D-Link Forums
The Graveyard - Products No Longer Supported => Routers / COVR => DIR-655 => Topic started by: steveluscher on October 28, 2008, 09:26:15 AM
-
My log is absolutely full of the following type of message, minutes apart:
[WARN] Tue Oct 28 09:13:21 2008 Blocked packet from 192.168.0.1 to 192.168.0.1 (LAND Attack)
[WARN] Tue Oct 28 09:13:01 2008 Above message repeated 188 times
Just a hunch, this may have appeared after upgrading to either 1.20 or 1.21. I don't remember seeing it in the logs before that.
What's causing this?
Peculiarities about my setup:
DIR655 LANPORTS <= Computer, NAS, WRT54GP2 VOIP ROUTER
DIR655 WIRELESS <= Computers, Wii, WRT54G (Tomato Firmware) WIRELESS BRIDGE
WRT54G (Tomato Firmware) WIRELESS BRIDGE <= Computer
-
a LAND attack is a DoS attack. Please reference the following link from wiki.
http://en.wikipedia.org/wiki/LAND
-
Are you saying that this is an actual LanD attack, and not just a false positive?
-
No, he is not. Looking at the destination and point of origin this is most certainly a false positive.
-
So again I ask… what could be causing this?
-
So again I ask… what could be causing this?
Can you tell us about your environment? any specific programs, games, network devices, etc?
Or is it spitting out these LanD attacks the second you power on your router? (speaking of which, did you try power cycling your router? Maybe re-apply firmware?)
I noticed you have quite a few devices on your network. You may want to try isolating the 655 completely. Try modem --> DIR-655 --> Computer. See if you still receive lanD attacks. If not, try connecting a device at a time and see which yields the attacks.
Let me know!!!
Good luck!
-
I also have these in my logs, quite a lot of them actually.. it started with the >= 1.20 firmwares
-
Whats on the LAN side of your network?
List all devices please.
-
All the devices are listed in my original post, above.
-
Internet <-> Speedtouch ADSL (bridgemode) <-> DIR-655 <-> LAN
Devices in our LAN:
4 switches
5 PCs and 1 Laptop
Iphone and Nokia N95 via Wireless
-
Explain the bridge in more detail please. Also how many routers are you using?
-
Explain the bridge in more detail please. Also how many routers are you using?
Here goes:
D-Link DIR655
- WAN
- LAN
- Mac OS X 10.4 Computer
- QNAP TS-209 NAS
- Linksys WRT54GP2 (VoIP adapter)
- WIRELESS
- Mac OS X 10.5 Computer
- Mac OS X 10.5 Computer
- Nintendo Wii
Linksys WRT54GP2
- WAN
- LAN port of self (looped back so the VoIP will work)
- LAN
- D-Link DIR655
- WAN port of self (looped back so the VoIP will work)
- WIRELESS
- Linksys WRT54G (With Tomato Firmware in Ethernet Bridge mode)
Linksys WRT54G (With Tomato Firmware in Ethernet Bridge mode)
- LAN
- WIRELESS (Ethernet Bridge Mode)
Remember the good ol' days when we just cabled the whole house and everything worked?
-
Remember the good ol' days when we just cabled the whole house and everything worked?
I'm still living in those days! (minus my iPhone)
-
There's your LanD attacks. The 655 is looking at that loopback bridge as a LanD attack.
-
There's your LanD attacks. The 655 is looking at that loopback bridge as a LanD attack.
Lycan,
I have almost the same setup and I'm getting this in the status log:
Priority
[WARN] Blocked packet from 192.168.0.1 to 192.168.0.1 (LAND Attack)
[INFO] Above message repeated 1999 times
D-Link DIR655
* WAN
o DCM-202 Cable modem
* LAN
o xbox360
o ps3
o Linksys WRTP54G (VoIP adapter)
* WIRELESS
o xp pro laptop
o xp pro laptop
o Wii
Linksys WRTP54G
* WAN
o LAN port of self (looped back for Vonage phone & fax)
* LAN
o D-Link DIR655
o WAN port of self (looped back for Vonage phone & fax)
* WIRELESS (Access Point w/remote access enabled)
o xp pro laptop
o xp pro laptop
o xp pro laptop
o MFC 640W
Everything on the network seems to be working quite well, for now. However, I'm a little concerned about this circular network setup and how the 655 is constantly pounding itself. Are there any settings that will tell the 655 to disregard this particular LanD attack?
-
Try upping the TTL on your clients, in case the LanD false positive is caused by Time Exceeds roaming around between routers (and pounding your DIR655)