LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-04-2004, 09:40 PM   #1
clausawits
Member
 
Registered: Jun 2001
Posts: 147

Rep: Reputation: 16
Firestarter says linuxquestions.org has trinity?


Earlier I was posting a question here, and a little after I was done here and off somewhere else, firestarter peeped out that linuxquestions.org has tried to make a tcp connection on port 33270, which it identifies as associated with the trinity worm.

The hit output from firestarter:
Code:
time:Jan  4 17:42:27 in:eth0 out: port:33270 source:linuxquestions.org dest:myipaddress len:44 tos:0x00 protocol:tcp service:trinity
It was just the one hit... but my usual tactic is to tell firestarter to block hosts that arouse the firewall's interest. I didn't block linuxquestions.org because I frankly don't know that I trust my understanding of what firestarter is telling me anymore.

Any comments/insight?
linuxquestions.org was briefly infected with trinity, but it was caught and fixed?
an infected computer somehow spoofed linuxquestions.org's ip?
it was just pure coincidence that linuxquestions.org was trying to perform some perfectly legitimate business on port 33270, but firestarter couldn't tell the difference?

I don't believe my computer is infected with trinity, since I have done the checks recommended on trinity information pages, and the results were negative.

I browse with mozilla firebird 0.7, (in case it has some cookie handling problem I don't know about that allowed some other infected website to pick a linuxquestions.org cookie to spoof its address)

anyway, your guidance and replies are appreciated..
 
Old 01-05-2004, 12:23 AM   #2
chort
Senior Member
 
Registered: Jul 2003
Location: Silicon Valley, USA
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Posts: 3,660

Rep: Reputation: 76
Quote:
it was just pure coincidence that linuxquestions.org was trying to perform some perfectly legitimate business on port 33270, but firestarter couldn't tell the difference?
Bingo.

Users are allowed to open outbound connections from any port over 1023. Remember there's an IP quad involved in every connection: source IP, source port, destination IP, destination port. You have to allocate a local port in order to connect to a remote port. SFAIK Linux opens ports incrementally, so you must have had your computer on for a long time to get up to the 32K range.

Now, combine this with the fact that many "backdoor" programs use high ports (so as not to arouse suspicion, or because they aren't running as root) and you can see where the problem comes in. Some IDSs are configured to set off alarms based only on port numbers. If the port happens to be a high port, well... eventually someone is going to open a connection and use the port.
 
Old 01-05-2004, 06:50 AM   #3
clausawits
Member
 
Registered: Jun 2001
Posts: 147

Original Poster
Rep: Reputation: 16
Quote:
SFAIK Linux opens ports incrementally, so you must have had your computer on for a long time to get up to the 32K range.
Actually, that was a rather brief session (about a total of 45 minutes from the time I powered up until I powered down again, with the hit happening right before I powered down), and perhaps half of that time I was reading man pages on mplayer or reading feature lists for other audio file players.

Further, the hit on 33270 didn't happen (or at least wasn't reported) until ten or twenty minutes after I had stopped browsing on linuxquestions.org.

Any advice on some on-topic reading material for how linux is openning ports? In my ignorance, I would expect that linux would re-use lower ports once they were freed up... and it seems strange to me that I would have 32k ports open/in use at once. Just looking to learn from this stuff...
 
Old 01-17-2004, 01:59 PM   #4
netcrawl
Member
 
Registered: Jan 2004
Location: British Columbia
Distribution: Slackware64-current, aarch64
Posts: 220

Rep: Reputation: 141Reputation: 141
I've had the same thing happen 3 times now after accessing this site...also using Firestarter, happens after leaving the page, 1.5 hours uptime... My box is clean of DDoS tools; I made double sure of that... it seems rather strange to me as well.
 
Old 01-17-2004, 04:58 PM   #5
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
I just ran a packet sniffer looking for any packets with port number of 33270 for over 1.5 hours after connecting to LQ and got nothing. It's highly likely that you're getting a false-alarm. Anytime you have a "dumb"-scan detector that simply sends an alert whenever certain port numbers are used in a packet, you're likely to get lots of false alarms. While that port number is utilized as a Trinity default, it also can be used by any other application that uses dynamic port assignment. Mozilla as well as other browsers will open a new source port for every connection you make, so sooner or later it will use 33270. I'm also pretty sure that Mozilla starts using ports that are somewhere near the 30000 range.
 
Old 01-17-2004, 08:35 PM   #6
netcrawl
Member
 
Registered: Jan 2004
Location: British Columbia
Distribution: Slackware64-current, aarch64
Posts: 220

Rep: Reputation: 141Reputation: 141
Yes, I expected a false alarm as well, but after the third time I was getting suspicious...did a search on this site and found this thread with exactly the same issue.
Thanks for the info, and apologies for sounding paranoid,
regards, Netcrawl.
 
Old 01-17-2004, 09:57 PM   #7
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
There is a default setting in /proc/sys/net/ipv4/ip_local_port_range that for linux boxes should list 2 numbers (for me 1024 and 29999). It will start assigning at these numbers and increment from there. However, depending on your system (I believe on the amount of memory) it will change the one default to 32768. So it wouldn't really take much to reach 33270 from that point.

apologies for sounding paranoid
NP, you can never be too paranoid in a security forum, right?
 
Old 01-17-2004, 11:01 PM   #8
netcrawl
Member
 
Registered: Jan 2004
Location: British Columbia
Distribution: Slackware64-current, aarch64
Posts: 220

Rep: Reputation: 141Reputation: 141
Right on...my default ports are 32768 and 61000....all good then...
Thanx. I'll be paranoid quietly now.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Welcome to linuxquestions.org jeremy LQ Suggestions & Feedback 22 05-06-2021 04:05 PM
Linuxquestions.org bullium LQ Suggestions & Feedback 6 01-03-2005 03:18 PM
LinuxQuestions.org will be in the .Org Village at LWE UK jeremy LQ Suggestions & Feedback 34 10-10-2004 09:41 AM
Hello linuxquestions.org! NoS Sr50 LinuxQuestions.org Member Intro 3 09-03-2004 03:28 PM
Welcome to the new LinuxQuestions.org jeremy LQ Suggestions & Feedback 9 11-01-2002 03:20 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:37 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration