[comp.dcom.lans] Strange Network Traffic

pwl@tc.fluke.COM (Paul Lutt) (07/08/88)

We recently purchased an Excelan LANalyzer board and Compaq PC for
analyzing our local ethernet.  While familiarizing myself with this
test instrument, I decided to watch my Sun workstation (a diskless
Sun-3/60) boot single user.  I'm seeing some interesting behavior that
I hope someone out in netland can explain.  Here is the scenario:

======================================================================

    1) The client workstation uses TFTP to boot the "boot" program.
       (Everything looks reasonable so far.)

    2) The boot program loads in vmunix through "nd" calls to the
       server.  (Still looks reasonable.)

    3) Vmunix starts up.  One of the first things it does is send out
       a very strange looking ARP request:

       Packet #1172: client -> ether-broadcast
                     ARP request (0.0.38.80 -> 0.0.38.80)

       The source and destination internet addresses are totally bogus.
       As expected, no ARP reply is ever received for this bogus request.

    4) The client then sends a reverse ARP request to find out its own
       internet address.  The server replies with the correct information.

    5) Now another funny packet.  The client sends out a strange ARP
       request:

       Packet #1175 client -> ether-broadcast
		    ARP request (client -> client)

       The client has just asked what its own ethernet address is!  This
       same request appears at least twice during the booting process.

======================================================================

Note that the workstation boots normally.  I'm just curious why such
strange requests are being made.

As a side note, there was a recent posting in comp.sys.sun stating that
some nd error messages seen during booting are due to net mask traffic
directed at the booting workstation.  I can confirm that this is
probably true.

During the booting sequence, the client sends a ICMP request for the
local net mask.  In our case, all the systems on the network using
TCP/IP try to respond.  Most systems start out by sending an ARP
request to the client to get its ethernet address so that they can then
send the mask.  During the trace I ran, upwards of sixty systems sent
ARP requests, followed by ICMP replies containing the net mask.  It
seems likely that such volumes of traffic directed at a workstation
might indeed exhaust the buffer pool.

Thanks to anyone who can shed some light on this.  I sometimes think we
were better off NOT knowing what was going on deep in the bowels of the
network.  :-)
--
	Paul Lutt
Domain:	pwl@tc.fluke.COM
 Voice:	+1 206 356 5059
  UUCP:	{uw-beaver,microsof,sun}!fluke!pwl
 Snail:	John Fluke Mfg. Co. / P.O. Box C9090 / Everett WA  98206

hedrick@athos.rutgers.edu (Charles Hedrick) (07/08/88)

In at least some versions of the Sun software, the systems ended up
using an Internet address that was their system serial number.  This
was done during early stages of kernel operation, before the system
knew its Internet address.  Typically the serial numbers were small,
so you'd get an address that looked like 0.0.x.y.  In some releases,
this entry was never removed from the routing table.  Once the system
came up, it was interpreted as a default route.  I'm not sure whether
these things are still happening under current releases.  This is a
moderately dangerous practice.  0.0.x.y should be interepreted as
meaning "this net, host x.y".  It is certainly possible that there
could already be an x.y on the current network.  I'd be very surprised
if this practice continued into release 4.0