Bad DNS Query for Date & Time
Michael D. Berger
m_d_berger_1900 at yahoo.com
Thu Sep 1 15:01:20 BST 2011
On Thu, 01 Sep 2011 07:27:16 +0000, Duncan wrote:
[...]
> I am by no means an expert on this, and don't run CentOS, but from the
> description and what I know (and perhaps what I only think I know =:^P
> ), it /looks/ to me like EITHER something's misconfigured and you're
> getting dbus queries on the IP network as DNS queries, OR you're
> mistaking routine dbus query traffic for DNS.
>
> Because those weird names look very much like traffic that I'd suppose
> would be dbus based, and dbus traffic does occur over a socket altho at
> least here it's a UNIX socket, not IP (but perhaps it can be IP for
> network transparency? actually, it appears it can according to the dbus-
> daemon (1) manpage). If they're somehow going out as DNS queries, that
> is quite disturbing indeed, but if instead, you're somehow mistaking
> dbus traffic for DNS, and/or if your wireshark sniffer net is set too
> broadly so it's catching both, that would explain the whole otherwise
> rather disturbing indeed situation.
>
> Qt has a GUI-based dbus interface browsing tool, qdbusviewer (part of
> the qt-gui package here on Gentoo, likely part of the general qt4
> package on most distros), that you can use to explore a bit, altho I
> don't imagine you'll see any *.desktop filenames there, but maybe you'll
> see something that you can connect with the sniffing you're doing, and
> getting more informed about dbus can't hurt even if it doesn't turn up
> anything related to this.
>
> You can also try using netstat (and/or checking the config) to see what
> dbus sockets are being used, and see if that corresponds to what
> wireshark is reporting.
>
> Also, if you have any sort of remote-X desktop stuff going on, it could
> be related to that.
>
>
> That's about all I can suggest ATM, but this discussion is rather
> interesting (as in disturbing!) indeed. I do hope you post what's going
> on when you get to the bottom of this, as the potential of this sort of
> information leakage occurring has security and privacy implications I
> don't particularly like, but at the same time, I find it hard to believe
> it's by design or could be easily overlooked, so something's GOTTA be
> seriously screwed somewhere, either in your config or in your detection
> methods, one of the two, and I really HOPE it's your detection methods,
> because the alternative really IS quite disturbing, to the point I'll
> certainly find it easier to sleep when I know that all this is resolved.
WireShark is showing what look like real DNS queries. It
is true that I had my interface set to "any", which might
support your suggestion that I am reading the bus, so I
set the interface to eth0. The problem persists.
But in any case, I also get DNS responses to the bad queries
from external locations such as 151.197.0.38, which ARIN
identifies is a Verizon location, and which I can successfully
ping. Therefore it would appear the DNS queries are real.
Now I ran netstat as you suggested. There is plenty there that
makes me nervous, for example:
/var/run/dbus/system-bus-socket
/tmp/ksocket-root/kdeinit4__0
and much more. I would not be surprised if some internal socket
were internally confused with eth0. netstat has numerous options,
and I would be happy to receive suggestions on their use to get
better information.
I agree that something looks "seriously screwed", I most certainly
will post whatever solution I find. (I note that I could punt and
use iptables -j QUEUE (as I do for other purposes) to parse and
block the bad DNS, but I hope for a better solution.)
Mike.
___________________________________________________
This message is from the kde mailing list.
Account management: https://mail.kde.org/mailman/listinfo/kde.
Archives: http://lists.kde.org/.
More info: http://www.kde.org/faq.html.
More information about the kde
mailing list