Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 21

Thread: ufw logs- port 44444

  1. #11
    Join Date
    Nov 2009
    Beans
    919
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: ufw logs- port 44444

    OK, now I'm confused. If this is an indication of response traffic being blocked, how is the incoming discovery request getting through in the first place? Also, from the look of the log events, the blocked traffic is going out over a high port, which in a lot of cases signifies that the request is originating from the local machine by some process that's running. That said, the whole zeroconf/multicast thing makes no sense to me no matter how much documentation I read.

  2. #12
    Join Date
    Jun 2011
    Location
    Atlanta Georgia
    Beans
    1,769
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: ufw logs- port 44444

    Icmp and igmp multicast do not create stateful connections so thinking about it in those terms makes it more confusing

  3. #13
    Join Date
    Sep 2011
    Beans
    1,531

    Re: ufw logs- port 44444

    Quote Originally Posted by OpSecShellshock
    That said, the whole zeroconf/multicast thing makes no sense to me no matter how much documentation I read.
    Don't take this the wrong way, but that makes me SO happy to read! I'm confused, but that's not surprising. To see that much more experienced people are confused, well... it gives me hope

    So is this something that I should allow in my ufw settings? Seems like I should allow my computer to talk to the modem.

  4. #14
    Join Date
    Jun 2011
    Location
    Atlanta Georgia
    Beans
    1,769
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: ufw logs- port 44444

    It's not strictly necessary it's a biproduct of how cable modems work, and the traffic would be filtered by your modem anyway. Else someone in your neighborhood would be able to wiresharl everything you do

  5. #15
    Join Date
    Jun 2010
    Location
    ~
    Beans
    Hidden!

    Re: ufw logs- port 44444

    everything that I've read about ports 11111 22222 33333 44444 and 55555 is that they are common trojan ports (easy to find). you may consider port scanning your own network to see if any device is on there that shouldn't be. Make a record of all MAC addresses and verify them with the labels that are actually on the outside of the products (if their listed). Also make sure that your router doesn't have a feature enabled like 'Multicast pass-through'. That would probably let anyone on the net send you multicast packets.
    CADWEB Advance Toolkit Utility: http://cad.webatu.com/
    Homesite: http://digitalmagican.comze.com/

  6. #16
    Join Date
    Sep 2011
    Beans
    1,531

    Re: ufw logs- port 44444

    Quote Originally Posted by Dangertux View Post
    Icmp and igmp multicast do not create stateful connections so thinking about it in those terms makes it more confusing
    I've been googling ICMP, IGMP, multicasting, zeroconf, and modems. I'm guessing that the modem is sending ping-like packets to the network using ICMP (BTW my other computer shows the same ufw logs, so it was receiving the same messages). But I'm not really getting anything about modems.

    Do you know of any links that would explain how modems use multicasting?


    @ emiller12345- I checked, there are no extra devices on the network. I checked the router & it has no Multicast pass-through setting.

  7. #17
    Join Date
    Jun 2011
    Location
    Atlanta Georgia
    Beans
    1,769
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: ufw logs- port 44444

    Somewhat technical but here you go

    http://www.cisco.com/en/US/technolog...d802e2ce2.html

  8. #18
    Join Date
    Sep 2011
    Beans
    1,531

    Re: ufw logs- port 44444

    @Dangertux- thanks for the link. I'll read that tonight.

    Quote Originally Posted by OpSecShellshock View Post
    OK, now I'm confused. If this is an indication of response traffic being blocked, how is the incoming discovery request getting through in the first place?
    I suppose I'm beating a dead horse here, but I still don't understand this part either. It would make more sense to me to see blocks both in- and out-bound. I think this is a firewall question.

    So the modem sent MsDaisy-computer a bunch of packets. They all came through the firewall. MsDaisy-computer created response packets and tried to send them back to the modem, but the firewall blocked the responses.

    I'm using the firewall settings from this thread. The settings are to deny all traffic except the specifically allowed traffic. So are the multicast packets coming in to MsDaisy-computer through a port I allowed, but then MsDaisy-Computer is responding on a different port? AFAIK, multicasting uses ports 264, 639, & 5353. Those are all blocked in & out. So how'd they get in?

    BLARGH! I am in the land of confusion...

  9. #19
    Join Date
    Sep 2011
    Beans
    1,531

    Re: ufw logs- port 44444

    Quote Originally Posted by Dangertux View Post
    Yep the modem. See multicast is used in this case to discover devices on the network that are "alive".

    So it will pass through the router (and likely be forwarded)
    What do you mean by "forwarded?" Do you mean sent along? or port forwarded?

  10. #20
    Join Date
    Jun 2011
    Location
    Atlanta Georgia
    Beans
    1,769
    Distro
    Ubuntu 10.04 Lucid Lynx

    Re: ufw logs- port 44444

    Quote Originally Posted by Ms. Daisy View Post
    What do you mean by "forwarded?" Do you mean sent along? or port forwarded?
    This is where it can get confusing quickly, let's take a look at the logs step by step and see what's going on.

    This will be even harder because you blocked the dst/src ip but I will do the best with what you have provided. I'm willing to bet they aren't ALL the 224.0.0.251 (which by the way is multicast DNS)

    Code:
    24 15:44:08 MsDaisy-Computer kernel: [ 1296.544822] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=60 TOS=0x00 PREC=0x00 TTL=1 ID=1088 PROTO=ICMP TYPE=8 CODE=0 ID=2913 SEQ=1
    Important things to note about this block are.

    - PROTO = ICMP (this is an ICMP echo request, noted by the TYPE = 8) it was blocked by your firewall (this is pretty standard). This request was PROBABLY from your router or modem, the failure of this request LIKELY spawned the spurious requests afterwards.

    Code:
      Jan 24 15:44:56 MsDaisy-Computer kernel: [ 1344.922839] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=60 TOS=0x00 PREC=0x00 TTL=1 ID=1089 PROTO=UDP SPT=47414 DPT=33434 LEN=40
    This is UDP, and isn't very specific, if it's going to mDNS, it's likely just a zeroconf query.

    Code:
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.553723] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.553844] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.553948] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554050] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554153] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554256] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554360] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554464] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554570] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515  
     Jan 24 15:45:21 MsDaisy-Computer kernel: [ 1369.554731] [UFW BLOCK] IN= OUT=wlan0 SRC=my.IP.Add.XX DST=unknown.IP.Add LEN=65535 TOS=0x00 PREC=0x00 TTL=1 ID=0 DF PROTO=UDP SPT=59663 DPT=44444 LEN=65515
    These give away their origin without me even knowing the full packet details.

    As far as forwarded, with broadcast/multicast traffic it's not so much a forwarding thing as a passing through thing.

    My guess here is these are either responses to or replies to an mDNS membership request. If you'd like to verify it, I went ahead and did a quick capture on a packet that I believe to have a similar purpose. There is a screen shot from wireshark below for your comparison, to queue the responses necessary I simple restarted the avahi-daemon service

    Code:
    sudo service avahi-daemon restart
    You should get a sequence of about 14 packets (similar to what you are seeing here) verify that your firewall logs are indicating the same, and that the packet contents is similar to what will be posted.

    In any case this really is nothing to worry about. BTW UDP is stateless, so speaking in terms of creating a connection (is rather arbitrary in this case).

    Hope this helps.

    Note : the destination and source port change can be considered rather trivial in this case due to the nature of mdns multipathing and the layout of a network vastly changing the creating of membership requests. That being said, compare the packet contents, to make sure it is in fact what we are observing.
    Attached Images Attached Images
    Last edited by Dangertux; January 26th, 2012 at 04:36 AM.

Page 2 of 3 FirstFirst 123 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •