User not logged in - login - register
Home Calendar Books School Tool Photo Gallery Message Boards Users Statistics Advertise Site Info
go to bottom | |
 Message Boards » » F-SOS/F-Secure range in PeerBlock Page [1]  
kvr123
All American
557 Posts
user info
edit post

I'm using PeerBlock at my apt in auburn al. via Charter.

About every 10 minutes i get spammed by a connection 8-12 times. Here is the connection info:

Range: F-SOS/F-Secure
Source: 5.207.228.242
Destination: 206.112.100.132
Protocol: Unknown

*sometimes* the source comes from my own ip (192.168.1.x)

The ARIN whois reports this:
Quote :
"
MCI Communications Services, Inc. d/b/a Verizon Business NETBLK-UUNETCBLK-112 (NET-206-112-0-0-1)
206.112.0.0 - 206.115.255.255
Almar Networks, LLC UU-206-112-100-128-D (NET-206-112-100-128-1)
206.112.100.128 - 206.112.100.159
"


any thoughts?

1/10/2010 2:37:31 AM

A Tanzarian
drip drip boom
10996 Posts
user info
edit post

Are you sure 206.112.100.132 isn't your address?

5.207.228.242 is unallocated.

1/10/2010 1:19:11 PM

kvr123
All American
557 Posts
user info
edit post

negative, my ip is
71.91.20.xx

I'm confused as to why *sometimes* it originates from my 192.168.1.x ip in the middle of the spam. I.E. it will come from the 5.207.228.242 for say..the first 3 or 4, then maybe 2 or 3 from the 192.168.1.x, then back to the 5.207.228.242, but all sharing the same destination of 206.112.100.132.

The ARIN whois report of 5.207.228.242 is:
Quote :
"OrgName: Internet Assigned Numbers Authority
OrgID: IANA
Address: 4676 Admiralty Way, Suite 330
City: Marina del Rey
StateProv: CA
PostalCode: 90292-6695
Country: US

NetRange: 5.0.0.0 - 5.255.255.255
CIDR: 5.0.0.0/8
NetName: RESERVED-5
NetHandle: NET-5-0-0-0-1
Parent:
NetType: IANA Reserved
Comment:
RegDate: 1995-07-07
Updated: 2002-09-12"


How is a connection thats not me showing up as a source under PeerBlock?

1/10/2010 4:34:59 PM

joe17669
All American
22728 Posts
user info
edit post

do you have hamachi installed? my hamachi used to give me a 5.xxx address.

The 5.0.0.0/8 network is used to avoid collisions with private IP networks that might already be in use on the client side

1/10/2010 4:46:12 PM

A Tanzarian
drip drip boom
10996 Posts
user info
edit post

5.207.228.242 is an unallocated address. Nobody should be using it.

Sure you don't have a trojan/malware/virus/etc?

I'm not familiar with PeerBlock...do you have logs to see what on your computer is originating requests?

[Edited on January 10, 2010 at 4:50 PM. Reason : I need to type faster...nobody should be using 5.xxx, certainly not anyone external to your LAN.]

[Edited on January 10, 2010 at 4:51 PM. Reason : hamachi is a really good idea, though]

[Edited on January 10, 2010 at 4:51 PM. Reason : now you're ghostediting ]

1/10/2010 4:47:11 PM

kvr123
All American
557 Posts
user info
edit post

Nice call, I do have hamachi installed, and that may be the issue, ill disable the connection and see if it continues.

Ive done several different scans and am fairly positive i dont have any trojans/malware/virus

No, peerblock does not show what on my computer is originating the requests.

Ill post again with the update of disabling hamachi

1/10/2010 4:56:20 PM

A Tanzarian
drip drip boom
10996 Posts
user info
edit post

Quote :
"Each Hamachi client is assigned an IP address from the 5.0.0.0/8 address block. This address is assigned when the client logs into the system for the first time, and is henceforth associated with the client's public crypto key. As long as the client retains its key, it can log into the system and use this 5.x.x.x IP address.

The 5.0.0.0/8 network is used to avoid collisions with private IP networks that might already be in use on the client side. Specifically - 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16. The 5.0.0.0/8 address block is reserved by IANA and is not currently in use in the Internet routing domain, but this is not guaranteed to continue. The IANA free pool is expected to be exhausted by February 2011.[1] If this range is allocated, Hamachi users will not be able to connect to any Internet IP addresses within the range as long as the Hamachi client is running.

Additionally, using a separate network prefix creates a single broadcast domain between all clients. This makes it possible to use LAN protocols that rely on IP broadcasts for discovery and announcement services over Hamachi networks. Hamachi is frequently used for gaming and remote administration. The vendor provides free basic service and extra features for a fee."

1/10/2010 5:00:17 PM

kvr123
All American
557 Posts
user info
edit post

Ok, after disabling hamachi i no longer have any outgoing connections from the 5.207.228.242 ip. However, I still have outgoing connection spams from my own internal ip: 192.168.1.3 as the source and 206.112.100.132 as the destination.

The connection was attempted 29 times, bursting 4-8 times within a minute or 2, then repeating that pattern every 10-15 minutes for over an hour.

for quick reference:

source: 192.168.1.3
destination: 206.112.100.132
Range: F-SOS/F-Secure
Protocol: Unknown
Action: Blocked

I wanted to also add that just recently, over xmas break, I was back home in apex, NC using my parents net. I had none of this spam and never a connection from my own computer as the source.

Here is a cap of my PeerBlock


Any more thoughts?

[Edited on January 11, 2010 at 1:37 PM. Reason : bad link]

[Edited on January 11, 2010 at 1:38 PM. Reason : .]

[Edited on January 11, 2010 at 1:39 PM. Reason : .]

1/11/2010 1:36:10 PM

ScHpEnXeL
Suspended
32613 Posts
user info
edit post

http://www.dslreports.com/forum/r17871432-Charter-Corrupting-DNS-protocol-ie-hijacking-hosts

1/11/2010 1:47:58 PM

kvr123
All American
557 Posts
user info
edit post

I had previously read that article and it would make sense if the connection was being made every time i entered an incorrect domain. But those connections are being attempted while the computer is idle.

That pic i posted above occurred while I was in class

1/11/2010 4:34:38 PM

Shaggy
All American
17820 Posts
user info
edit post

something else is probably doing a DNS query and its getting eaten by comcast. Setup wireshark and look for dns queries prior to the 206.112.100.132 stuff. Wireshark will also show you the contents of the 206.112.100.132 packets too, so you can see what they actually are.

1/11/2010 5:07:51 PM

Shaggy
All American
17820 Posts
user info
edit post

alternatively just get rid of peerblock since its dumb as hell

1/11/2010 5:14:39 PM

kvr123
All American
557 Posts
user info
edit post

Quote :
"alternatively just get rid of peerblock since its dumb as hell"


this wouldn't fix my problem

I got wireshark up and running and filtered for 206.112.100.132. I will update you all when it caps it

1/11/2010 6:23:27 PM

ScHpEnXeL
Suspended
32613 Posts
user info
edit post

i agree with ^^^

1/11/2010 6:57:50 PM

kvr123
All American
557 Posts
user info
edit post

I have wireshark up and running, but i'm having trouble filtering it so that it only shows packets sent to 206.112.100.132.

From the help section examples, the filter should read "net 206.112.100.132" (i think) which i have applied. Is this the right way to filter it?

1/11/2010 7:20:17 PM

Shaggy
All American
17820 Posts
user info
edit post

there are kind of two "filters" in wireshark. Theres the capture filture which you configure before starting the capture, and then theres the live filter which you put in that box during the cap to filter the results.

For the caputre filter i think its "host 206.112.100.132" (there should be saved filters you can look at for examples). For the live cap filter, it would be ip.addr==206.112.100.132. That filter will turn green when the syntax is all good.

1/11/2010 7:44:50 PM

kvr123
All American
557 Posts
user info
edit post

I left wireshark running last night while active on my computer and left peerblock up this afternoon while in class, No connection attempts to the 206.112.100.132 have been made. But there have been several attempts from my 192.168.1.3 local to 67.159.44.118 which is FDC servers in chicago, which Peerblock lables as antiP2P. This all happened while i was in class, with utorrent seeding. Are these connections coming from my utorrent?

1/12/2010 3:31:28 PM

Shaggy
All American
17820 Posts
user info
edit post

Looks like they're a hosting company. Could be the mpaa trying to steal your data or it could be some seedbox with a bunch of bandwidth that you cant get to becuase you use some piece of shit software to block it.


Seriously. peer bock does 0 to prevent anyone from seeing your computer in the swarm. All the MPAA/RIAA/whoever you're scared of has to do is scrape the tracker and they have everyone in the torrent.

That said, to actually figure out what type of traffic that is since peerblocker isn;t smart enough, you can either look at what ports your client is using (if its set to random consider setting it to a specific port) or remove your capture filter from wireshark and once you capped enough data, use the search tool to narrow down individual packets for inspection.

1/12/2010 3:38:55 PM

kvr123
All American
557 Posts
user info
edit post

my utorrent uses 42000 which is why i was confused by the connection attempts to FDC servers coming from *seemingly* random ports, meaning utorrent wasnt the one trying to make the connection.

I'll run wireshark and see if i can figure out whats causing it

1/12/2010 5:06:39 PM

LimpyNuts
All American
16859 Posts
user info
edit post

Quote :
"my utorrent uses 42000 which is why i was confused by the connection attempts to FDC servers coming from *seemingly* random ports, meaning utorrent wasnt the one trying to make the connection"


I don't think you understand how the internet works.

Quote :
"Seriously. peer bock does 0 to prevent anyone from seeing your computer in the swarm. All the MPAA/RIAA/whoever you're scared of has to do is scrape the tracker and they have everyone in the torrent. "

Being listed by the tracker means nothing. In order for the DMCA to be violated, a distribution must take place. If your computer does not respond to a request, then they don't have a legal leg to stand on. They can send you takedown notices all day, threaten to sue, and harass you, but it ultimately amounts to bullying. Consider:

- User 1 connects to tracker and shares a file on 1/1/2010
- User 1 then disconnects from the internet
- User 2 connects to the internet and the DHCP server assigns User 1's old address on 1/2/2010
- RIAA/MPAA agent connects to tracker on 1/2/2010 and finds the IP address in the tracker, which hasn't updated yet, or gets it from another peer.
- agent send request to ISP who identifies User 2 as the user who was using that IP address on that particular day
- agent sends takedown notice to bewildered User 2.

http://dmca.cs.washington.edu/

The agents use this method because it is cheap and it produces results (settlements) because people just assume they were caught red handed even though no evidence was collected against them. Collecting evidence is not feasible because it would require the agents to download files in their entirety and keep track of peers who sent pieces that didn't fail a hash check. (They can't know if the file contained intellectual property unless they download it.) I would respond to a DMCA notice with a request for a record of the actual bytes they downloaded from my computer that represented their intellectual property.

1/14/2010 7:53:12 PM

Shaggy
All American
17820 Posts
user info
edit post

First off trackers contain completion info as well as ip information. If a client reports the to tracker that its downloaded information, the hashing system guarantees that data matches the files in the torrent. All they need to know is that the files in the torrent are copyrighted data and that someone has reported transfering the data back to the tracker. The dont need to connect directly to a peer to guarantee that they actually participated.

Second, this:
Quote :
"agent send request to ISP who identifies User 2 as the user who was using that IP address on that particular day
- agent sends takedown notice to bewildered User 2.
"

is wrong. ISPs have records of who has what ip address at any given time. If the MPAA/RIAA ask for information about who had the ip on 1/1 they'll get the right person from the ISP.

Thirdly, its the height of stupidity to assume that whatever moron maintains the peer block list knows every possible ip address the mpaa/riaa would use. Its dead simple for them to simply use a residential connection to get an address in a dynamic range which peerblock would never block (unless its ultra retarded).

Lastly, even if they can prove that you downloaded something directly from their client 100%, they cant prove it was you. The best that can happen is they use the clauses in your ISPs eula that say you're responsible for everything that happens on your connection.

1/14/2010 10:33:09 PM

LimpyNuts
All American
16859 Posts
user info
edit post

Quote :
"First off trackers contain completion info as well as ip information."

This doesn't mean shit. The DMCA does not say you can't receive the material; it says you can't distribute it. Even if this data could be relied upon and weren't easily spoofed, it doesn't mean shit. (Notice the DMCA notices always tell you to stop sharing / offering for download / uploading. They don't say stop downloading.)

Quote :
"The dont need to connect directly to a peer to guarantee that they actually participated."

Yes they do. The information from the tracker is inherently unreliable because anyone can submit any data they want to it. The only way to prove you distributed the content is to actually observe the distribution. If I told the MPAA you were giving away bootleg copies of Transformers, they can't do shit (except make retarded legal threats) unless they catch you distributing it. You could have 50,000 clearly labeled copies in the back of a truck, but they can't do shit til one of them changes hands.

Quote :
"ISPs have records of who has what ip address at any given time. If the MPAA/RIAA ask for information about who had the ip on 1/1 they'll get the right person from the ISP."

Except they wouldn't ask for the 1/1 data because they checked the tracker on 1/2 in my example. Most trackers, especially public ones, won't keep up with the changes in peers. Find a public torrent online with tons of peers and get the peer list. Then try pinging them. You'll find that some of the peers are offline (and some that are online may not be active because they already disconnected). A client may not always report its disconnection to its own tracker and it won't report it to a different tracker that got it from a peer using DHT.

Quote :
"Thirdly, its the height of stupidity to assume that whatever moron maintains the peer block list knows every possible ip address the mpaa/riaa would use."

I didn't argue the for the validity of these lists. I agree that they do little to protect you, but little is not nothing. They are easily compiled because the MO is obvious (connect to a tracker and get the peer list for tons of torrents, but don't report any activity).

Quote :
"The best that can happen is they use the clauses in your ISPs eula that say you're responsible for everything that happens on your connection."

Your terms with the ISP (and actually some laws and the DMCA itself) protect the ISP from civil and criminal liability associated with activity on your connection. You can use the "it wasn't me" defense, but if civil litigation ensues, that will likely be verified.

1/14/2010 11:27:09 PM

 Message Boards » Tech Talk » F-SOS/F-Secure range in PeerBlock Page [1]  
go to top | |
Admin Options : move topic | lock topic

© 2024 by The Wolf Web - All Rights Reserved.
The material located at this site is not endorsed, sponsored or provided by or on behalf of North Carolina State University.
Powered by CrazyWeb v2.39 - our disclaimer.