如题,昨晚由于打不开openwrt的网页管理界面(显示connection_reset)和ssh(broken pipe),突然发现ping openwrt的ip会出现dup包:
PING 192.168.1.115 (192.168.1.115): 56 data bytes
64 bytes from 192.168.1.115: icmp_seq=0 ttl=128 time=7.751 ms
64 bytes from 192.168.1.115: icmp_seq=0 ttl=127 time=7.998 ms (DUP!)开始以为是虚拟机网络配置问题,各种改mac/改网卡直通都没用…后来发现把让windows物理机用这个IP还是有dup
谁在狗叫?
既然有重复包,那就看看是谁发的好了,使用tcpdump抓取icmp包:
~ % sudo tcpdump icmp -e -s0 -n
tcpdump: data link type PKTAP
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on pktap, link-type PKTAP (Apple DLT_PKTAP), snapshot length 524288 bytes
10:03:18.639872 6c:b1:33:-:-:- > 10:ff:e0:-:-:-, ethertype IPv4 (0x0800), length 98: 192.168.1.96 > 192.168.1.115: ICMP echo request, id 48908, seq 0, length 64
10:03:18.645981 10:ff:e0:-:-:- > 6c:b1:33:-:-:-, ethertype IPv4 (0x0800), length 98: 192.168.1.115 > 192.168.1.96: ICMP echo reply, id 48908, seq 0, length 64
10:03:18.646424 70:37:8e:-:-:- > 6c:b1:33:-:-:-, ethertype IPv4 (0x0800), length 98: 192.168.1.115 > 192.168.1.96: ICMP echo reply, id 48908, seq 0, length 64
由于10:ff:e0:-:-:-是我物理机的mac,那么就是70:37:8e:-:-:-在狗叫
前往https://macaddresslookup.io/zh 查询设备制造商,发现是Tianyi Telecom Terminals Company Limited,也就是…光猫?
你在狗叫什么?
同样使用tcpdump,发现tcp包光猫竟然也会复制一份,说明是在光猫中开启了什么转发功能
最后定位到是由于设置了DMZ主机为192.168.1.115,关闭即可
光猫型号是TYFZA1;如果有遇到相同问题,然后设备列表里还找不到冲突设备的,请先怀疑光猫(
以及,这DMZ实现有问题吧??