On 12/23/2015 7:54 AM, Paul M. Cook wrote:
> On Wed, 23 Dec 2015 04:19:59 -0800, DerbyDad03 wrote:
>
>> It's not a question of what could be done to the device, it's whether or
>> not that device is allowing access to the home's network. Once inside
>> the network it may be possible to gain access to other computers.
>
> Exactly. I'm not worried about the kid being attacked.
>
> I'm worried about the attacker coming in through the port 9000 of the
> IP address 192.168.1.5 which, at least today, is the Sony Playstation
> (but it could have been any computer on the day of the attack since
> I have DHCP).
>
> Once the attacker is on the router, they can potentially get to any
> computer or monitor anything or watch or whatever the reason they
> got in for.
Your attack surface is *anything* that can be exposed and/or
infiltrated from the outside.
There may be an exploit *on* the PlayStation that is being
probed (or, actively being USED!). If <something> can get
a foothold, anywhere, then it can advance from there further
into your internet.
Your son's -- along with your own -- activities OUTSIDE your
personal internet make your "public" IP address (the one on the
upstream side of your router) visible to external entities.
[unless you are double NAT'ed by your upstream provider]
Anything that your "house" (network) talks to now knows where
you are. Likewise for anything you talk *through* (e.g.,
any of your provider's equipment, any other routers on
The Internet, etc.). You've in effect, said, "Here We Are!"
This is just common sense: if you wanted something *from*
something (else) on The Internet, you had to contact that
<something> and, in doing so, provide a means by which it could
deliver a REPLY to *you* (and not your neighbor, the guy down the
block, etc.)
> That there were *many* similar attacks at roughly the same time is
> what worries me also.
They may not be "attacks". They may be *probes* -- machines trying to
connect to the machine in question to determine if an exploit is
"available", there ("Hmmm... let me see if I can infiltrate this
particular machine at this particular IP address by taking advantage
of a BUG that exists in its software; a bug that I can tickle by
doing THIS!...")
It may also be "normal operation" for some application that is
running on that machine. Or, that *was* running, there.
You'd actually have to use a packet sniffer to examine the
actual messages being sent to the machine/port in question
and hope to recognize them as hostile or benign.
Of course, if the messages originate at HackersRUs.com, that
cold give you a heads up! :>
> But, mostly, I am just wanting to know *what* happened, which, from
> the log files, I can't tell - but that's why I asked. I don't know
> how to correctly *interpret* this particular set of errors.
Some possible scenarios (without examining the IP's in detail) without
trying to be exhaustive nor in any particular order:
- Someone (your son?) is participating in an online, multiagent activity
(e.g., game) and the nature of the activity requires others to share
information about each participant's actions, etc.
This can be done with a large, single-server that handles every player
currently engaged in that activity. Each person (player) connects to that
server and learns what is happening in the activity, interacts with
that server which, in turn, informs the other players of his activities
while informing *him* of their activities.
This would manifest (in your logs) as lots of traffic to a single IP;
the IP of the "server" for that activity (game).
But, this sort of approach doesn't "scale well". It requires a single
server to handle all of the activities of EVERYONE participating in
that shared event! As more folks want to participate, things can get
sluggish -- more work for the server in the same amount of time!
This can be alleviated, to some extent, by hiding a BUNCH of servers
behind a single address (a "cluster") and *internally* splitting
out the work to different physical machines. This is how google
can appear to be so fast -- there are literally thousands of machines
handling all those requests yet giving the illusion of a single one!
But, it still funnels all network traffic to a single point. So,
makes the "shared activity" more vulnerable to network congestion.
A bottleneck at any point is reflected back to the participants
as a "pause"/hiccup in normal operation. For an INTERACTIVE activity,
this is highly undesireable. You don't want the activity to appear
to progress in fits and spurts!
And, it's not very reliable: the server crashes (or, it's single
external contact point) and the world ends!
So, you *distribute* the activity to other servers -- potentially
in physically distant locations! They talk with each other
(directly or indirectly) to coordinate their knowledge of
The Activity and also communicate with the participants to
inform them of the current state of the activity as well as
get input regarding their desired actions.
This could explain why several different IP's are connecting to your
machine -- each trying to update some information about your
actions *or* update the software in your machine regarding their
"models" of the current state of the activity, from their individual
points of view.
They may simply be trying to determine if you're "still playing".
- Something has made some *other* thing aware of your presence
and that other thing has informed still others of your location.
E.g., you connected to an application's server and it has told
other entities about your whereabouts -- for whatever purpose.
They are then attempting to connect to an application in your
machine (one that is expected to be listening on port 9000)
to offer their services. E.g., they may be "advertising"
shared activities (see above) that are currently happening on
their servers so you can opt to join in.
- Something is aware of your presence and is trying to probe a
potential weakness/exploit on your system by connecting to some
buggy software that is currently listening on port 9000. Based
on how/if you respond to its probes, it may refine its probes
to more specifically target your particular version of said
software ("Ah, he's running version XYZ! That one has patched
this old bug but hasn't, yet, patched this *new* bug! Let me
try to get in using this OTHER trick...")
- Something is just hammering away at everything it finds in
the hope that it encounters something that it can use (abuse).
This, for example, is how spam works: send it to EVERYONE and
hope *someone* is foolish enough to reply!
- Something in your machine (malware?) is reaching out and INVITING
others to connect to it -- for whatever purpose. It may be
part of a distributed command and control cluster that is delivering
SPAM to folks. Or, actively targeting a defense contractor. Or...
> We're all just guessing. And that's bad.
That's why network security is hard! Most folks don't have the
tools *or* the expertise to understand what is happening. Nor
the vigilance to catch it *as* it is happening!
Next time you grumble about some highly publicized "breach",
imagine what it's like for the security folks at some of these
"ripe targets" trying to sort through millions of contacts
each hour and determine which are malicious vs. benign!