[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] privoxy, port 8118 scans



On Sun, 2014-01-19 at 15:38 +0000, Mateusz BÅaszczyk wrote:
> Hey
> 
> I am wondering if this is a coincidence but since I started the tor relay, I see a lot of TCP/8118 connections attempts on my relay's external IP.
> 
> I run the offending source IPs (aggregated to /24s) through cymru's ip-to-asn decoder and here are results of only today:
> 
> 
> Bulk mode; whois.cymru.com [2014-01-19 15:16:19 +0000]
> 15003   | 108.177.181.0    | 108.177.180.0/22    | US | arin     | 2012-03-15 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 142.91.245.0     | 142.91.240.0/21     | US | arin     | 2012-06-08 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 172.240.255.0    | 172.240.0.0/16      | US | arin     | 2013-04-08 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.208.16.0     | 173.208.16.0/21     | US | arin     | 2009-12-17 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.208.57.0     | 173.208.56.0/22     | US | arin     | 2009-12-17 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.208.85.0     | 173.208.80.0/21     | US | arin     | 2009-12-17 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.12.0     | 173.234.12.0/22     | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.153.0    | 173.234.152.0/22    | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.235.0    | 173.234.232.0/22    | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.247.0    | 173.234.244.0/22    | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.33.0     | 173.234.32.0/22     | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.41.0     | 173.234.40.0/22     | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 173.234.60.0     | 173.234.56.0/21     | US | arin     | 2010-02-12 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 23.19.130.0      | 23.19.128.0/22      | US | arin     | 2011-04-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 23.19.50.0       | 23.19.50.0/23       | US | arin     | 2011-04-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 23.19.54.0       | 23.19.52.0/22       | US | arin     | 2011-04-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 23.19.67.0       | 23.19.64.0/20       | US | arin     | 2011-04-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 23.19.75.0       | 23.19.64.0/20       | US | arin     | 2011-04-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 23.19.89.0       | 23.19.88.0/21       | US | arin     | 2011-04-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 15003   | 70.32.43.0       | 70.32.43.0/24       | US | arin     | 2008-07-25 | NOBIS-TECH - Nobis Technology Group, LLC
> 18450   | 173.231.54.0     | 173.231.0.0/18      | US | arin     | 2010-03-19 | WEBNX - WebNX, Inc.
> 20248   | 74.82.191.0      | 74.82.176.0/20      | US | arin     | 2010-01-26 | TAKE2 - Take 2 Hosting, Inc.
> 40676   | 216.24.204.0     | 216.24.192.0/20     | US | arin     | 2010-10-14 | AS40676 - Psychz Networks
> 46475   | 192.169.84.0     | 192.169.80.0/20     | US | arin     | 2012-11-02 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 192.169.86.0     | 192.169.80.0/20     | US | arin     | 2012-11-02 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 208.115.203.0    | 208.115.192.0/18    | US | arin     | 2010-01-06 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 208.115.228.0    | 208.115.192.0/18    | US | arin     | 2010-01-06 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 216.245.222.0    | 216.245.192.0/19    | US | arin     | 2008-01-28 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 63.143.33.0      | 63.143.32.0/19      | US | arin     | 2011-10-27 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 63.143.36.0      | 63.143.32.0/19      | US | arin     | 2011-10-27 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 63.143.52.0      | 63.143.32.0/19      | US | arin     | 2011-10-27 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 64.31.43.0       | 64.31.0.0/18        | US | arin     | 2010-12-27 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 69.162.116.0     | 69.162.64.0/18      | US | arin     | 2008-06-27 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 69.162.74.0      | 69.162.64.0/18      | US | arin     | 2008-06-27 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 74.63.226.0      | 74.63.192.0/18      | US | arin     | 2008-08-29 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 46475   | 74.63.249.0      | 74.63.192.0/18      | US | arin     | 2008-08-29 | LIMESTONENETWORKS - Limestone Networks, Inc.
> 
> There were almost 200k SYN packets sent for the last 15h from the 228 unique IP addresses.
> 
> Would that be part of tor project?
> I have never run privoxy on my network and I am not really sure what the relation between tor and privoxy is?
> Can somebody shine some light on that?

Hi there!

Some months ago I noticed similar traffic on port 8123, which is the
default port for polipo, on one of my exit nodes. Since my router
crashed unable to cope with traffic, I called it DDoS, but it is not
clear to me if someone did that on purpose (to slow down the network, in
a hunch to de-anon someone) or if it's just the lamest attempt on
discovering open socks ports.

The majority of source ip addresses where from limestone networks. I
sent them one email which they did not answer and also sent a copy to
this list and FD.

One thing for me is clear though, this is not part of tor project since
no one here claimed to be running such a test.

Onward you will find a copy of the mail I sent:

***********

Hello dear companions,

Two days ago one of my tor exit nodes experienced something I'm now
calling "limestonenetworks DDoS on polipo" ( $WAN_IP:8123 ), since all
packets in the storm were flowing from a range of 514 different IP
addresses, all of them inside limestonenetworks IP range and targeting
port 8123 on my tor exit node WAN IP.

Before the packet storm, I could observe a huge increase on attempts to
access my WAN domain through tor. I couldn't relate IP addresses from
this first raise to those responsible for the actual packet storm nor
could I identify some useful pattern there, but they were all coming
from port 9001 and increased just some hours before the storm, so I'm
guessing they are related somehow.

Also, throughout the storm, one of my log files got corrupted with some
unreadable bin garbage. I do not know if it was intended/targeted
exploit, but I'm reworking secrets and trying to figure out what is this
binary.

Here is a sample line of a WAN attempt:

Aug 13 16:50:22 $USER user.warn kernel: [DROP INVALID WAN] : IN=vlan2
OUT= MAC=xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
SRC=77.56.151.190 DST=xxx.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=43
ID=38787 DF PROTO=TCP SPT=40888 DPT=9001 SEQ=289854459 ACK=41163

Here is a sample line of packet storm:

Aug 13 20:39:14 $USER user.warn kernel: [hammer] : IN=vlan2 OUT=
MAC=xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
SRC=74.63.216.60 DST=xxx.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=48
ID=20269 DF PROTO=TCP SPT=1757 DPT=8123 WINDOW=65535 RES=0x00 SYN URGP=0
OP

The attack persisted for at least three hours and left this binary (hex
represented):

0000000 0000 0000 0000 0000 0000 0000 0000 0000
*
0000b90 0000 0000 0000 0000 0000 0000 2067 3331
0000ba0 3220 3a30 3135 303a 2034 6174 6567 7573
0000bb0 7568 7520 6573 2e72 6177 6e72 6b20 7265
0000bc0 656e 3a6c 5b20 6168 6d6d 7265 205d 203a
0000bd0 4e49 763d 616c 326e 4f20 5455 203d 414d
0000be0 3d43 3030 323a 3a31 3732 663a 3a61 6464
0000bf0 343a 3a34 3030 313a 3a35 3966 323a 3a61
0000c00 6639 643a 3a39 3830 303a 3a30 3534 303a
0000c10 3a30 3030 333a 2034 5253 3d43 3132 2e36
0000c20 3432 2e35 3232 2e31 3031 2037 5344 3d54
0000c30 3831 2e39 3833 322e 3533 322e 3035 4c20
0000c40 4e45 353d 2032 4f54 3d53 7830 3030 5020
0000c50 4552 3d43 7830 3030 5420 4c54 343d 2038
0000c60 4449 313d 3335 3431 4420 2046 5250 544f
0000c70 3d4f 4354 2050 5053 3d54 3932 3635 4420
0000c80 5450 383d 3231 2033 4957 444e 574f 363d
0000c90 3535 3533 5220 5345 303d 3078 2030 5953
0000ca0 204e 5255 5047 303d 000a               
0000ca9

Attached is the list of participating IP addresses, line by line, with
the count of packets received. The attacker started sending something
like 4 packets per second and increased to over than 9000!!! - just
kidding, over 30 per second.

*******

I'll send you a copy with the ip addresses I got at the time so you may
compare with those you got.

-- 
010
001
111

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays