Jump to content

SUBIECTE NOI
« 1 / 5 »
RSS
Boxa membrana tweeter infundata

ajutor

Whisky for Mac

Xiaomi 14 Gpay
 Izolare zid exterior de scandura

Dezinstalare drivere W11 23H3

Recomandare masina de spalat fiab...

BSOD din cauza Intel Audio DSP dr...
 De ce sunt oamenii nostalgici

Cum vand casa fara factura Hidroe...

Scor FICO minim

Tonometru compensat CAS?
 polita RCA ONLINE

Termostat frigider - verificare

Mai au PC-urile vreun viitor?

Centrala termica immergas
 

[Rezolvat] Trafic TCP port 11111

- - - - -
  • Please log in to reply
7 replies to this topic

#1
GhostWolf

GhostWolf

    Junior Member

  • Grup: Validating
  • Posts: 43
  • Înscris: 27.06.2017
Salut,

Jucandu-ma cu iptables-ul am gasit in journal urmatoarele linii:

Quote

[REJECT TCPv4] IN=lo OUT= MAC=00:00:00:00:00:00:00:00:00:00:00:00:08:00 SRC=127.0.0.1 DST=127.0.0.1 LEN=52 TOS=0x08 PREC=0x00 TTL=64 ID=5399 DF PROTO=TCP SPT=42134 DPT=11111 WINDOW=43690 RES=0x00 SYN URGP=0 OPT (0204FFD70101040201030307)
Ce ma intriga este faptul ca pachetul care a generat aceasta linie este originat local, conform cu ce imi apare in log. Problema este cu acel port 11111 care nu este deschis pe sistem si nu imi dau seama ce e cu acest trafic. Din cautarile pe google nu am reusit sa gasesc o explicatie pentru acest trafic, majoritatea rezultatelor se rezuma la Viral Computing Environment (VCE) ca descriere pentru portul 11111/tcp.
nmap, ps ax, htop, netstat, nu gasesc nimic in neregula, 127.0.0.1 nu asculta pe acel port.

A mai avut cineva de a face cu astfel de mesaje in log-uri in caz ca s-a jucat cineva cu firewall-ul? Ma gandesc ca este ceva in neregula cu sistemul si nu imi dau seama ce ar fi. mai ales ca am mai gasit si ceva trafic destinat catre portul 631/tcp originat tot local si fara logica din moment ce nu am cups instalat.

Idei careva? De unde sa ma apuc si unde sa ajung?

#2
neoliviu

neoliviu

    Member

  • Grup: Members
  • Posts: 921
  • Înscris: 09.09.2004
OutlawCountry linux Exploit
https://www.sunnyhoi...ountry-exploit/
scuze daca nu este la obiect, e referitor la reguli iptables invizibile utilizatorului
vezi output la lsmod | grep nf_table

Edited by neoliviu, 10 July 2017 - 12:46.


#3
GhostWolf

GhostWolf

    Junior Member

  • Grup: Validating
  • Posts: 43
  • Înscris: 27.06.2017
Salve,

nu este legat de Outlaw Country. Fie e ceva local care incearca sa comunice pe portul ala, sper eu, fie sistemul este spart si ceva incearca sa comunice local pentru a initia ceva actiune. Problema e ca nu imi dau seama ce aplicatie incearca sa comuice cu acel port pentru a verifica in continuare daca aplicatia aia comunica legitim sau nu. Trebuie sa sap dar incep sa raman in pana de ideei.

#4
mhanor

mhanor

    Senior Member

  • Grup: Senior Members
  • Posts: 2,019
  • Înscris: 12.01.2004
Poate te ajută:
https://serverfault.com/a/193088

Pe pagină sunt și alte posibile soluții/idei, care folosesc systemtap (stap).

Eventual adugă o regulă să dea drop cu -j LOG --log-uid, măcar să poți observa user id-ul.

Edited by mhanor, 10 July 2017 - 18:26.


#5
GhostWolf

GhostWolf

    Junior Member

  • Grup: Validating
  • Posts: 43
  • Înscris: 27.06.2017
O sa incerc sa log-ez si UID-ul sa vad daca e de la user-ul meu sau altceva.

#6
GhostWolf

GhostWolf

    Junior Member

  • Grup: Validating
  • Posts: 43
  • Înscris: 27.06.2017
LE: Cred ca am rezolvat misterul. Din cate vad eu problema mea se traduce prin rtorrent, am pornit beleaua de client in timp ce rulam tcpdump pe loopback. Cand porneste rtorrent-ul, pachet binar instalat din repozitor, vad traficul ala nenorocit catre portul 11111/tcp:

Quote

2017-07-11 09:24:59.028283 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 23267, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51142 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0xb917), seq 369560052, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.028354 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51142: Flags [R.], cksum 0xfe1c (incorrect -> 0x9ea4), seq 0, ack 369560053, win 0, length 0
2017-07-11 09:24:59.028630 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 25109, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51150 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0x538b), seq 1417490690, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.028651 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51150: Flags [R.], cksum 0xfe1c (incorrect -> 0x3918), seq 0, ack 1417490691, win 0, length 0
2017-07-11 09:24:59.028743 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 65051, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51154 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0x6817), seq 3286412556, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.028762 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51154: Flags [R.], cksum 0xfe1c (incorrect -> 0x4da4), seq 0, ack 3286412557, win 0, length 0
2017-07-11 09:24:59.028871 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 12276, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51158 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0xb640), seq 2782821603, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.028889 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51158: Flags [R.], cksum 0xfe1c (incorrect -> 0x9bcd), seq 0, ack 2782821604, win 0, length 0
2017-07-11 09:24:59.029286 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 51101, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51216 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0x4e15), seq 4129854602, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.029306 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51216: Flags [R.], cksum 0xfe1c (incorrect -> 0x33a2), seq 0, ack 4129854603, win 0, length 0
2017-07-11 09:24:59.029432 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 59160, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51230 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0xc449), seq 1617015823, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.029448 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51230: Flags [R.], cksum 0xfe1c (incorrect -> 0xa9d6), seq 0, ack 1617015824, win 0, length 0
2017-07-11 09:24:59.029553 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 66: (tos 0x8, ttl 64, id 12715, offset 0, flags [DF], proto TCP (6), length 52)
    127.0.0.1.51234 > 127.0.0.1.11111: Flags [S], cksum 0xfe28 (incorrect -> 0xabdf), seq 3390726844, win 43690, options [mss 65495,nop,nop,sackOK,nop,wscale 7], length 0
2017-07-11 09:24:59.029568 00:00:00:00:00:00 > 00:00:00:00:00:00, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    127.0.0.1.11111 > 127.0.0.1.51234: Flags [R.], cksum 0xfe1c (incorrect -> 0x916c), seq 0, ack 3390726845, win 0, length 0
Mai trebuie sa arunc o privire prin codul de la rtorrent sa vad ce gasesc legat de portul 11111/tcp si de ce doreste sa discute cu el.

#7
GhostWolf

GhostWolf

    Junior Member

  • Grup: Validating
  • Posts: 43
  • Înscris: 27.06.2017
[Solved]
Dupa cum am zis mai sus, rtorrent este vinovat pentru traficul ciudat observat in log-uri si cu tcpdump. Am rulat un strace pe el si am gasit ca face el ceva, inca nu stiu de ce, ma asteptam la ceva RPC ca de aia e compilat cu suport pentru RPC dar vad ca nu e chiar asa:

Quote

4617  11:44:34.776782 connect(141<TCP:[136313]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)
4617  11:44:34.781047 connect(144<TCP:[134202]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)
4617  11:44:34.798350 connect(161<TCP:[133498]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)
4617  11:44:34.799929 connect(162<TCP:[133499]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)
4617  11:44:34.802172 connect(164<TCP:[133501]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)
4617  11:44:34.812064 connect(173<TCP:[133510]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)
4617  11:44:34.813554 connect(174<TCP:[133511]>, {sa_family=AF_INET, sin_port=htons(11111), sin_addr=inet_addr("127.0.0.1")}, 16) = -1 EINPROGRESS (Operation now in progress)


#8
shogun1

shogun1

    Cranky old n00b ☯

  • Grup: Senior Members
  • Posts: 7,542
  • Înscris: 31.01.2009
Multumim pentru feedback, am modificat titlul precizand ca ai rezolvat problema.

Anunturi

Neurochirurgie minim invazivă Neurochirurgie minim invazivă

"Primum non nocere" este ideea ce a deschis drumul medicinei spre minim invaziv.

Avansul tehnologic extraordinar din ultimele decenii a permis dezvoltarea tuturor domeniilor medicinei. Microscopul operator, neuronavigația, tehnicile anestezice avansate permit intervenții chirurgicale tot mai precise, tot mai sigure. Neurochirurgia minim invazivă, sau prin "gaura cheii", oferă pacienților posibilitatea de a se opera cu riscuri minime, fie ele neurologice, infecțioase, medicale sau estetice.

www.neurohope.ro

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Forumul Softpedia foloseste "cookies" pentru a imbunatati experienta utilizatorilor Accept
Pentru detalii si optiuni legate de cookies si datele personale, consultati Politica de utilizare cookies si Politica de confidentialitate