Logs flooded with messages

Dear all,

For some time now, I am getting strange error messages in the logs -
Code:
Jan 14 13:14:32 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 316 to 99 packets/sec
Jan 14 13:25:43 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 136 to 96 packets/sec
Jan 14 13:38:56 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 136 to 108 packets/sec
Jan 14 13:38:57 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 130 to 105 packets/sec
Jan 14 13:44:15 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 124 to 103 packets/sec
Jan 14 13:44:23 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 131 to 105 packets/sec
Jan 14 13:46:46 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 343 to 98 packets/sec
Jan 14 13:46:50 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 224 to 108 packets/sec

These seem to come randomly during a day. I did also run tcpdump with icmp6 capture filter, there seem to be no packets with these timestamps. For example the were no icmp6 packets captpured at Jan 14 13:46:46.

There are no such packet floods in the Wireshark log. Is there anybody who is experiencing this? Also, please advise what to check next to solve this.

Did not look into the logs for a long time, but seems that appeared after upgrade to 14.2. Still, it is hard to believe that this is actually causing this.
 
They may be filtered by the firewall before arriving that's why you don't see them if you tcpdump the interface.

icmp6-type 137 is for Redirect Message

This is example from OpenBSD:

pass in quick on em0 inet6 proto ipv6-icmp from any to
{ ( em0 ), ff02::/16 } icmp6-type { 128, 133, 134, 135, 136, 137 } keep state
 
They may be filtered by the firewall before arriving that's why you don't see them if you tcpdump the interface.

icmp6-type 137 is for Redirect Message

This is example from OpenBSD:
Started your tcpdump command, but this may take half a day when this happens again. Quiet at the moment

Code:
root@Testsystem ~# tcpdump -nn -vv -i igb0 "icmp6 && ip6[40] == 137"
tcpdump: listening on igb0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
 
Started your tcpdump command, but this may take half a day when this happens again. Quiet at the moment

Code:
root@Testsystem ~# tcpdump -nn -vv -i igb0 "icmp6 && ip6[40] == 137"
tcpdump: listening on igb0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
Now it seems that I have no hits with this rule

Code:
root@Testsystem ~# tcpdump -nn -vv -i igb0 "icmp6 && ip6[40] == 137"
tcpdump: listening on igb0, link-type EN10MB (Ethernet), snapshot length 262144 bytes

However, in the logs there are many new messages again

Code:
Jan 15 19:58:59 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 236 to 104 packets/sec
Jan 15 19:59:00 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 371 to 100 packets/sec
Jan 15 19:59:01 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 358 to 104 packets/sec
Jan 15 19:59:02 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 170 to 104 packets/sec
Jan 15 19:59:34 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 392 to 107 packets/sec
Jan 15 19:59:35 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 261 to 105 packets/sec
Jan 15 19:59:36 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 184 to 99 packets/sec
Jan 15 20:00:20 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 115 to 100 packets/sec
Jan 15 20:00:30 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 117 to 96 packets/sec
Jan 15 20:02:43 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 234 to 98 packets/sec
Jan 15 20:02:44 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 179 to 105 packets/sec
Jan 15 20:02:55 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 137 to 102 packets/sec

Some of these are really interesting

Code:
Jan 15 09:56:27 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 2642 to 92 packets/sec
Jan 15 09:56:28 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 2657 to 106 packets/sec
Jan 15 09:56:28 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 3107 to 101 packets/sec
Jan 15 09:56:30 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 3232 to 106 packets/sec
Jan 15 09:56:34 Testsystem kernel: Limiting ICMPv6 neighbor discovery redirect output from 1500 to 103 packets/sec

How is this even possible that there are over 3000 packages per second coming in?
 
If there's another host with smaller prefix like /48 in the same local network when you try to reach him via the router the router will respond with icmp redirect. You can check with ndp -a but you will need to capture also the icmp packet to see the actual address.
 
As I understand "Limiting ICMPv6 neighbor discovery redirect output" is limiting ICMP6 outgoing packets.
Very strange that you can grab them with tcpdump.

You can try to set net.inet.icmp.icmplim_output=0 with sysctl to silences such messages.
 
A firewall isn't going to stop tcpdump(1) from capturing packages sent to the host. A local firewall isn't going to stop packages from arriving at the interface.

You can have a block in all and still capture all the packets being sent to that interface.
 
If there's another host with smaller prefix like /48 in the same local network when you try to reach him via the router the router will respond with icmp redirect. You can check with ndp -a but you will need to capture also the icmp packet to see the actual address.
Seems that I have no devices smaller than 64.

And weird thing is that I am unable to catch there packages.
 
Back
Top