[nsp] RE: cisco-nsp Digest, Vol 11, Issue 23
Waldroop, Derek (CCI-Atlanta)
Derek.Waldroop at cox.com
Wed Oct 15 07:52:02 EDT 2003
anything interesting from -
show ipc status
show ipc nodes
debug ipc
maybe its traffic somehow infiltrating the backplane of your 7200, dunno. Ive seen some similar
Message: 2
Date: Mon, 13 Oct 2003 12:46:39 -0400 (EDT)
From: "Streiner, Justin" <streiner at stargate.net>
Subject: RE: [nsp] 7200 Platform - Buffer Failures
To: James Galliford <JamesG at corp.ptd.net>
Cc: cisco-nsp at puck.nether.net
Message-ID: <Pine.GSO.4.58.0310131241310.5820 at lurch>
Content-Type: TEXT/PLAIN; charset=US-ASCII
On Mon, 13 Oct 2003, James Galliford wrote:
> Hrm... The small buffers can obviously accommodate a 92 byte packet from
> a Nachi infected host but the majority of buffers that are seeing the
> failures with seem to be big/VeryBig/Huge/Large. We do see occasional
> small buffer failures but they do not seem to be nearly as common. The
> largest MTU on any of the routers interfaces should be 1500. I wonder
> why we would see an 'explosion' in failures for the larger buffer sizes
> that exceed 1500 bytes???
Many DS3-speed interfaces (POET, HSSI) have MTUs greater than 1500,
usually 4470 bytes. Same goes for some ATM interfaces.
Also, while the small buffers can accommodate a 92 byte packet, infected
hosts can often send them out at rates high enough to slam that specific
buffer pool. In the case of the medium and large buffer pools that you
included in your original email, there are other pieces of malware that
can behave the same way as Nachi but with bigger packets.
It's also possible that the traffic isn't malicious - it could have just
been some odd spike in legitimate traffic.
jms
More information about the cisco-nsp
mailing list