Comment #78 on issue 373181 by
keithala...@gmail.com: Chromium packet storm
There's more to this issue than what has been described here. I'm beginning
to think it is Heartbleed related. I've been having network issues on my
Mac OS systems since the Heartbleed announcement in April 2014. No problems
with Chromebooks (Ahem, problem is interface between Chrome and Mac OS or
Windows, i.e. Chrome implementation doesn't have full network libraries,
right?)
I have had issues with every stable MacOS release since then. And with two
different ISPs, Cox Cable and now Comcast. When I was with Cox using my
Netgear router, my router, yes again, MY ROUTER, was subjected DoS flood
attacks over UPnP ports. Traffic was occasionally intense enough to cause
the Cox cable modem to reboot repeatedly. My "cadillac" Netgear router had
UPnP enabled by default. Easy to turn off/block UPnP ports with a checkbox.
Now with Comcast, your network engineers at the AS15169 NOC facility in
Mountainview recently blocked my IP from Youtube servers, pushing a CAPTCHA
challenge to my Chromebook because they were receiving "a lot of requests
from my network." I did not respond to this
arbitrary "punishment/nonsense." Later in the day, I forwarded this thread
to
n...@google.com and
jo...@google.com and tried to be nice but ended up
sending a Howard Beale-like barrage loaded with insults.
I cannot use Chrome on my Macintosh systems anymore. I haven't been able to
track down the cause, the problem being the lack of any useful firewall
logs with my current Xfinity Comcast router (I plan to fix this soon) and
well, honestly, I'm tired of troubleshoot bugs created by
professional "coders" since 1985. (Yes, insult implied.)
Regardless, GCM is definitely involved, port 5228 is how I found this
thread. I have a Cloud-Ready Printer now and had a Classic Printer
registered previously.
On new MacBook Pro (now running Yosemite) waking from Sleep is an arduously
painful process, only if Chrome is running. First the dimmed screen with
progress bar is displayed, then there's close to 30 seconds of wait time
with an apparently usable screen but no cursor control. You can swipe your
finger back and forth over your trackpad for 30 seconds wondering why there
is no response. Isn't that fun!
This is apparently what was going on in the wee hours of the morning after
midnight the day after Christmas when I was accused of being a robot
watching too much Youtube. In this case though, my iMac in the basement
wired to the Xfinity modem/router/wifi box (which provides useless summary
firewall reports instead of true logfiles) was awakened as a 16-wheeler
rumbled by. On this system, Snow Leopard
(yeah, dual-core Intel but not supported by Mavericks+), there isn't any
GUI delay/freeze-ups but Chrome will be sending a lot of requests to GCM
servers.
How many times have your GCM servers been hacked, or should I say bled?
Honestly, I don't believe there's anything malicious going on here, just
the general clusterfuck that is the Internet today. Legitimate GCM users
might be incorrectly parsing records which have to be decoded in some way.
Beats the heck out of me. Sound like a nightmare to code. So imagine my
router being incorrectly identified as a UPnP service, or something along
those lines...
I recently noticed ROKU using Google DNS services (8.8.8.8 or something
like that?) and vaguely remember they updated firmware/software around the
time I had the UPnP DoS flood problems. I can't provide you with anything
useful for troubleshooting Google NOC related stuff but I've attached my
flood attack logs (not my current IP), well, so you believe me when I tell
you I've done all my own troubleshooting, have a clue about all this. No
reason for me to call the ISP Helpdesk, talk about a nightmare...
Attachments:
DoS Attacks TCP SYN FLOOD.txt 25.2 KB