G'day Hannah,
Thanks for your input.
> I see hopopt is registered in /etc/protocols as proto ID 0, and is described
> as "IPv6 Hop-by-Hop Option".
Yeah; although I don't know what IPv6 Hop-by-Hop Option means :-)
> I highly doubt that it's legitimate traffic of this type, and that something
> is not decoding the protocol field properly, so it defaults to 0?
> Certainly I've never seen hopopt in use on any network I administer
The idea about something or other defaulting to 0 seems reasonable. The
(pseudo-)hopopt traffic I've seen has been of two distinct sorts.
When I first investigated it at home, most of the bombardment was coming
from my housemate's PS3. When I used tcpdump I saw some stuff in there about
an EA gameserver. When I googled the exact text it came up with a match for
the Battlefield franchise. So even though I don't know what games my housemate
owns, I guess yesterday he was playing Battlefield 4 :D
Secondly, the hopopt traffic seems to be carrying some DNS stuff. I've added the
same logging into my desktop here at uni and am get similar results to at home.
When I run,
$ sudo journalctl -r -b -k | head -5
I get,
-- Logs begin at Sun 2013-10-20 12:01:41 EST, end at Mon 2014-07-28 14:28:46 EST. --
Jul 28 14:28:45 pc2517 kernel: Iptables: Hopopt/MDNS IN=eno1 OUT= MAC=01:00:5e:00:00:fb:18:03:73:2f:05:86:08:00 SRC=128.250.24.134 DST=224.0.0.251 LEN=73 TOS=0x00 PREC=0x00 TTL=255 ID=48704 DF PROTO=UDP SPT=5353 DPT=5353 LEN=53
Jul 28 14:28:45 pc2517 kernel: Iptables: Hopopt/MDNS IN=eno1 OUT= MAC=ff:ff:ff:ff:ff:ff:34:15:9e:39:f7:a0:08:00 SRC=128.250.30.231 DST=255.255.255.255 LEN=131 TOS=0x00 PREC=0x00 TTL=64 ID=9846 PROTO=UDP SPT=17500 DPT=17500 LEN=111
Jul 28 14:28:45 pc2517 kernel: Iptables: Hopopt/MDNS IN=eno1 OUT= MAC=ff:ff:ff:ff:ff:ff:40:6c:8f:18:bd:d6:08:00 SRC=128.250.30.37 DST=255.255.255.255 LEN=132 TOS=0x00 PREC=0x00 TTL=64 ID=9351 PROTO=UDP SPT=17500 DPT=17500 LEN=112
Jul 28 14:28:45 pc2517 kernel: Iptables: Hopopt/MDNS IN=eno1 OUT= MAC=ff:ff:ff:ff:ff:ff:34:15:9e:07:f5:22:08:00 SRC=128.250.30.136 DST=255.255.255.255 LEN=171 TOS=0x00 PREC=0x00 TTL=64 ID=20330 PROTO=UDP SPT=17500 DPT=17500 LEN=151
The mention of MDNS in the log is because I googled "224.0.0.251". Apparently
this address is used for multicast DNS (something else I don't know much about).
Another reason to suspect it's related to DNS is because when I started blanket
rejecting all "hopopt" packets, I was no longer able to ssh into the machine.
In case it's relevant, I'm running Archlinux on all boxes and the iptables rule
I'm using to log hopopt is,
-A INPUT ! -i lo -p hopopt -j LOG --log-prefix "Iptables: Hopopt/MDNS "
> I'd suggest using tcpdump or dumpcat from Wireshark to save a sampling of
> the data, and see what it's actually being used for. It is curious to say
> the least
These sound like good ideas. I haven't had occasion to use wireshark much
before so I'll need to read up on how to do this properly. Also, if I'm
going to be wiresharking all the packets, I'm probably better off doing that
on my own home network, so I might set this aside until tonight ;-)
Thanks again.
Cheers,
Tim