<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rogue pings in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910794#M560249</link>
    <description>Thanks for all your help guys!&lt;BR /&gt;&lt;BR /&gt;I'm closing this thread now that we found the process responsible for the pings...and that it seems to be a necessary process for our cluster to work!&lt;BR /&gt;&lt;BR /&gt;Thanks again!</description>
    <pubDate>Mon, 18 Jul 2005 07:00:57 GMT</pubDate>
    <dc:creator>Nicolas_17</dc:creator>
    <dc:date>2005-07-18T07:00:57Z</dc:date>
    <item>
      <title>Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910782#M560237</link>
      <description>Hi everyone,&lt;BR /&gt;&lt;BR /&gt;I have to find the cause of a server that started to ping repeatedly other nodes on our network. We know of the pings because our firewall is intercepting and dropping the packets so they're not causing any problems, but we don't know what process/app is generating them. I was looking through the netstat manpage to find some way to identify the rogue process/app, but i can't find what i'm looking for. &lt;BR /&gt;&lt;BR /&gt;Does anyone know how to measure outgoing traffic from a unix machine and associate this traffic to a process/app?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Tue, 05 Jul 2005 09:33:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910782#M560237</guid>
      <dc:creator>Nicolas_17</dc:creator>
      <dc:date>2005-07-05T09:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910783#M560238</link>
      <description>Hi Nicolas&lt;BR /&gt;&lt;BR /&gt;Use ps -ef | grep ping to know process which is causing ping.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Mahesh</description>
      <pubDate>Wed, 06 Jul 2005 02:43:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910783#M560238</guid>
      <dc:creator>Mahesh Kumar Malik</dc:creator>
      <dc:date>2005-07-06T02:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910784#M560239</link>
      <description>You can use like,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; # netstat -nap icmp&lt;BR /&gt; # ps -ef | grep ping&lt;BR /&gt;&lt;BR /&gt;to get ping related operations.&lt;BR /&gt;&lt;BR /&gt;hth.</description>
      <pubDate>Wed, 06 Jul 2005 03:08:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910784#M560239</guid>
      <dc:creator>Muthukumar_5</dc:creator>
      <dc:date>2005-07-06T03:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910785#M560240</link>
      <description>Has someone perhaps installed/configured/started a monitoring application on a node somewhere?&lt;BR /&gt;I think OpenView Network Node Manager may do this to discover nodes, for example.</description>
      <pubDate>Wed, 06 Jul 2005 03:17:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910785#M560240</guid>
      <dc:creator>melvyn burnard</dc:creator>
      <dc:date>2005-07-06T03:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910786#M560241</link>
      <description>Thanks for the replies guys,&lt;BR /&gt;&lt;BR /&gt;The ps -ef | grep ping return nothing except my grep.&lt;BR /&gt;The netstat -nap icmp returns this:&lt;BR /&gt;&lt;BR /&gt;icmp:&lt;BR /&gt;        739602 calls to icmp_error&lt;BR /&gt;        0 errors not generated because old message was icmp&lt;BR /&gt;        Output histogram:&lt;BR /&gt;                echo reply: 3803&lt;BR /&gt;                destination unreachable: 739560&lt;BR /&gt;                routing redirect: 5&lt;BR /&gt;                time exceeded: 39&lt;BR /&gt;        0 messages with bad code fields&lt;BR /&gt;        0 messages &amp;lt; minimum length&lt;BR /&gt;        0 bad checksums&lt;BR /&gt;        0 messages with bad length&lt;BR /&gt;        Input histogram:&lt;BR /&gt;                echo reply: 32462&lt;BR /&gt;                destination unreachable: 8163&lt;BR /&gt;                routing redirect: 35&lt;BR /&gt;                echo: 3803&lt;BR /&gt;                time exceeded: 39&lt;BR /&gt;        3803 message responses generated&lt;BR /&gt;&lt;BR /&gt;Does anything seem abnormal?&lt;BR /&gt;&lt;BR /&gt;As for someone installing a monitoring application, well, our consultants&lt;BR /&gt;are somewhat confused and often do strange things...i'll see what i can find out.&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Jul 2005 10:33:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910786#M560241</guid>
      <dc:creator>Nicolas_17</dc:creator>
      <dc:date>2005-07-06T10:33:52Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910787#M560242</link>
      <description>If I remember correctly, ICMP echo requests can be generated via a raw IP socket.  Perhaps lsof can be used to show which processes on a system have a raw IP socket open rather than a TCP or UDP endpoint.  You might then confirm that is the process by using a system call trace such as that from tusc.&lt;BR /&gt;&lt;BR /&gt;Unless the ICMP echo requests are coming at a _very_ high rate and/or are using spoofed source IPs, even if your firewalls were not filtering them, they would not be causing any problems.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Jul 2005 11:45:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910787#M560242</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-07-06T11:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910788#M560243</link>
      <description>Have you recently installed Big Brother? This pings servers/workstations to check connectivity.&lt;BR /&gt;&lt;BR /&gt;Mark Syder (like the drink but spelt different)</description>
      <pubDate>Thu, 07 Jul 2005 03:40:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910788#M560243</guid>
      <dc:creator>MarkSyder</dc:creator>
      <dc:date>2005-07-07T03:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910789#M560244</link>
      <description># lsof -i | grep ICMP&lt;BR /&gt;dced       1359 root   11u  IPv4 0x429f0e40      0t0 ICMP *:*&lt;BR /&gt;ping       9721 root    6u  IPv4 0x4293c040      0t0 ICMP *:*&lt;BR /&gt;&lt;BR /&gt;to see if you can spot any suspects.</description>
      <pubDate>Thu, 07 Jul 2005 05:14:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910789#M560244</guid>
      <dc:creator>Ermin Borovac</dc:creator>
      <dc:date>2005-07-07T05:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910790#M560245</link>
      <description>Rick, when you say:&lt;BR /&gt;&lt;BR /&gt;"If I remember correctly, ICMP echo requests can be generated via a raw IP socket."&lt;BR /&gt;&lt;BR /&gt;What does this mean? Because they are exactly that, echo requests, I can see it in my trace report.&lt;BR /&gt;&lt;BR /&gt;Ermin, the output gives me only one process using icmp:&lt;BR /&gt;&lt;BR /&gt;root 12012 13988   0   Jun 22      - 54:29 nim_ether&lt;BR /&gt;&lt;BR /&gt;Does this mean we found the culprit?&lt;BR /&gt;&lt;BR /&gt;Thanks again for the replies!&lt;BR /&gt;&lt;BR /&gt;Nicolas.</description>
      <pubDate>Thu, 07 Jul 2005 09:00:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910790#M560245</guid>
      <dc:creator>Nicolas_17</dc:creator>
      <dc:date>2005-07-07T09:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910791#M560246</link>
      <description>An HP server with dead gateway detection turned on will ping its gateways periodically.  This feature is on by default in most HPUX 11.0 and higher.  &lt;BR /&gt;&lt;BR /&gt;You can turn it off with ndd.&lt;BR /&gt;&lt;BR /&gt;ndd -set /dev/ip ip_ire_gw_probe 0&lt;BR /&gt;&lt;BR /&gt;tho to make it stick after a reboot you need to edit /etc/rc.config.d/nddconf to add:&lt;BR /&gt;&lt;BR /&gt;TRANSPORT_NAME[0]=ip&lt;BR /&gt;NDD_NAME[0]=ip_ire_gw_probe&lt;BR /&gt;NDD_VALUE[0]=0&lt;BR /&gt;&lt;BR /&gt;Use the next higher integer in the brackets if you already have entries there.&lt;BR /&gt;&lt;BR /&gt;HPUX 10.3 and 11.0 also use an MTU detection scheme based on pings.  This can also be changed in NDD.&lt;BR /&gt;&lt;BR /&gt;/usr/bin/ndd -set /dev/ip ip_pmtu_strategy 1&lt;BR /&gt;&lt;BR /&gt;or in nddconf:&lt;BR /&gt;&lt;BR /&gt;TRANSPORT_NAME[1]=ip&lt;BR /&gt;      NDD_NAME[1]=ip_pmtu_strategy&lt;BR /&gt;      NDD_VALUE[1]=1&lt;BR /&gt;&lt;BR /&gt;The original default, Option 2 was dropped in 11i.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Ron&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jul 2005 10:22:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910791#M560246</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2005-07-07T10:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910792#M560247</link>
      <description>Yes, well that's likely to be the culprit.&lt;BR /&gt;&lt;BR /&gt;You can verify with tusc. If you don't have tusc you can get it from&lt;BR /&gt;&lt;BR /&gt;&lt;A href="ftp://ftp.cup.hp.com/dist/networking/tools" target="_blank"&gt;ftp://ftp.cup.hp.com/dist/networking/tools&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Then attach to the process as&lt;BR /&gt;&lt;BR /&gt;# tusc -fv -s sendto &lt;PID&gt;&lt;BR /&gt;&lt;BR /&gt;In the output you should see this process making connections to other systems.&lt;/PID&gt;</description>
      <pubDate>Thu, 07 Jul 2005 20:14:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910792#M560247</guid>
      <dc:creator>Ermin Borovac</dc:creator>
      <dc:date>2005-07-07T20:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910793#M560248</link>
      <description>I mean it is not a TCP or UDP socket :)</description>
      <pubDate>Fri, 08 Jul 2005 20:50:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910793#M560248</guid>
      <dc:creator>rick jones</dc:creator>
      <dc:date>2005-07-08T20:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Rogue pings</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910794#M560249</link>
      <description>Thanks for all your help guys!&lt;BR /&gt;&lt;BR /&gt;I'm closing this thread now that we found the process responsible for the pings...and that it seems to be a necessary process for our cluster to work!&lt;BR /&gt;&lt;BR /&gt;Thanks again!</description>
      <pubDate>Mon, 18 Jul 2005 07:00:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/rogue-pings/m-p/4910794#M560249</guid>
      <dc:creator>Nicolas_17</dc:creator>
      <dc:date>2005-07-18T07:00:57Z</dc:date>
    </item>
  </channel>
</rss>

