On 2014-05-29, Stan Gammons <[email protected]> wrote:
> On 05/28/2014 04:10 PM, Philip Guenther wrote:
>> On Tue, May 27, 2014 at 7:12 PM, Stan Gammons <[email protected] 
>> <mailto:[email protected]>> wrote:
>>
>>     Using tcpdump -n -ttt -r /var/log/pflog I have a log entry with
>>     [len16<asnlen69] at the end.  The packet was from port 65500 to
>>     161.  What is len16<asnlen69 ?
>>
>>
>> If something in tcpdump output isn't described by the manpage, you'll 
>> need to check the source and see what the code generating it didn't 
>> like.  In this case, it's likely that the higher-level protocol inside 
>> the packet claimed there was more data than fit in the packet.  Could 
>> be a bug in what's generating it...or could be a bug in tcpdump's 
>> parser for the higher-level protocol.
>>
>>
>> Philip Guenther
>>
>
>
> I see no reference to len or asnlen in the tcpdump man. Given the source 
> IP I thought it might be something odd.  I haven't looked through the 
> tcpdump code to see what generated that type entry. This is the log 
> entry minus the target IP.
>
> May 27 04:37:36.728724  rule 63/(match) block in on em0: 125.96.160.190.65500 
> > xx.xxx.xx.xx.161: [len16<asnlen69]

161 - snmp. There are all sorts of snmp probes you'll see on the internet,
I've seen it quite a bit recently. In this case I'm guessing it's either a
bad packet generator or it's someone trying to crash/exploit buggy snmp
daemons by trying to make them read beyond the end of the packet.

Reply via email to