Failure to acquire IP over DHCP

Suvayu Ali fatkasuvayu+linux at gmail.com
Fri Aug 31 13:26:27 UTC 2012


On Fri, Aug 31, 2012 at 01:50:04AM +0200, Suvayu Ali wrote:
> 
> Thanks a lot for the hints.  I'm meeting the admin in person tomorrow,
> these comments will surely be useful.
> 

This is just to update the list, the problem is indeed someone not
following the regulations.  As you can see from the output below,
someone is running an entire (unapproved) network in their office.
Probably they want WiFi since the official WiFi is pretty weak in our
building.

In the output below, 192.168.0.114 is the IP my laptop gets assigned.

# nmap -sn 192.168.0.0-255

Starting Nmap 6.01 ( http://nmap.org ) at 2012-08-31 14:40 CEST
Nmap scan report for 192.168.0.1
Host is up (0.00066s latency).
MAC Address: C8:3A:35:5E:E3:90 (Tenda Technology Co.)
Nmap scan report for 192.168.0.100
Host is up (0.33s latency).
MAC Address: 88:30:8A:36:A9:2A (Murata Manufactuaring Co.)
Nmap scan report for 192.168.0.104
Host is up (0.015s latency).
MAC Address: 98:0C:82:64:FE:1B (Samsung Electro Mechanics)
Nmap scan report for 192.168.0.114
Host is up.
Nmap scan report for 192.168.0.118
Host is up (0.14s latency).
MAC Address: 90:4C:E5:56:BF:03 (Hon Hai Precision Ind. Co.)
Nmap scan report for 192.168.0.129
Host is up (0.060s latency).
MAC Address: A8:26:D9:36:A6:1A (HTC)
Nmap scan report for 192.168.0.196
Host is up (0.43s latency).
MAC Address: 38:16:D1:83:46:B2 (Samsung Electronics Co.)
Nmap done: 256 IP addresses (7 hosts up) scanned in 63.80 seconds

Thanks for all the pointers and discussion.  It was quite educational
for me.

Cheers,

-- 
Suvayu

Open source is the future. It sets us free.


More information about the users mailing list