[181131] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Fkiws with destination port 0 and TCP SYN flag set

daemon@ATHENA.MIT.EDU (Maqbool Hashim)
Wed Jun 17 07:56:09 2015

X-Original-To: nanog@nanog.org
From: Maqbool Hashim <maqbool@madbull.info>
To: "nanog@nanog.org" <nanog@nanog.org>
Date: Wed, 17 Jun 2015 11:56:04 +0000
In-Reply-To: <HE1PR02MB073233FA68B23634BC0D4AFED6A60@HE1PR02MB0732.eurprd02.prod.outlook.com>
Errors-To: nanog-bounces@nanog.org

So, progressed to grabbing full packet dumps via monitor ports.  This confi=
rmed that indeed the two hosts in question are generating traffic to the sa=
me four destinations with a destination port of zero.  Now that I have a fu=
ll packet dump I see reset + ack packets coming back from source port 0 for=
 every single one of the initial SYN packets.  Also it does look like a "sc=
an" of some sort as the source port numbers are increasing by two or three =
every time and roughly 3-4 SYN packets per second being sent.  I am guessin=
g this would be process binding to the next available TCP port on the sourc=
e machine.

As far as I can tell to progress the analysis I need to move to doing foren=
sics on the host itself.  It could be (as Pavel pointed out) be a utility l=
ike hping3 that someone has left running and forgotten about.  On the other=
 hand it could be something more malicious I just don't know at the moment.=
  Any advice on this aspect would be great, unless considered off topic.

Finally I don't see how it could be, but be interested to hear peoples thou=
ghts, no legitimate application could be generating this traffic could it? =
 I mean I don't see what use an application could make of such a TCP conver=
sation.  Discarding network analysis etc.  This machine runs a whole host o=
f proprietary control system protocols, so haven't discarded the possibilit=
y totally- but I just can't see what an application protocol could find use=
ful in a bunch of reset + ack packets being received from the destination h=
osts.

Regards,

MH

________________________________________
From: NANOG <nanog-bounces+maqbool=3Dmadbull.info@nanog.org> on behalf of M=
aqbool Hashim <maqbool@madbull.info>
Sent: 17 June 2015 10:54
To: Roland Dobbins; nanog@nanog.org
Subject: Re: Fkiws with destination port 0 and TCP SYN flag set

Agreed.  Might see if I can get netstat -antp output from the operators at =
some point though.

I will start with one of the hosts, looks like the whole flow capturing exe=
rcise for this LAN will need to be done using multiple laptops connected to=
 the different access ports for the hosts.  No RSPAN support on these switc=
hes and no netflow :(

________________________________________
From: NANOG <nanog-bounces@nanog.org> on behalf of Roland Dobbins <rdobbins=
@arbor.net>
Sent: 17 June 2015 10:44
To: nanog@nanog.org
Subject: Re: Fkiws with destination port 0 and TCP SYN flag set

On 17 Jun 2015, at 11:34, Maqbool Hashim wrote:

> What might be easier is to set up a span port for the hosts access
> port on the switch and grab that via the collector laptop I have.

It's better to collect as much information you have without perturbing
the systems involved, anyways.

-----------------------------------
Roland Dobbins <rdobbins@arbor.net>

home help back first fref pref prev next nref lref last post