How can I find the source of connections coming from private IPs?

1

1

I'm an amateur home network administrator and I'm trying to ensure that the network is as secure as I can make it. We have a cable connection going through a Linksys router (WRT320) with the dd-wrt firmware (v24-sp2 mini) blocking most incoming connections and forwarding a few. I'm no expert so I haven't been tweaking the settings too much. Everything is mostly at their default settings with nonessential services disabled.

I've been looking through the incoming connection logs and found that I'm receiving constant connection requests that are being dropped from the private IP, 10.160.0.1:bootpc (UDP) (port 68 I think). By the name, I initially thought it was some computer trying to remotely start up a computer in the network. After looking it up, it is my understanding that the service it is trying to connect to is the DHCP server on the router but I have no idea where those requests are coming from.

I'm doing this all from the webui for the router so the logs are pretty barebones. This is the kind of information I see:

Source IP    Protocol    Destination Port Number    Rule
10.160.0.1   UDP         bootpc                     Dropped
(repeated)

It is a Linux-based firmware so I should be able to poke my nose around. I just not that great with the administrative side of Linux.

All of the computers at home are accounted for. I know which computers are connected and they aren't running services that they shouldn't be. Wireless is secured so no unknown computers can connect AFAIK. I just don't know how to identify this rogue IP.

A potential source that this might be coming from is that some of our computers have remote login programs (LogMeIn) so my dad can connect to the computers remotely. However, the computers are off (or have it disabled) and he hasn't been using it as frequently as he used to. I would have thought that the IP address would have been showing as an actual non-private address if he was trying to connect anyway.

I also have a second wireless router that is acting as an access point and bridges connections to the main one. It's a Linksys WRT54GL with the same firmware with pretty much the same exact settings and everything -- the routers and all computers -- are on the same subnet AFAIK.

Where are these connections coming from?


Running tcpdump to check the packets, I see these entries:

root@WRT320N:/tmp# tcpdump -XX -e &> dump.txt
root@WRT320N:/tmp# cat dump.txt | grep 10.160.0.1
16:58:49.918259 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300
16:59:07.303484 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
16:59:32.351746 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
16:59:37.574938 00:19:2f:e5:ba:d9 (oui Unknown) > 01:00:5e:00:00:01 (oui Unknown), ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype IPv4, 10.160.0.1 > all-systems.mcast.net: igmp query v2
16:59:39.829927 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 341: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 295
16:59:40.767904 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 341: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 295
16:59:40.867497 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
16:59:48.905628 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 341: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 295
16:59:49.132869 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
16:59:51.378274 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 341: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 295
16:59:53.848036 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300
17:00:10.841075 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 340: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 294
17:00:12.137809 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 340: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 294
17:00:14.179802 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
17:00:16.196078 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 340: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 294
17:00:21.349701 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300
17:00:22.445556 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
17:00:23.366436 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300
17:00:24.162903 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 340: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 294
17:01:04.274555 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 64: vlan 2, p 0, ethertype ARP, arp who-has 10.160.1.49 tell 10.160.0.1
17:01:07.439837 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300
17:01:07.457221 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300
17:01:09.454207 00:19:2f:e5:ba:d9 (oui Unknown) > Broadcast, ethertype 802.1Q (0x8100), length 346: vlan 2, p 0, ethertype IPv4, 10.160.0.1.bootps > 255.255.255.255.bootpc: BOOTP/DHCP, Reply, length: 300

trimmed for brevity

I'm not sure what to make of it though. Searching online on all-systems.mcast.net shows a number of people also getting these packets too but with no real answers that I could see.

Jeff Mercado

Posted 2011-12-08T21:36:33.390

Reputation: 532

So you are saying that 10.160.0.0 is not one of your nets? – dbasnett – 2011-12-08T21:40:00.177

AFAIK, no. I'm not really sure I know how to even set that up. One other detail I probably should mention is that there are two wireless routers in our network, the router mentioned in the question that accepts wireless N connections and another (WRT54GL same firmware) accepting wireless G connections. The second router is configured as access point and is bridging connections to the main router. The two routers (and all other computers) are on the same subnet. – Jeff Mercado – 2011-12-08T21:47:13.860

Please read our FAQ before posting again, this isn't appropriate for this site, moving to SU – Chopper3 – 2011-12-08T22:29:08.487

@Chopper3: Sorry about that, it was pretty clear to me it was a networking problem so I naturally thought Server Fault was the place to go with this. – Jeff Mercado – 2011-12-08T22:36:10.967

These are not "connection requests". UDP/IP is a connectionless protocol. – JdeBP – 2011-12-09T01:10:01.667

You might have a look at NMAP for snooping your network security...http://nmap.org/

– Moab – 2011-12-09T01:21:41.703

See this please; this will give you your answer. It's a multicast IP, non-Internet address. IP multicast - Wikipedia, the free encyclopedia

– Esteban – 2012-12-31T16:35:45.353

Answers

2

The DHCP traffic that you're seeing is special in that the source address is going to be 0.0.0.0 - not a lot of help there as far as finding the source.

This is unlikely to be anything to be alarmed about - this broadcast traffic should occur any time a device connects to the network, joins the wireless, etc.

If you do still want to hunt it down, you'll want to obtain the source MAC address of the traffic, and track it down from there.

Shane Madden

Posted 2011-12-08T21:36:33.390

Reputation: 686

I was expecting to see 0.0.0.0 but I did get 10.160.0.1 which is causing the confusion. How would I go about getting the MAC address for this? I can't figure out how to get that. – Jeff Mercado – 2011-12-08T21:49:29.583

@JeffMercado Oh, it's probably a node that thinks it has that address, trying to renew a lease. If your log isn't capturing the MAC, you'll need a means of capturing the traffic - got something that can give you a mirror port? – Shane Madden – 2011-12-08T21:59:04.537

I'm not sure I do. Would I need special hardware for this or is it something the router should be able to do? I'm doing everything from the webui but it is essentially a linux-based firmware and could do sniffing there. Unfortunately my knowledge with that is somewhat limited. – Jeff Mercado – 2011-12-08T22:07:37.627

1

You'll want to look at tcpdump, then. Not sure how workable it is on a limited busybox install, but a quick search suggests that it's possible.

– Shane Madden – 2011-12-08T22:10:38.133

Well I used tcpdump and got the mac address. It's definitely not one of my machines. JdeBP's comment suggests this is coming from the ISP going out to someone. Probably harmless so I'll just ignore them. – Jeff Mercado – 2011-12-09T01:21:43.010

2

BOOTP/DHCP traffic from the client during the DHCPDiscover phase (and during the DHCPRequest phase) is broadcast to every node on the same physical network (ff-ff-ff-ff-ff-ff/ 255.255.255.255) and it could be coming from any device; computer, game console, smart phone, etc., etc. In the DHCPDiscover and DHCPRequest packets you'll see the source MAC address of the client so you might be able to track it down by looking at that.

A client's DHCPDiscover and DHCPRequest packets originate from port 68 on the client destined for port 67 of a DHCP server.

A DHCP server's DHCPOffer and DHCPAck packets originate from port 67 on the server destined for port 68 of the client.

The traffic you're seeing could be originating from the client or the server, depending on which phase is occurring when you're seeing the traffic.

You can determine whether it's the server or the client by looking at the DHCP OpCode 53 value:

DHCPDiscover, DHCPRequest, and DHCPInform packets originate from the client.

DHCPOffer and DHCPAck packets originate from the server.

joeqwerty

Posted 2011-12-08T21:36:33.390

Reputation: 5 259

Oh, good point - it might be a DHCP client process on the router talking to the ISP's DHCP server at that address. – Shane Madden – 2011-12-08T22:12:34.417

1The destination port is bootpc, not bootps. This is a DHCP server on 10.160.0.1 replying to a DHCP client somewhere. The ISP is very probably employing 10.0.0.0/8 on its side of the router. My home ISP does that. – JdeBP – 2011-12-09T01:08:19.873

@JdeBP: So I guess these packets are harmless then. – Jeff Mercado – 2011-12-09T01:12:57.570

@JdeBP: Thanks. I should have paid closer attention to the info in the question. It's pretty clear to me now that this is server to client DHCP traffic. – joeqwerty – 2011-12-09T01:41:58.060