Auteur Sujet: [Demi-Résolu] Icotera - Déconnexion / Micro-coupures - Problème LAN/WAN  (Lu 32571 fois)

0 Membres et 2 Invités sur ce sujet

Superpicsou

  • Abonné Free fibre
  • *
  • Messages: 308
  • Feuguerolles-Bully (14)
    • Cloud Illustrations
Perte de la résolution des DNS (mac ocs)
« Réponse #84 le: 13 avril 2022 à 11:04:54 »
Citer
sudo tcpdump -ne ether broadcast or ether multicast
sudo tcpdump -ne ether broadcast or ether multicast                                                                                                                                                                                      130 ↵
tcpdump: data link type PKTAP
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pktap, link-type PKTAP (Apple DLT_PKTAP), capture size 262144 bytes
11:02:50.089269 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:50.429044 c4:04:15:5c:59:43 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c604:15ff:fe5c:5943 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:50.559843 00:1e:80:80:1d:3c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:324 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:50.994704 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.58 tell 192.168.1.36, length 46
11:02:51.167760 84:1b:5e:da:07:97 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::861b:5eff:feda:797 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:51.240456 a0:ce:c8:e7:d4:23 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 86: 192.168.1.15.57621 > 192.168.1.255.57621: UDP, length 44
11:02:51.556508 00:1e:80:1d:7b:69 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:369 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:51.850348 c0:ff:d4:88:2e:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c2ff:d4ff:fe88:2e25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:51.994277 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
11:02:52.302876 00:1e:80:93:a9:84 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:302 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:52.850286 c0:ff:d4:88:2e:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c2ff:d4ff:fe88:2e25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:52.994412 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.56 tell 192.168.1.36, length 46
11:02:54.346002 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
11:02:54.994359 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.26 tell 192.168.1.36, length 46
11:02:55.210173 c0:ff:d4:88:2e:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c2ff:d4ff:fe88:2e25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:55.329558 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
11:02:55.445354 a4:2b:8c:92:87:6b > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:176 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:02:55.819222 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
11:02:56.198615 00:1e:80:9b:2f:90 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 86: 92.118.99.232.38706 > 224.0.0.251.5353: 10405 PTR (QM)? 192.168.1.202.in-addr.arpa. (44)
11:02:56.210141 c0:ff:d4:88:2e:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c2ff:d4ff:fe88:2e25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
^C
20 packets captured
46 packets received by filter
0 packets dropped by kernel
Citer
sudo tcpdump -ne ether broadcast or ether multicast | grep -v 192.168.1
sudo tcpdump -ne ether broadcast or ether multicast | grep -v 192.168.1

tcpdump: data link type PKTAP
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pktap, link-type PKTAP (Apple DLT_PKTAP), capture size 262144 bytes
11:03:05.122274 e8:fc:af:7b:4d:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe7b:4d25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:05.180401 60:31:97:7a:84:da > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 45.83.231.254 tell 45.83.228.34, length 46
11:03:05.332269 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
11:03:05.916799 c4:04:15:5c:59:43 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c604:15ff:fe5c:5943 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:06.122072 e8:fc:af:7b:4d:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe7b:4d25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:06.331304 00:1e:80:74:92:d8 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 173: fe80::21e:80ff:fe74:92d8.546 > ff02::1:2.547: dhcp6 renew
11:03:08.090866 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:08.347278 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
11:03:09.058254 00:1e:80:80:1d:3c > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 130: fe80::21e:80ff:fe80:1d3c > ff02::16: HBH ICMP6, multicast listener report v2, 3 group record(s), length 68
11:03:09.410066 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
11:03:10.347513 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
11:03:10.651923 e8:fc:af:7b:4d:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe7b:4d25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:10.683224 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 45.83.230.126.36593 > 224.0.0.251.5353: 19295 PTR (QM)? 21.0.168.192.in-addr.arpa. (43)
11:03:11.019380 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 45.83.230.126.39895 > 224.0.0.251.5353: 19307 PTR (QM)? 22.0.168.192.in-addr.arpa. (43)
11:03:11.435360 00:1e:80:80:1d:3c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:324 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:11.789693 b0:b9:8a:c1:5f:2f > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Announcement 45.83.230.17, length 46
11:03:13.588159 00:1e:80:74:7b:98 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::21e:80ff:fe74:7b98 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
11:03:15.342234 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
11:03:16.217310 c4:04:15:5c:59:6d > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:e5 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:16.351815 e8:fc:af:7b:4d:25 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe7b:4d25 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:18.796584 c4:04:15:5c:59:43 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c604:15ff:fe5c:5943 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:18.808469 04:a1:51:d7:78:d1 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::6a1:51ff:fed7:78d1 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:19.023960 00:1e:80:7b:90:e8 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: fe80::21e:80ff:fe7b:90e8 > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
11:03:21.174697 a4:2b:8c:92:87:6b > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::a62b:8cff:fe92:876b > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:21.406054 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
11:03:21.416469 c4:04:15:5c:59:43 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::c604:15ff:fe5c:5943 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:22.091062 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:22.099262 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 45.83.230.126.48360 > 224.0.0.251.5353: 19311 PTR (QM)? 51.0.168.192.in-addr.arpa. (43)
11:03:22.174618 a4:2b:8c:92:87:6b > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::a62b:8cff:fe92:876b > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:22.211160 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 86: 45.83.230.126.42266 > 224.0.0.251.5353: 19315 PTR (QM)? 155.0.168.192.in-addr.arpa. (44)
11:03:22.491306 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 45.83.230.126.53035 > 224.0.0.251.5353: 19325 PTR (QM)? 22.0.168.192.in-addr.arpa. (43)
11:03:25.125391 a0:ce:c8:e7:d4:23 > 33:33:ff:91:6f:e4, ethertype IPv6 (0x86dd), length 86: fe80::1cad:a9ba:b708:6d54 > ff02::1:ff91:6fe4: ICMP6, neighbor solicitation, who has fe80::120d:7fff:fe91:6fe4, length 32
11:03:25.345440 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
11:03:25.559734 00:1e:80:1d:7b:69 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:369 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:26.119772 a0:ce:c8:e7:d4:23 > 33:33:ff:91:6f:e4, ethertype IPv6 (0x86dd), length 86: fe80::1cad:a9ba:b708:6d54 > ff02::1:ff91:6fe4: ICMP6, neighbor solicitation, who has fe80::120d:7fff:fe91:6fe4, length 32
11:03:27.130048 a0:ce:c8:e7:d4:23 > 33:33:ff:91:6f:e4, ethertype IPv6 (0x86dd), length 86: fe80::1cad:a9ba:b708:6d54 > ff02::1:ff91:6fe4: ICMP6, neighbor solicitation, who has fe80::120d:7fff:fe91:6fe4, length 32
11:03:29.128921 e0:10:7f:2c:73:d0 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Probe 185.238.5.252, length 46
11:03:30.133824 00:1e:80:80:1d:3c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:324 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:30.842680 84:1b:5e:da:0e:e5 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 2.59.239.254 tell 2.59.236.252, length 46
11:03:32.115892 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
11:03:33.695856 00:1e:80:7b:66:d0 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:29a > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:34.083110 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 86: 45.83.230.126.53792 > 224.0.0.251.5353: 19347 PTR (QM)? 154.0.168.192.in-addr.arpa. (44)
11:03:34.092280 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:34.494534 00:1e:80:1e:78:71 > 33:33:ff:1e:78:71, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff1e:7871: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00:21e:80ff:fe1e:7871, length 24
11:03:35.269315 60:31:97:7a:84:da > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 45.83.231.254 tell 45.83.228.34, length 46
11:03:35.315533 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
11:03:35.355352 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
11:03:36.330111 00:1e:80:93:a9:84 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:302 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:36.349716 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
11:03:36.496395 10:0d:7f:91:6f:c5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::120d:7fff:fe91:6fc5 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
11:03:38.092436 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
^C101 packets captured
452 packets received by filter
0 packets dropped by kernel

Je n'ai qu'une seul machine de branchée et active actuellement sur le réseau (192.168.1.15)

pju91

  • Abonné Free fibre
  • *
  • Messages: 891
  • 91
Perte de la résolution des DNS (mac ocs)
« Réponse #85 le: 13 avril 2022 à 11:14:50 »
sudo tcpdump -ne ether broadcast or ether multicast             
...
11:02:50.994704 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.58 tell 192.168.1.36, length 46
11:02:51.994277 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
11:02:52.994412 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.56 tell 192.168.1.36, length 46
11:02:54.994359 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.26 tell 192.168.1.36, length 46
...
Je n'ai qu'une seul machine de branchée et active actuellement sur le réseau (192.168.1.15)
Tu penses donc que les adresses que j'ai laissées dans la trace ci-dessus ne sont pas chez toi ?
De plus en plus fort, tu verrais donc les broadcasts de LAN d'autres clients K-Net ?

Superpicsou

  • Abonné Free fibre
  • *
  • Messages: 308
  • Feuguerolles-Bully (14)
    • Cloud Illustrations
Perte de la résolution des DNS (mac ocs)
« Réponse #86 le: 13 avril 2022 à 11:26:37 »
Aucune idée, encore une fois je n'ai pas les compétences techniques pour analyser ces flux.

Juste je comprend pas pourquoi ces requête sur des ip local qui n'existe pas chez moi. J'imagine que ya un lien avec le fait que mon réseau local pète les plombs, toutes ces déconnexion et le fait que j'ai du mal à accéder à la config de ma box. Mais encore une fois, simple supposition, aucune idée.

phenomens

  • Abonné K-Net
  • *
  • Messages: 52
  • Landes sur Ajon 14
Perte de la résolution des DNS (mac ocs)
« Réponse #87 le: 13 avril 2022 à 12:01:40 »
Il n'y a pas de moyen de limiter ces problèmes sur Mac le temps que ca soit corrigé coté KNET ?

On est d'accord que KNET est au courant de ces problèmes sur nos box ?

chrisrp

  • Réseau Tutor du Val d'Orge (91)
  • Abonné K-Net
  • *
  • Messages: 96
  • Montlhéry (91)
Perte de la résolution des DNS (mac ocs)
« Réponse #88 le: 13 avril 2022 à 12:13:56 »
Il n'y a pas de moyen de limiter ces problèmes sur Mac le temps que ca soit corrigé coté KNET ?

On est d'accord que KNET est au courant de ces problèmes sur nos box ?

J'espère qu'ils sont au courant.
Perso, avec mon propre routeur Asus j'ai aussi des soucis de résolution DNS depuis samedi vers 14h.
2 appels à knet, réponse laconique.. j'informe nos ingénieurs...

Superpicsou

  • Abonné Free fibre
  • *
  • Messages: 308
  • Feuguerolles-Bully (14)
    • Cloud Illustrations
Perte de la résolution des DNS (mac ocs)
« Réponse #89 le: 13 avril 2022 à 12:24:44 »
Rappel sav téléphonique.

En gros ils avaient ouvert un ticket chez covage pour "perte de service" (donc plus d'internet, ce qui n'était pas mon cas). Avec la résolutions du soucis hier, Covage à clôturé tout les tickets pour ce problème.

Du coup, K-net refait un ticket à Covage pour "dégradation de service" et non plus perte. Et c'est tout.
Donc pour eux, toujours rien à voir avec l'icotera. C'est du côté de Covage.

Wait & See et patiente.

¯\_(ツ)_/¯

pju91

  • Abonné Free fibre
  • *
  • Messages: 891
  • 91
Perte de la résolution des DNS (mac ocs)
« Réponse #90 le: 13 avril 2022 à 12:32:30 »
Rappel sav téléphonique.

¯\_(ツ)_/¯

S'ils t'ont donné un numéro de ticket en [K-NET#20220413xxxxxxx], envoie leur quand même les traces que tu obtiens par tcpdump en mettant ce numéro de ticket en sujet.

bolemo

  • AS2027 MilkyWan
  • Professionnel des télécoms
  • *
  • Messages: 1 625
  • Grandcamp Maisy (14)
Perte de la résolution des DNS (mac ocs)
« Réponse #91 le: 13 avril 2022 à 13:48:21 »
Tu penses donc que les adresses que j'ai laissées dans la trace ci-dessus ne sont pas chez toi ?
De plus en plus fort, tu verrais donc les broadcasts de LAN d'autres clients K-Net ?

Il y a toujours eu des paquets APIPA et en 192.168… qui traînent dans le GPON…

J'en avais détecté pas mal il y a quelques années, venant d'appareils divers et variés (deux Synology, des IOT genre thermostats, et autres interfaces et même une Freebox…)
Je pensais à l'époque que ça venait de quelqu'un qui avait mis son switch au mauvais endroit, mais c'était peut-être quelqu'un victime de de bogue Icotera…
À l'époque, VincentO2 qui était encore chez K-Net s'était penché sur la question, et la plus grosse difficulté pour K-Net était qu'ils n'ont pas accès au GPON, car ce qu'il s'y passe est filtré avant que ça leur parvienne et ils ne peuvent pas voir tous ces paquets ; je lui avais envoyé une base de donnée avec toutes les adresses MAC de ces appareils, et il a fait ce qu'il a pu, je crois en vain, ça n'avait jamais pu être résolu…

Il y avait tout un sujet dédié que j'avais ouvert sur le forum Caps…

Au final, entre les personnes qui établissent leur réseau incorrectement, ceux qui ont activé par mégarde ou négligence un port mirroring, ceux qui ont du matériel perso et ne savent pas l'utiliser, il y a toujours des fuites de certains LAN sur le GPON.

Mon routeur filtre déjà ces paquets, mais comme ils sont broadcast/multicast, ils forçaient mon routeur à utiliser plus de ressources que nécessaire.
Comme je suis puriste et que j'aime optimiser, j'ai établi des règles ebtables et iptables sur mon routeur pour filtrer tout cela au plus tôt :
root@HERMES:~$ ebtables -L
Bridge table: filter

Bridge chain: INPUT, entries: 1, policy: ACCEPT
-i ethwan -j auth_macs

Bridge chain: FORWARD, entries: 1, policy: ACCEPT
-i ethwan -j auth_macs

Bridge chain: OUTPUT, entries: 0, policy: ACCEPT

Bridge chain: auth_macs, entries: 2, policy: ACCEPT
-s 20:e0:9c:53:7a:9 -j RETURN
-j DROP

20:e0:9c:53:7a:9, c'est la MAC de ma passerelle Covage.
Cela signifie que tout ce qui provient depuis le WAN d'un appareil avec une MAC différente de la passerelle Covage sur laquelle je suis relié est rejeté à l'entrée du routeur.

De plus, j'ai aussi cette règle iptables (et son équivalent en ip6tables que je ne mets pas ici pour ne pas surcharger) :
-P PREROUTING ACCEPT
-A PREROUTING -i brwan -m set ! --match-set brwan_in_auth dst -j DROP

Avec
root@HERMES:~$ ipset -L brwan_in_auth
Name: brwan_in_auth
Type: hash:ip
Revision: 5
Header: family inet hashsize 1024 maxelem 65536 bucketsize 12 initval 0xb7ec9594
Size in memory: 240
References: 1
Number of entries: 3
Members:
[MON IP]
255.255.255.255
[LE BROADCAST DE MON SOUS-RÉSEAU]

Cette combinaison iptables et ipset s'assure que tout paquet qui arrive du WAN qui n'est pas un broadcast global, un broadcast de mon sous-réseau ou destiné à mon adresse IP est automatiquement rejeté au plus tôt (la table raw étant la première, j'évite que les paquets indésirables polluent les règles suivantes dans les tables mangle, filter, etc…).

J'ai un peu simplifié mes règles ici à celle qui sont pertinentes… Elles sont un peu plus complexes, car j'accède à mon ONT pour du monitoring par exemple…

Et bien ça filtre en masse…
Voici par exemple le tcpdump depuis le routeur qui montre sur 2 secondes tout ce qui ne vient pas en broadcast ou multicast de ma passerelle Covage (donc qui est stoppé par ma règle ebtables) :
root@HERMES:~$ tcpdump -i ethwan -ne ether broadcast or ether multicast | grep -ve 20:e0:9c:53:7a:9
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ethwan, link-type EN10MB (Ethernet), capture size 262144 bytes
13:32:31.781315 00:1e:80:74:7b:98 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fe74:7b98.546 > ff02::1:2.547: dhcp6 solicit
13:32:31.798841 00:1e:80:7b:90:e8 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fe7b:90e8.546 > ff02::1:2.547: dhcp6 solicit
13:32:31.802434 00:11:32:81:d5:f0 > 33:33:ff:7f:de:3e, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00:211:32ff:fe81:d5f0 > ff02::1:ff7f:de3e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe7f:de3e, length 32
13:32:32.130331 00:1e:80:27:e6:cc > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:14f4 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
13:32:32.135705 00:1e:80:21:6c:85 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 222: fe80::21e:80ff:fe21:6c85.546 > ff02::1:2.547: dhcp6 request
13:32:32.216961 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.1 tell 192.168.1.36, length 46
13:32:32.267601 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
13:32:32.291344 00:1e:80:8e:91:8c > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fe8e:918c.546 > ff02::1:2.547: dhcp6 solicit
13:32:32.346701 bc:a5:11:31:f7:ae > 33:33:ff:53:78:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980:132:1a1f::1 > ff02::1:ff53:7801: ICMP6, neighbor solicitation, who has fe80::22e0:9cff:fe53:7801, length 32
13:32:32.365227 10:0d:7f:91:6f:e4 > 33:33:ff:05:90:58, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00::1 > ff02::1:ff05:9058: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00:ea44:7eff:fe05:9058, length 32
13:32:32.411618 00:1e:80:21:6c:9d > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:301 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:32.482065 e8:fc:af:8f:1c:2d > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe8f:1c2d > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:32.512524 90:6c:ac:84:9e:e0 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 2.59.238.185 tell 0.0.0.0, length 46
13:32:32.582659 28:c6:8e:92:4e:33 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:cf > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:32.770194 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
13:32:32.802215 00:11:32:81:d5:f0 > 33:33:ff:7f:de:3e, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00:211:32ff:fe81:d5f0 > ff02::1:ff7f:de3e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe7f:de3e, length 32
13:32:32.814336 00:1e:80:1d:7b:69 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:369 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:32.949325 00:1e:80:93:a9:84 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:302 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:32.965383 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:32.978816 e8:fc:af:8f:21:89 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 2.59.239.254 tell 2.59.237.58, length 46
13:32:33.149232 00:1e:80:80:1d:3c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:324 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:33.174286 00:1e:80:7f:57:e4 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fe7f:57e4.546 > ff02::1:2.547: dhcp6 solicit
13:32:33.230331 00:0e:58:f6:36:3e > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 735: 192.168.1.58.50091 > 255.255.255.255.1900: UDP, length 693
13:32:33.231144 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.56 tell 192.168.1.36, length 46
13:32:33.365320 10:0d:7f:91:6f:e4 > 33:33:ff:05:90:58, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00::1 > ff02::1:ff05:9058: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00:ea44:7eff:fe05:9058, length 32
13:32:33.439391 00:1e:80:a8:43:0c > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::21e:80ff:fea8:430c > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:32:33.441828 00:1e:80:a8:32:5c > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fea8:325c.546 > ff02::1:2.547: dhcp6 solicit
13:32:33.446576 00:1e:80:a8:43:0c > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: fe80::21e:80ff:fea8:430c > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
13:32:33.452668 00:1e:80:a8:43:0c > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 110: fe80::21e:80ff:fea8:430c > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
13:32:33.482128 e8:fc:af:8f:1c:2d > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe8f:1c2d > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:33.509182 00:1e:80:a8:43:0c > 33:33:ff:a8:43:0c, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ffa8:430c: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00:21e:80ff:fea8:430c, length 24
13:32:33.511056 bc:a5:11:31:f7:ae > 33:33:ff:53:78:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980:132:1a1f::1 > ff02::1:ff53:7801: ICMP6, neighbor solicitation, who has fe80::22e0:9cff:fe53:7801, length 32
13:32:33.520647 90:6c:ac:84:9e:e0 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 2.59.238.185 tell 0.0.0.0, length 46
13:32:33.570631 00:1e:80:7f:5d:f0 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fe7f:5df0.546 > ff02::1:2.547: dhcp6 solicit
13:32:33.582909 28:c6:8e:92:4e:33 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:cf > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:33.609619 10:0d:7f:91:6f:c5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::120d:7fff:fe91:6fc5 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:33.630269 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
13:32:33.662852 00:1e:80:7b:66:d0 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:29a > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:33.772631 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
13:32:33.802278 00:11:32:81:d5:f0 > 33:33:ff:7f:de:3e, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00:211:32ff:fe81:d5f0 > ff02::1:ff7f:de3e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe7f:de3e, length 32
13:32:34.130456 00:1e:80:27:e6:cc > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:14f4 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
13:32:34.216961 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.26 tell 192.168.1.36, length 46
13:32:34.365258 10:0d:7f:91:6f:e4 > 33:33:ff:05:90:58, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00::1 > ff02::1:ff05:9058: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00:ea44:7eff:fe05:9058, length 32
13:32:34.411931 00:1e:80:21:6c:9d > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:301 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:34.506620 bc:a5:11:31:f7:ae > 33:33:ff:53:78:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980:132:1a1f::1 > ff02::1:ff53:7801: ICMP6, neighbor solicitation, who has fe80::22e0:9cff:fe53:7801, length 32
13:32:34.530550 90:6c:ac:84:9e:e0 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 2.59.238.185 tell 0.0.0.0, length 46
13:32:34.583002 28:c6:8e:92:4e:33 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::2ac6:8eff:fe92:4e33 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:34.609682 10:0d:7f:91:6f:c5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::120d:7fff:fe91:6fc5 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:34.647389 2c:30:33:e6:0f:15 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::2e30:33ff:fee6:f15 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:34.747982 60:a4:b7:ef:cc:2e > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 777: 192.168.1.56.43756 > 255.255.255.255.29810: UDP, length 735
13:32:34.773224 00:11:32:76:4a:7a > 33:33:ff:8e:91:8e, ethertype IPv6 (0x86dd), length 86: fe80::211:32ff:fe76:4a7a > ff02::1:ff8e:918e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe8e:918e, length 32
13:32:34.808776 00:1e:80:93:a5:b8 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 222: fe80::21e:80ff:fe93:a5b8.546 > ff02::1:2.547: dhcp6 request
13:32:34.814493 00:1e:80:1d:7b:69 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:369 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:34.951137 00:1e:80:93:a9:84 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:302 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:34.965570 00:1e:80:38:76:1c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:363 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:35.039610 00:1e:80:9b:a2:b0 > 33:33:00:01:00:02, ethertype IPv6 (0x86dd), length 180: fe80::21e:80ff:fe9b:a2b0.546 > ff02::1:2.547: dhcp6 solicit
13:32:35.082378 e8:fc:af:8f:1c:2d > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe8f:1c2d > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:35.189032 60:31:97:7a:84:da > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 45.83.231.254 tell 45.83.228.34, length 46
13:32:35.213462 80:37:73:ee:26:ad > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::8237:73ff:feee:26ad > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:35.360572 00:1e:80:90:48:64 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 45.83.231.3 tell 0.0.0.0, length 46
13:32:35.480847 a4:2b:8c:92:87:6b > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:176 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:35.506651 bc:a5:11:31:f7:ae > 33:33:ff:53:78:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980:132:1a1f::1 > ff02::1:ff53:7801: ICMP6, neighbor solicitation, who has fe80::22e0:9cff:fe53:7801, length 32
13:32:35.527207 00:1e:80:80:1d:3c > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:324 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:35.540797 90:6c:ac:84:9e:e0 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 2.59.238.185 tell 0.0.0.0, length 46
13:32:35.609650 10:0d:7f:91:6f:c5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::120d:7fff:fe91:6fc5 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
13:32:35.630581 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
^C68 packets captured
72 packets received by filter
0 packets dropped by kernel

La plupart de ces paquets sont normaux (en particulier les paquets DHCP (v4 ou v6) [du moment qu'ils ne sont pas spammés 4 000 fois par seconde  ;D]) et auraient été bloqués plus loin par mon routeur qui ne les auraient pas routé vers mon LAN.
On voit des paquets anormaux comme 192.168.1.56 venant de la fuite WAN/LAN chez quelqu'un ou une mauvaise configuration de leur réseau ou paramètres, qui eux aussi auraient été bloqués plus loin par mon routeur. Ce sont d'ailleurs les mêmes paquets que Superpicsou voit arriver dans son LAN, puisqu'on est sur le même GPON.

Avec ces règles spécifiques, je bloque ces paquets le plus tôt possible  ;)

bolemo

  • AS2027 MilkyWan
  • Professionnel des télécoms
  • *
  • Messages: 1 625
  • Grandcamp Maisy (14)
Perte de la résolution des DNS (mac ocs)
« Réponse #92 le: 13 avril 2022 à 13:51:38 »
Rappel sav téléphonique.

En gros ils avaient ouvert un ticket chez covage pour "perte de service" (donc plus d'internet, ce qui n'était pas mon cas). Avec la résolutions du soucis hier, Covage à clôturé tout les tickets pour ce problème.

Du coup, K-net refait un ticket à Covage pour "dégradation de service" et non plus perte. Et c'est tout.
Donc pour eux, toujours rien à voir avec l'icotera. C'est du côté de Covage.

Wait & See et patiente.

¯\_(ツ)_/¯

Ils semblent renvoyer la faute à Covage…
Je vois mal comment Covage peut être responsable de ton Icotera qui a un problème (matériel, logiciel ou mauvaise configs envoyées)  :o

phenomens

  • Abonné K-Net
  • *
  • Messages: 52
  • Landes sur Ajon 14
Perte de la résolution des DNS (mac ocs)
« Réponse #93 le: 13 avril 2022 à 16:01:28 »
Pour ma part c'est de pire en pire les coupures. 2 coupures le temps d'écrire ce message... (et encore je n'ai pas encore validé)

bolemo

  • AS2027 MilkyWan
  • Professionnel des télécoms
  • *
  • Messages: 1 625
  • Grandcamp Maisy (14)
Perte de la résolution des DNS (mac ocs)
« Réponse #94 le: 13 avril 2022 à 16:06:47 »
Pour ma part c'est de pire en pire les coupures. 2 coupures le temps d'écrire ce message... (et encore je n'ai pas encore validé)

Cela semble être le cas, mais avez-vous vérifié que votre problème est le même que Superpicsou ?
Avez-vous pu effectuer la commande tcpdump -ne ether broadcast or ether multicast | grep -ve 192.168.1
Et constater la fuite de paquets WAN dans votre LAN ?

Superpicsou

  • Abonné Free fibre
  • *
  • Messages: 308
  • Feuguerolles-Bully (14)
    • Cloud Illustrations
Perte de la résolution des DNS (mac ocs)
« Réponse #95 le: 13 avril 2022 à 16:09:59 »
Haha j'allais venir dire la même chose. L'horreur. La connexion ne tiens pas. En tout cas le mac perd la connexion. Impossible de ping l'icotera en local

ping 192.168.1.1                                   
PING 192.168.1.1 (192.168.1.1): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
c^C
--- 192.168.1.1 ping statistics ---
4 packets transmitted, 0 packets received, 100.0% packet loss

et quand je tente un dump ça defile à fond

sudo tcpdump -ne ether broadcast or ether multicast                                                                                                                                                                                        2 ↵
tcpdump: data link type PKTAP
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pktap, link-type PKTAP (Apple DLT_PKTAP), capture size 262144 bytes
16:03:54.525060 e8:fc:af:8f:21:13 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe8f:2113 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
16:03:55.178294 00:11:32:81:d5:f0 > 33:33:ff:7f:de:3e, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00:211:32ff:fe81:d5f0 > ff02::1:ff7f:de3e: ICMP6, neighbor solicitation, who has fe80::21e:80ff:fe7f:de3e, length 32
16:03:56.413957 00:1e:80:27:e6:cc > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:14f4 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
16:03:56.926421 00:1e:80:9b:a2:b0 > 33:33:ff:73:9f:8b, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff73:9f8b: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00::a373:9f8b, length 24
16:03:57.129984 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
16:03:57.130568 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
16:03:59.051577 00:11:32:76:4a:7a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 92: 2.59.236.229.137 > 2.59.239.255.137: UDP, length 50
16:03:59.130153 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.56 tell 192.168.1.36, length 46
16:03:59.130430 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.55 tell 192.168.1.36, length 46
16:03:59.130874 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
16:04:00.513703 00:1e:80:32:5a:e5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:7a6 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
16:04:01.056335 00:11:32:76:4a:7a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 92: 2.59.236.229.137 > 2.59.239.255.137: UDP, length 50
16:04:01.059313 00:11:32:76:4a:7a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 92: 2.59.236.229.137 > 2.59.239.255.137: UDP, length 50
16:04:01.111044 00:1e:80:93:a9:84 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:302 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
16:04:02.005136 00:1e:80:9b:2f:90 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 86: 92.118.99.232.54757 > 224.0.0.251.5353: 24423 PTR (QM)? 192.168.1.168.in-addr.arpa. (44)
16:04:02.037913 00:1e:80:9b:2f:90 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 92.118.99.232.34697 > 224.0.0.251.5353: 24425 PTR (QM)? 192.168.1.11.in-addr.arpa. (43)
16:04:02.789550 60:a4:b7:ef:cc:2e > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 777: 192.168.1.56.60813 > 255.255.255.255.29810: UDP, length 735
16:04:03.062206 00:11:32:76:4a:7a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 92: 2.59.236.229.137 > 2.59.239.255.137: UDP, length 50
16:04:03.065448 00:11:32:76:4a:7a > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 225: 2.59.236.229.138 > 2.59.239.255.138: UDP, length 183
16:04:03.130081 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.58 tell 192.168.1.36, length 46
16:04:04.481509 10:0d:7f:91:6f:c5 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::120d:7fff:fe91:6fc5 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
16:04:04.936343 e8:fc:af:8f:21:13 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: fe80::eafc:afff:fe8f:2113 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
16:04:05.309811 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 60: 185.4.76.115.51499 > 255.255.255.255.10001: UDP, length 4
16:04:05.312046 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.43538 > 255.255.255.255.60378: UDP, length 130
16:04:05.313125 18:e8:29:b8:7d:5c > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 204: 2.59.238.99.53701 > 255.255.255.255.51499: UDP, length 162
16:04:05.313662 74:ac:b9:a2:11:dc > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 182: 2.59.237.6.56590 > 255.255.255.255.51499: UDP, length 140
16:04:05.314135 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.56696 > 255.255.255.255.51499: UDP, length 130
16:04:05.314539 f0:9f:c2:7c:6a:73 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 160: 192.168.1.26.47993 > 255.255.255.255.10001: UDP, length 118
16:04:05.314956 74:ac:b9:a2:09:54 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 175: 2.59.236.35.52585 > 255.255.255.255.51499: UDP, length 133
16:04:05.315367 74:ac:b9:a2:09:1e > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 174: 45.83.231.233.40286 > 255.255.255.255.51499: UDP, length 132
16:04:05.315832 f0:9f:c2:7c:6a:73 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 160: 192.168.1.26.34049 > 255.255.255.255.10001: UDP, length 118
16:04:05.316246 74:ac:b9:a2:1d:64 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 184: 185.202.61.191.39621 > 255.255.255.255.51499: UDP, length 142
16:04:05.316696 74:ac:b9:a2:06:c6 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 182: 2.59.238.238.58074 > 255.255.255.255.51499: UDP, length 140
16:04:05.317120 18:e8:29:b8:7d:5c > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 204: 2.59.238.99.58786 > 255.255.255.255.47993: UDP, length 162
16:04:05.317527 74:ac:b9:a2:1d:64 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 184: 185.202.61.191.53293 > 255.255.255.255.47993: UDP, length 142
16:04:05.317965 74:ac:b9:a2:11:dc > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 182: 2.59.237.6.43868 > 255.255.255.255.47993: UDP, length 140
16:04:05.318412 68:72:51:2c:72:53 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 186: 192.168.1.55.49012 > 255.255.255.255.51499: UDP, length 144
16:04:05.318906 74:ac:b9:a2:09:54 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 175: 2.59.236.35.42494 > 255.255.255.255.47993: UDP, length 133
16:04:05.319313 18:e8:29:b8:7d:5c > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 204: 2.59.238.99.34787 > 255.255.255.255.34049: UDP, length 162
16:04:05.319760 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.34176 > 255.255.255.255.35510: UDP, length 130
16:04:05.320222 74:ac:b9:a2:09:1e > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 174: 45.83.231.233.37729 > 255.255.255.255.47993: UDP, length 132
16:04:05.320672 68:72:51:2c:72:53 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 186: 192.168.1.55.34652 > 255.255.255.255.51499: UDP, length 144
16:04:05.321115 74:ac:b9:a2:1d:64 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 184: 185.202.61.191.41998 > 255.255.255.255.34049: UDP, length 142
16:04:05.321590 68:72:51:2c:72:53 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 186: 192.168.1.55.36020 > 255.255.255.255.47993: UDP, length 144
16:04:05.322014 68:72:51:2c:72:53 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 186: 192.168.1.55.45257 > 255.255.255.255.34049: UDP, length 144
16:04:05.322466 74:ac:b9:a2:11:dc > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 182: 2.59.237.6.56793 > 255.255.255.255.34049: UDP, length 140
16:04:05.322884 74:ac:b9:a2:09:54 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 175: 2.59.236.35.60798 > 255.255.255.255.34049: UDP, length 133
16:04:05.323323 74:ac:b9:a2:09:1e > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 174: 45.83.231.233.49999 > 255.255.255.255.34049: UDP, length 132
16:04:05.323769 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.58135 > 255.255.255.255.43667: UDP, length 130
16:04:05.324207 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.56478 > 255.255.255.255.53149: UDP, length 130
16:04:05.328161 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.44637 > 255.255.255.255.47993: UDP, length 130
16:04:05.329765 74:ac:b9:a2:0b:04 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 172: 185.4.76.115.59211 > 255.255.255.255.34049: UDP, length 130
16:04:05.852721 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 45.83.230.126.40098 > 224.0.0.251.5353: 25847 PTR (QM)? 21.0.168.192.in-addr.arpa. (43)
16:04:05.872573 60:31:97:7a:84:da > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 45.83.231.254 tell 45.83.228.34, length 46
16:04:05.980999 bc:a5:11:31:f7:ae > 33:33:ff:53:78:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980:132:1a1f::1 > ff02::1:ff53:7801: ICMP6, neighbor solicitation, who has fe80::22e0:9cff:fe53:7801, length 32
16:04:05.996420 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 86: 45.83.230.126.38003 > 224.0.0.251.5353: 25852 PTR (QM)? 104.0.168.192.in-addr.arpa. (44)
16:04:06.332463 c4:41:1e:17:8e:00 > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 85: 45.83.230.126.34867 > 224.0.0.251.5353: 25864 PTR (QM)? 22.0.168.192.in-addr.arpa. (43)
16:04:06.979767 bc:a5:11:31:f7:ae > 33:33:ff:53:78:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980:132:1a1f::1 > ff02::1:ff53:7801: ICMP6, neighbor solicitation, who has fe80::22e0:9cff:fe53:7801, length 32
16:04:08.285607 00:1e:80:1d:7b:69 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:369 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
16:04:08.954979 10:0d:7f:91:6f:e4 > 33:33:ff:85:8a:5a, ethertype IPv6 (0x86dd), length 86: 2a03:4980:200:4a00::1 > ff02::1:ff85:8a5a: ICMP6, neighbor solicitation, who has 2a03:4980:200:4a00:423f:8cff:fe85:8a5a, length 32
16:04:09.129770 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
16:04:09.130213 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
16:04:09.131633 00:11:2a:22:48:e7 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 62: 2.59.236.124.49150 > 255.255.255.255.49152: UDP, length 20
16:04:10.129923 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
16:04:10.424511 00:1e:80:27:e6:cc > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::21:0:14f4 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::21:0:1, length 32
16:04:11.127831 00:1e:80:93:a9:84 > 33:33:ff:00:00:01, ethertype IPv6 (0x86dd), length 86: 2a03:4980::1a:0:302 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has 2a03:4980::1a:0:1, length 32
16:04:11.129805 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.56 tell 192.168.1.36, length 46
16:04:11.130134 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.55 tell 192.168.1.36, length 46
16:04:11.130611 40:3f:8c:85:8a:5a > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has 192.168.1.25 tell 192.168.1.36, length 46
16:04:11.688874 ac:84:c9:45:99:b2 > ff:ff:ff:ff:ff:ff, ethertype Unknown (0x887b), length 60:
0x0000:  0102 0400 0487 1000 0000 0000 0000 0000  ................
0x0010:  0000 0000 0000 0000 0000 0000 0000 0000  ................
0x0020:  0000 0000 0000 0000 0000 0000 0000       ..............
^C
70 packets captured
163 packets received by filter
0 packets dropped by kernel

ya des lignes bien chelou genre en seconde 5 (timestamp 16:04:05) je me prend je sais pas combien de truc sur le broadcast. C'est pas sensé être un truc pour les sous réseau local ?
Puis les lignes de ce genre

Citer
16:02:45.648139 ac:84:c9:45:99:b2 > ff:ff:ff:ff:ff:ff, ethertype Unknown (0x887b), length 60:
   0x0000:  0102 0400 0487 1000 0000 0000 0000 0000  ................
   0x0010:  0000 0000 0000 0000 0000 0000 0000 0000  ................
   0x0020:  0000 0000 0000 0000 0000 0000 0000       ..............

Bref le réseau il aime pas du tout. Retour sur la connexion ADSL avant de péter un plomb.