[Dnsmasq-discuss] Defending IP address

Johan Vromans jvromans at squirrel.nl
Fri May 5 07:40:41 UTC 2023


Hi,

I have a number of IoT devices. Occasionally, when they try to set up the
DHCP lease, some of them send wrong packets. The device effectively claims
the IP address of the DHCP server. From the system log:

    May  4 05:39:59 srv1 dhcpcd[449]: eth0: hardware address
    xx:xx:xx:xx:xx::ce claims 192.168.1.10

where 192.168.1.10 is the address of the DHCP server.

If a second package arrives within 10 seconds,

    May  4 05:40:08 srv1 dhcpcd[449]: eth0: hardware address
    xx:xx:xx:xx:xx::e7 claims 192.168.1.10

dnsmasq shuts down the network connection

dhcpcd[449]: eth0: 10 second defence failed for 192.168.1.10
dnsmasq-dhcp[24169]: DHCPRELEASE(eth0) 192.168.1.96 xx:xx:xx:xx:xx::e7 
avahi-daemon[373]: Withdrawing address record for 192.168.1.10 on eth0.
avahi-daemon[373]: Leaving mDNS multicast group on interface eth0.IPv4 with
address 192.168.1.10. avahi-daemon[373]: Interface eth0.IPv4 no longer
relevant for mDNS. dhcpcd[449]: eth0: deleting route to 192.168.1.0/24
dhcpcd[449]: eth0: deleting default route via 192.168.1.1

and slowly the LAN collapses.

How can I prevent dnsmasq from EVER giving up its own IP address?

-- Johan



More information about the Dnsmasq-discuss mailing list