried your next tip too but without success.
 
Old 07-20-2005, 11:39 AM   #6
fr_laz
Member
 
Registered: Jan 2005
Location: Cork Ireland
Distribution: Debian
Posts: 384

Rep: Reputation: 32
Hi,

I would have thought that your ebtables rule would have blocked arp...
maybe you should block in another chain than the input one... have a look at http://ebtables.sourceforge.net/br_f....html#section2 it explains how chains are linked together... maybe blocking at the brouting stage would be more efficient.

still, you'll need to be carefull about blocking arp, since if you're using ethernet you need to be able to resolve IP to MAC equivalences.
 
Old 07-20-2005, 11:51 AM   #7
demian
Member
 
Registered: Apr 2001
Location: Bremen, Germany
Distribution: Debian
Posts: 303

Rep: Reputation: 30
Usually tcpdump and ethereal put the network cards in promiscous mode. You can drop the arp packets all you want they are still floating through your network since arp requests are always sent to the ethernet broadcast address. If you want to swich that off you need to suppress the arp packages in some central location like a switch. That is, however, a very bad idea since it will render your network non-funtional unless you have static arp tables on all clients.
 
Old 09-07-2011, 06:35 AM   #8
michael_c
LQ Newbie
 
Registered: Aug 2010
Posts: 3

Rep: Reputation: 0
I don't know if this was resolved but I found the solution, here is an example http://www.usermadetutorials.com/201...ith-arptables/

Thanks.
 
Old 09-07-2011, 03:40 PM   #9
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,991

Rep: Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628
I think the OP didn't know that arp is normal and needed. You don't want to stop those messages.
 
Old 09-09-2011, 02:09 PM   #10
Linux.tar.gz
Senior Member
 
Registered: Dec 2003
Location: Paris
Distribution: Slackware forever.
Posts: 2,534

Original Poster
Rep: Reputation: 100Reputation: 100
At this time, i had no clear idea what arp is.

Anyway, i always wonder if it's possible to "firewall" these .
 
Old 09-09-2011, 04:01 PM   #11
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,991

Rep: Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628Reputation: 3628
Possible in a number of ways but not really ever used. I doubt anyone ever has a real system that is trying to block them. Some switches may have been configured with a sort of speedometer limit that blocks any or all types of traffic when traffic reaches a pre-set number. Say when http or tcp traffic gets to 60% then block all other until limit drops. At a box you could only ignore them but that doesn't help traffic. You'd only get a very very small processor increase for that task. May even result in more cpu time I'd think.

Last edited by jefro; 09-09-2011 at 04:03 PM.
 
Old 09-11-2011, 04:02 PM   #12
devwatchdog
Member
 
Registered: Jan 2010
Posts: 202

Rep: Reputation: 47
Quote:
Originally Posted by Linux.tar.gz View Post
At this time, i had no clear idea what arp is.

Anyway, i always wonder if it's possible to "firewall" these .
Look at your arp table:

Code:
arp -n
Then look at the volume of arp request flowing through that interface. I'm guessing it has _zero_ effect on the arp entries you see.

That interface you're monitoring will only answer for arp requests for whatever IP addresses are assigned to it. Otherwise, it just doesn't matter. In order for someone to start poking around that interface, they'll have to have access to something within the broadcast domain assigned to that network.

In reality, all that entity would have to do is put their interface in promiscuous mode, sniff traffic, and wait. They'll see your arp request flowing through at one point or another.

That interface looks like a WAN interface on a firewall. Here is the capture of just a few seconds on my firewall on the WAN:

Code:
thalna:~# tcpdump -nni eth1 arp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
20:54:59.382512 ARP, Request who-has 97.88.251.146 tell 97.88.251.145, length 46
20:54:59.552278 ARP, Request who-has 10.255.75.123 tell 10.255.75.113, length 46
20:54:59.743093 ARP, Request who-has 24.241.226.214 tell 24.241.224.1, length 46
20:54:59.862786 ARP, Request who-has 71.82.217.103 tell 71.82.217.1, length 46
20:55:00.476806 ARP, Request who-has 96.42.47.122 tell 96.42.44.1, length 46
20:55:00.613009 ARP, Request who-has 71.87.113.192 tell 71.87.112.1, length 46
20:55:00.789301 ARP, Request who-has 10.115.183.106 tell 10.115.180.1, length 46
20:55:00.965593 ARP, Request who-has 24.241.227.254 tell 24.241.224.1, length 46
20:55:01.114349 ARP, Request who-has 68.190.88.109 tell 68.190.88.1, length 46
20:55:01.554561 ARP, Request who-has 24.241.225.29 tell 24.241.224.1, length 46
20:55:01.560553 ARP, Request who-has 24.241.225.36 tell 24.241.224.1, length 46
20:55:01.616645 ARP, Request who-has 68.190.126.44 tell 68.190.126.1, length 46
20:55:01.965243 ARP, Request who-has 10.115.183.59 tell 10.115.180.1, length 46
^C
13 packets captured
13 packets received by filter
0 packets dropped by kernel
That doesn't concern me in the least.

Code:
thalna:~# arp -n
Address                  HWtype  HWaddress           Flags Mask            Iface
10.178.23.111            ether   00:90:96:00:00:01   C                     eth0
23.233.126.1             ether   00:1b:d5:fe:c9:d9   C                     eth1
192.168.1.100            ether   00:1b:d5:fe:c9:d9   C                     eth1
192.168.23.20            ether   00:06:28:fa:32:e0   C                     eth3
That's been sanitized for my protection. Odd seeing the entry for the 192.168.1.100 host in there, that's on a IPSEC VPN tunnel. Guess I never really looked all that closely to the arp table.

Anyhow, there are considerably more important things to be concerned with. You could isolate accepted arp entries to the known gateway if you have a static IP and you never expect the network config to change, but that seems overboard. I'm paranoid. I don't like offering anything up via public services, because I've worked in the security sector, and know what can come of publicly available services.

But, to your credit, there are ways to poison arp entries, so there is some merit. I haven't looked at that vector in a while, but it is possible to inject bogus arp entries and set up a 'man in the middle' attack.

I dunno. I work now in a NOC that monitors a huge number of networks, and have seen the passwords on publicly accessible devices. They're not exactly challenging to guess. I'd be ashamed of the user/password combinations I've seen. For one of our clients, I'd say 50% of them are easily accessed. Nothing new, trust me, as those mindless practices have been around forever. Those devices would be a good platform from which one could devise a method, I suppose. Those devices are limited in their ability to capture traffic, but someone resourceful might be able to come up with something that would work. Might be able to devise a method of flashing a more capable firmware to do the job.

Hell. Yeah, definitely some merit.

But I'm paranoid. Big time.

Unfortunately, my paranoia isn't more common.

Oh, and something I thought I would add is that even though you see those arp request flowing in on that interface, the only ones your system will be the arp requests for your particular IP(s). It isn't responding to the rest of them. Also, even if you were filtering them, you will still see them coming in on the interface. There really isn't a way to stop them, well, if you don't have control over the upstream device. All the traffic I filter on my firewall inbound on the WAN still gets to it, it just drops it. That's just how they work.

Last edited by devwatchdog; 09-11-2011 at 04:29 PM.
 
Old 09-12-2011, 07:13 AM   #13
Linux.tar.gz
Senior Member
 
Registered: Dec 2003
Location: Paris
Distribution: Slackware forever.
Posts: 2,534

Original Poster
Rep: Reputation: 100Reputation: 100
! Thanks all for your responses !

+1 ^^
 
Old 09-13-2011, 02:18 AM   #14
wallacekeynes321
LQ Newbie
 
Registered: Sep 2011
Posts: 2

Rep: Reputation: Disabled
Usually tcpdump in addition to aeriform put the community cards in promiscous manner. You may shed a arp boxes all you need they may be still hanging as a result of your community considering arp needs will almost always be ship to this ethernet broadcast address. If you would like swich that off you need to control the actual arp deals in a few location being a transition. That is certainly, even so, an incredibly poor plan mainly because it will establish your multilevel non-funtional if you can't include fixed arp platforms on all of customers.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
What are ARP packets? abefroman Linux - Security 2 05-23-2005 12:52 AM
Flooded by ARP packets pymehta Linux - Networking 4 04-15-2005 07:46 AM
my network is flooded with ARP packets !? qwijibow Linux - Security 16 11-03-2004 10:32 AM
Why am I flooding my network with ARP packets? DocKarl Linux - Networking 0 05-07-2004 06:47 AM
Arp packets and Wifi Promisc mode SirSlappy Linux - Security 1 12-06-2003 10:02 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 04:24 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration