Im VirtualBox-Guest-System ist die IP angeblich gewürfelt: 08-00-27-nn-nn-nn - es läuft derzeit nur eine Maschine
ImHost-System ist es die native Intel A4-34-D9-nn-nn-nn .
Ich schrieb aber bereits, dass im heimischen W-LAN IPv4-Adressen per DHCP vom selben Guest-System bezogen werden.
Vom Guest aus im Freifunk gibt ein
nmap -sU -p 67 --script=dhcp-discover
https://nmap.org/nsedoc/scripts/dhcp-discover.html
Starting Nmap 7.01 ( https://nmap.org ) at 2016-10-21 01:33 Mitteleuropäische Sommerzeit
Nmap scan report for 10.86.16.2
Host is up (0.00s latency).
PORT STATE SERVICE
67/udp open dhcps
| dhcp-discover:
| DHCP Message Type: DHCPACK
| Server Identifier: 10.86.16.2
| Subnet Mask: 255.255.252.0
| Router: 10.86.16.2
| Domain Name Server: 10.86.16.2
|_ Interface MTU: 1280
MAC Address: 56:53:F2:27:C6:6E (Unknown)
Nmap done: 1 IP address (1 host up) scanned in 1.41 seconds
im heimischen W-LAN
Starting Nmap 7.01 ( https://nmap.org ) at 2016-10-21 01:47 Mitteleuropäische Sommerzeit
Nmap scan report for pfSense163.localdomain (172.27.163.0)
Host is up (0.00s latency).
PORT STATE SERVICE
67/udp open dhcps
| dhcp-discover:
| DHCP Message Type: DHCPACK
| Server Identifier: 172.27.163.0
| Subnet Mask: 255.255.0.0
| Router: 172.27.163.0
| Domain Name Server: 172.27.163.0
|_ Domain Name: localdomain
MAC Address: 00:0D:B9:40:EA:6E (PC Engines GmbH)
Nmap done: 1 IP address (1 host up) scanned in 1.36 seconds
Nach erneutem “Würfeln” ist eine neue MAC gesetzt, welche auch im syslog auf dem GW auftaucht und wie oben beschrieben mit einem DHCPOFFER beantwortet wird.
Im Freifunk ergab ein windump während einem ipconfig /renew LAN-Verbindung:
C:\service>WinDump.exe -e -n -i 1 port 67 or port 68
WinDump.exe: listening on \Device\NPF_{C0AC20ED-07CD-420E-9EBE-0B7C4C7B1086}
02:17:56.367499 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:17:59.364070 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:18:07.360514 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:18:22.360122 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:18:55.357106 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:18:59.355435 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:19:07.356843 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
02:19:23.355575 08:00:27:eb:59:c2 > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 343: 0.0.0.0.68 > 255.255.255.255 .67: BOOTP/DHCP, Request from 08:00:27:eb:59:c2, length 301
8 packets captured
1099 packets received by filter
0 packets dropped by kernel
Zur Info bezüglich der Netzmaske
255.255.252.0 = 22
Unser Netzsegment der Domäne 03 lautet 10.86.16.0/22 --> von .16.0-.19.255
Die DHCP-Range des (ersten) GW02 10.86.16.25-10.86.17.254