What version of curl is this?
-Brad
mnalis wrote:I'm (sometimes) getting strange "ghost" udp/80 connections in addition to regular tcp/80 ones, has anyone seen this?
Now, I don't think udp/0 is normally allowed port anyway...
Anyway I've looked over and the sites in question do not seem to be cracked.
Any ideas about what may be the problem? I tried allowing them through grsec, but only udp packets that tcpdump sees are standard udp/53 DNS
and my udp/514 remote syslog and udp/161 snmp queries,
none of this 0.0.0.0 udp/0 or udp/80 "ghost" stuff.
Is this a possible glitch in grsecurity patch?
May 28 16:15:36 g0n kernel: [184729.388178] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.148.84.95 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~er #122:30151] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3230] uid/euid:1000/1000 gid/egid:1000/1000
May 28 16:15:36 g0n kernel: [184729.388194] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.69.143.151 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~er #122:30151] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3230] uid/euid:1000/1000 gid/egid:1000/1000
May 28 16:15:37 g0n kernel: [184729.637906] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.69.143.151 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~er #121:30150] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3230] uid/euid:1000/1000 gid/egid:1000/1000
May 28 16:15:37 g0n kernel: [184729.637916] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.148.84.95 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~er #121:30150] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3230] uid/euid:1000/1000 gid/egid:1000/1000
$ tshark -r dump_160528_1609_g0n.pcap -qz hosts | grep 54.69.143.151
54.69.143.151 www.sitepoint.com
$
May 28 18:21:58 g0n kernel: [192310.895870] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.230.46.161 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~er #127:1937] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3230] uid/euid:1000/1000 gid/egid:1000/1000
$ rm -rf /home/miro/.cache/mozilla/firefox/<salt>.default/*
# rsync -av /dirty-long-time-online-system-dump/home/user/ /new-from-backup/home/user/
May 29 15:37:29 g0n kernel: [ 7823.362237] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.69.136.250 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:29 g0n kernel: [ 7823.362276] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.191.85.92 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:29 g0n kernel: [ 7823.362306] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.149.54.54 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:30 g0n kernel: [ 7824.566717] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 52.36.105.160 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:58 g0n kernel: [ 7852.377330] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.230.46.166 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:58 g0n kernel: [ 7852.377341] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.230.46.8 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:58 g0n kernel: [ 7852.377348] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.230.46.160 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:37:58 g0n kernel: [ 7852.377355] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.230.46.168 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:38:22 g0n kernel: [ 7876.492185] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 23.53.187.27 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:38:27 g0n kernel: [ 7882.212479] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 63.245.213.48 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #2:4595] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:38:27 g0n kernel: [ 7882.212518] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 63.245.213.49 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #2:4595] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 29 15:38:27 g0n kernel: [ 7882.212548] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 63.245.213.47 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #2:4595] uid/euid:1000/1000 gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
Secure Connection Failed
The connection to the server was reset while the page was loading.
* The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
* Please contact the website owners to inform them of the problem.
$ cat denied_connect.ls-1
54.69.136.250
54.191.85.92
54.149.54.54
52.36.105.160
54.230.46.166
54.230.46.8
54.230.46.160
54.230.46.168
23.53.187.27
63.245.213.48
63.245.213.49
63.245.213.47
$
$ for i in $(cat denied_connect.ls-1); do grep $i dump_160529_1536_g0n.hosts ; done ;
54.69.136.250 search.r53-2.services.mozilla.com
54.191.85.92 search.r53-2.services.mozilla.com
54.149.54.54 search.r53-2.services.mozilla.com
52.36.105.160 shavar.prod.mozaws.net
54.230.46.166 dcky6u1m8u6el.cloudfront.net
54.230.46.8 dcky6u1m8u6el.cloudfront.net
54.230.46.82 dcky6u1m8u6el.cloudfront.net
54.230.46.160 dcky6u1m8u6el.cloudfront.net
54.230.46.168 dcky6u1m8u6el.cloudfront.net
23.53.187.27 e8218.dscb1.akamaiedge.net
63.245.213.48 aus5.external.zlb.scl3.mozilla.com
63.245.213.49 aus5.external.zlb.scl3.mozilla.com
63.245.213.47 aus5.external.zlb.scl3.mozilla.com
timbgo wrote:And I tried to post, this morning at these forums, and lo and behold:
- Code: Select all
May 29 15:37:29 g0n kernel: [ 7823.362237] grsec: (miro:U:/usr/lib64/firefox/firefox) denied connect() to 54.69.136.250 port 0 sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Resolver #1:4556] uid/euid:1000/1000 gid/egid:1000/1000,
....
$ rm -rf /home/miro/.cache/mozilla/firefox/<salt>.default/*
-o "ssl.keylog_file: dump_160531_2xxx_SSLKEYLOGFILS.txt"
tshark -r dump_160531_2119_g0n.pcap ...
tshark -o "ssl.keylog_file: dump_160531_2xxx_SSLKEYLOGFILS.txt" -r dump_160531_2119_g0n.pcap ...
messages_160531_2300_g0n
chmod 755 dLo.sh
./dLo.sh
$ grep ' port 0 ' messages_160531_2300_g0n | wc -l
74
$
dump_160531_2119_g0n.pcap
dump_160531_2145_g0n.pcap
dump_160531_2253_g0n.pcap
tshark -r dump_160531_2119_g0n.pcap -Y \
'!(frame.number in {4427 9945 10181 10461 10740})' \
-w dump_160531_2119_g0n_noRegister_noLogin.pcap
tshark -r dump_160531_2145_g0n.pcap -Y '!(frame.number in {34 681})' -w \
dump_160531_2145_g0n_noLogin.pcap
dump_160531_2119_g0n_noRegister_noLogin.pcap
dump_160531_2145_g0n_noLogin.pcap
May 31 21:20:01 g0n kernel: [201257.097438] grsec:
(miro:U:/usr/lib64/firefox/firefox) denied connect() to 96.45.83.209 port 0
sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~ver
#10:28767] uid/euid:1000/1000 gid/egid:1000/1000, parent
/usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
from the messages_160531_2300_g0n, with what happened online at those aproximate moments (in the above line at May 31 21:20:01 CET which is May 31 19:20:01 GMT) with those traces.
To be able to do that more easily I'll be converting the times in the logs excerpts, one operation per each traffic trace, to the offset from the time of the execution of my (primitive) program uncenz ( http://github.com/miroR/uncenz ) which starts dumpcap and ffmpeg screencasting when it is executed, corrected for the time that is recorded in the traces as the 0 time, the start time, which is usually 5 to 6 seconds later. Reason: I first start the uncenz-1st script and then I manually plug into the socket of my aDSL router. That or something additional along it, makes for that different start time in the traces, I think.
$ capinfos dump_160531_2???_g0n.pcap | grep -E 'File name|packet time'
File name: dump_160531_2119_g0n.pcap
First packet time: 2016-05-31 21:19:50.373249619
Last packet time: 2016-05-31 21:27:05.371101231
File name: dump_160531_2145_g0n.pcap
First packet time: 2016-05-31 21:46:04.501589864
Last packet time: 2016-05-31 21:51:36.221933010
File name: dump_160531_2253_g0n.pcap
First packet time: 2016-05-31 22:53:24.966980372
Last packet time: 2016-05-31 23:00:15.913225176
$
$ head -1 messages_160531_2300_g0n_2???_section
==> messages_160531_2300_g0n_2119_section <==
May 31 21:19:44 g0n kernel: [201240.450830] grsec: (miro:U:/) exec of
/usr/local/bin/uncenz-1st (uncenz-1st ) by
/usr/local/bin/uncenz-1st[bash:28624] uid/euid:1000/1000 gid/egid:1000/1000,
parent /bin/bash[bash:3287] uid/euid:1000/1000 gid/egid:1000/1000
==> messages_160531_2300_g0n_2145_section <==
May 31 21:45:59 g0n kernel: [202815.613220] grsec: (miro:U:/) exec of
/usr/local/bin/uncenz-1st (uncenz-1st ) by
/usr/local/bin/uncenz-1st[bash:32285] uid/euid:1000/1000 gid/egid:1000/1000,
parent /bin/bash[bash:3287] uid/euid:1000/1000 gid/egid:1000/1000
==> messages_160531_2300_g0n_2253_section <==
May 31 22:53:20 g0n kernel: [206856.753220] grsec: (miro:U:/) exec of
/usr/local/bin/uncenz-1st (uncenz-1st ) by
/usr/local/bin/uncenz-1st[bash:32729] uid/euid:1000/1000 gid/egid:1000/1000,
parent /bin/bash[bash:3287] uid/euid:1000/1000 gid/egid:1000/1000
$
$ ./hhmmss2sec messages_160531_2300_g0n_2119_section 21:19:44 6
$ ./hhmmss2sec messages_160531_2300_g0n_2145_section 21:45:59 5
$ ./hhmmss2sec messages_160531_2300_g0n_2253_section 22:53:20 5
messages_160531_2300_g0n_2119_section_in_sec
messages_160531_2300_g0n_2145_section_in_sec
messages_160531_2300_g0n_2253_section_in_sec
messages_160531_2300_g0n_2???_section_in_sec_port_0
tshark -r dump_160531_2XXX_g0n.pcap -qz hosts > dump_160531_2XXX_g0n.hosts
$ cat messages_160531_2300_g0n_2119_section_in_sec | grep ' port 0 ' > \
messages_160531_2300_g0n_2119_section_in_sec_port_0
$ for i in $(cat messages_160531_2300_g0n_2119_section_in_sec_port_0 | sed \
's/.*denied connect() to \(.*\) port 0 .*/\1/'); do grep $i \
dump_160531_2119_g0n.hosts ; read FAKE; done ;
$ cat messages_160531_2300_g0n_2119_section_in_sec_port_0 | sed \
's/.*denied connect() to \(.*\) port 0 .*/\1/'
96.45.83.209 ddg.gg
96.45.83.40 ddg.gg
96.45.82.53 ddg.gg
96.45.82.134 ddg.gg
216.58.214.206 encrypted-tbn0.gstatic.com
216.58.214.225 tpc.googlesyndication.com
216.58.214.227 www.gstatic.com
74.125.206.103 www.google.com
216.58.214.206 encrypted-tbn0.gstatic.com
63.245.213.49 aus5.external.zlb.scl3.mozilla.com
63.245.213.47 aus5.external.zlb.scl3.mozilla.com
63.245.213.48 aus5.external.zlb.scl3.mozilla.com
104.20.54.69 forum.palemoon.org
104.20.55.69 forum.palemoon.org
216.58.209.194 googleads.g.doubleclick.net
216.58.209.194 googleads.g.doubleclick.net
216.58.209.194 googleads.g.doubleclick.net
104.20.55.69 forum.palemoon.org
104.20.54.69 forum.palemoon.org
104.20.54.69 forum.palemoon.org
104.20.55.69 forum.palemoon.org
104.20.55.69 forum.palemoon.org
216.58.213.35 csi.gstatic.com
216.58.218.3 csi.gstatic.com
216.58.213.35 csi.gstatic.com
216.58.213.3 csi.gstatic.com
216.58.209.131 csi.gstatic.com
216.58.209.162 googleads.g.doubleclick.net
216.58.209.162 googleads.g.doubleclick.net
216.58.211.33 tpc.googlesyndication.com
216.58.211.46 encrypted-tbn3.gstatic.com
$ tshark -r dump_160531_2119_g0n.pcap -Y 'ip.addr in {96.45.83.209 96.45.83.40
96.45.82.53 96.45.82.134}'
216.58.214.206 encrypted-tbn0.gstatic.com
216.58.214.225 tpc.googlesyndication.com
216.58.214.227 www.gstatic.com
74.125.206.103 www.google.com
216.58.214.206 encrypted-tbn0.gstatic.com
tshark -r dump_160531_2119_g0n.pcap -Y '(ip.addr in {216.58.214.0/24})'
tshark -r dump_160531_2119_g0n.pcap -Y '(ip.addr==74.125.206.0/24)'
$ grep 74.125.206.103 messages_160531_2300_g0n_2119_section_in_sec
$ grep 74.125.206.103 messages_160531_2300_g0n_2119_section_in_sec
24 g0n kernel: [201270.080550] grsec: (miro:U:/usr/lib64/firefox/firefox)
denied connect() to 74.125.206.103 port 0 sock type dgram protocol udp by
/usr/lib64/firefox/firefox[DNS Res~ver #10:28767] uid/euid:1000/1000
gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000
gid/egid:1000/1000
1761 24.414029896 192.168.1.2 -> 74.125.206.103 TCP 68 58586 → https [ACK]
Seq=637 Ack=4442 Win=43520 Len=0 TSval=200950685 TSecr=1237785781
1992 34.373983029 192.168.1.2 -> 74.125.206.103 TCP 68 [TCP Keep-Alive] 58586
→ https [ACK] Seq=636 Ack=4442 Win=43520 Len=0 TSval=200960645
TSecr=1237785781
1993 34.417338750 74.125.206.103 -> 192.168.1.2 TCP 68 [TCP Keep-Alive ACK]
https → 58586 [ACK] Seq=4442 Ack=637 Win=44928 Len=0 TSval=1237795826
TSecr=200950685
2172 44.448984676 192.168.1.2 -> 74.125.206.103 TCP 68 [TCP Keep-Alive] 58586
→ https [ACK] Seq=636 Ack=4442 Win=43520 Len=0 TSval=200970720
TSecr=1237795826
2173 44.492386193 74.125.206.103 -> 192.168.1.2 TCP 68 [TCP Keep-Alive ACK]
https → 58586 [ACK] Seq=4442 Ack=637 Win=44928 Len=0 TSval=1237805900
TSecr=200950685
2223 54.496996738 192.168.1.2 -> 74.125.206.103 TCP 68 [TCP Keep-Alive] 58586
→ https [ACK] Seq=636 Ack=4442 Win=43520 Len=0 TSval=200980768
TSecr=1237805900
2224 54.540377386 74.125.206.103 -> 192.168.1.2 TCP 68 [TCP Keep-Alive ACK]
https → 58586 [ACK] Seq=4442 Ack=637 Win=44928 Len=0 TSval=1237815948
TSecr=200950685
$ grep -A1 74.125.206.103 messages_160531_2300_g0n
May 31 21:20:14 g0n kernel: [201270.080550] grsec:
(miro:U:/usr/lib64/firefox/firefox) denied connect() to 74.125.206.103 port 0
sock type dgram protocol udp by /usr/lib64/firefox/firefox[DNS Res~ver
#10:28767] uid/euid:1000/1000 gid/egid:1000/1000, parent
/usr/bin/openbox[openbox:3213] uid/euid:1000/1000 gid/egid:1000/1000
May 31 21:20:14 g0n kernel: [201270.080571] grsec: more alerts, logging
disabled for 10 seconds
$
$ tshark -r dump_160531_2119_g0n.pcap -Y '(ip.addr==74.125.206.103)' -w \
dump_160531_2119_g0n_74.125.206.103.pcap
$ cat messages_160531_2300_g0n_2119_section_in_sec_port_0 | head -12|tail -3
68 g0n kernel: [201313.605205] grsec: (miro:U:/usr/lib64/firefox/firefox)
denied connect() to 63.245.213.49 port 0 sock type dgram protocol udp by
/usr/lib64/firefox/firefox[DNS Res~ver #11:28769] uid/euid:1000/1000
gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000
gid/egid:1000/1000
68 g0n kernel: [201313.605216] grsec: (miro:U:/usr/lib64/firefox/firefox)
denied connect() to 63.245.213.47 port 0 sock type dgram protocol udp by
/usr/lib64/firefox/firefox[DNS Res~ver #11:28769] uid/euid:1000/1000
gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000
gid/egid:1000/1000
68 g0n kernel: [201313.605223] grsec: (miro:U:/usr/lib64/firefox/firefox)
denied connect() to 63.245.213.48 port 0 sock type dgram protocol udp by
/usr/lib64/firefox/firefox[DNS Res~ver #11:28769] uid/euid:1000/1000
gid/egid:1000/1000, parent /usr/bin/openbox[openbox:3213] uid/euid:1000/1000
gid/egid:1000/1000
$
$ tshark -r dump_160531_2119_g0n.pcap -Y '(ip.addr==74.125.206.103)&&(udp)'
$
$ grep '63.245.213.' dump_160531_2119_g0n.hosts
63.245.213.47 aus5.external.zlb.scl3.mozilla.com
63.245.213.48 aus5.external.zlb.scl3.mozilla.com
63.245.213.49 aus5.external.zlb.scl3.mozilla.com
$
$ tshark -r dump_160531_2119_g0n.pcap -Y '(ip.addr==63.245.213.0/24)&&(udp)'
$
$ tshark -r dump_160531_2119_g0n.pcap -Y udp
$
$ tshark -r dump_160531_2119_g0n.pcap -Y udp | wc -l
245
$
$ tshark -r dump_160531_2119_g0n.pcap -Y udp | grep -v 192.168.1
1 0.000000000 0.0.0.0 -> 255.255.255.255 DHCP 410 DHCP Request - Transaction ID 0xd38a7989
5 4.559007652 0.0.0.0 -> 255.255.255.255 DHCP 410 DHCP Request - Transaction ID 0xd38a7989
8 4.616281016 fe80::20e:2eff:fe2e:d230 -> ff02::1:2 DHCPv6 197 Information-request XID: 0x3f267d CID: 000100011ae527808e64d7e7d3d8
9 4.634550413 fe80::1 -> fe80::20e:2eff:fe2e:d230 DHCPv6 128 Reply XID: 0x3f267d CID: 000100011ae527808e64d7e7d3d8
$
$ cat messages_160531_2300_g0n_2119_section_in_sec_port_0 | \
grep -v 'dgram protocol udp'
$