Solved

Promiscuous mode enabled??

Posted on 2004-09-25
6
640 Views
Last Modified: 2010-03-18
I face with this problem at my syslog...some one said it's dangerous...so i need an advice to fix this...

Sep 26 07:41:36 lynx kernel: tg3: eth0: Link is up at 100 Mbps, full duplex.
Sep 26 07:41:36 lynx kernel: tg3: eth0: Flow control is off for TX and off for RX.
Sep 26 07:42:02 lynx kernel: eth1: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth1: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth2: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth2: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth1: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth1: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth2: Promiscuous mode enabled.
Sep 26 07:42:02 lynx kernel: eth2: Promiscuous mode enabled.
Sep 26 07:42:12 lynx dhcpd: if IN A STAGVER.lynx.ath.cx rrset doesn't exist add 300 IN A STAGVER.lynx.ath.cx 192.168.1.2: timed out.
Sep 26 07:42:12 lynx dhcpd: DHCPREQUEST for 192.168.1.2 from 00:11:85:0d:b3:3e (STAGVER) via eth1
Sep 26 07:42:12 lynx dhcpd: DHCPACK on 192.168.1.2 to 00:11:85:0d:b3:3e (STAGVER) via eth1
Sep 26 07:47:13 lynx dhcpd: if IN A STAGVER.lynx.ath.cx rrset doesn't exist add 300 IN A STAGVER.lynx.ath.cx 192.168.1.2: timed out.
Sep 26 07:47:13 lynx dhcpd: DHCPREQUEST for 192.168.1.2 from 00:11:85:0d:b3:3e (STAGVER) via eth1
Sep 26 07:47:13 lynx dhcpd: DHCPACK on 192.168.1.2 to 00:11:85:0d:b3:3e (STAGVER) via eth1
0
Comment
Question by:lilie795
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 12152572
That's normal and necessary for a machine that's running a DHCP server, which yours obviously does.
0
 

Author Comment

by:lilie795
ID: 12153637
you mean that just a log file for admin to see?
0
 
LVL 2

Expert Comment

by:fulp02
ID: 12155147
You can not spend your whole life reading log file find the stuff you need to know and grep it out.
so say you wanted to know anything going on with dhcp   grep *dhcp* syslogfile
Alittle off topic but it will save you loads of time in the end
0
 
LVL 40

Accepted Solution

by:
jlevie earned 45 total points
ID: 12155436
A Unix/Linux system will always log an interface being placed in promiscous mode. While there are legitimate reasons for that happening, it could be a rogue application like a password capture tool. Some of the legitimate reasons include:

A DHCP server
Authorized use of a sniffer (e.g. tcpdump, ethereal)
Any of the network Intrusion Detection Systems (e.g. snort)
Any of the network traffic analysis tools (e.g., ntop, iptraf, etc)

as the SysAdmin you'd know if any of those were in legitimate use on the system and thus know that the warning could be ignored if it only occurs when one of those was started. Seeing that at any other time would be cause for alarm and investigation.
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question