On Wed, Apr 26, 2017 at 09:48:12PM -0600, Andrew Ragone wrote:
Could you grab a pcap of the packet?
Andrew
A bit more interesting: the following packet was sent TO 44.4.39.8,
20:52:45.597416 IP (tos 0x0, ttl 64, id 22372, offset 0, flags [none], proto IPIP (4),
length 60, bad cksum 0 (->8aa8)!)
169.228.66.251 > 75.101.96.109: IP (tos 0x0, ttl 237, id 6367, offset 0, flags
[none], proto TCP (6), length 40)
91.230.47.38.55979 > 44.4.39.8.5682: Flags [S], cksum 0x3024 (correct), seq
2195925477, win 1024, length 0
which is a TCP connection setup request.
and 44.4.39.8 replied with the peculiar size issue packet, rejecting the connection
.
20:52:45.647205 IP (tos 0x0, ttl 18, id 28364, offset 0, flags [none], proto IPIP (4),
length 60)
75.101.96.109 > 169.228.66.251: IP truncated-ip - 13289 bytes missing! (tos 0x0,
ttl 64, id 28363, offset 0, flags [DF], proto TCP (6), length 13329, bad cksum edec
(->ba03)!)
44.4.39.8.5682 > 91.230.47.38.55979: Flags [R.], seq 0:13289, ack 2195925478, win
0, length 13289 [!RST+ \0x00]
So it looks like someone was probing the 44.4.39.8 host and
a bad reply packet was generated. A bug in the TCP implementation?
I wonder what OS it's running.
- Brian