whois 0.54.114.30
[...]
inetnum: 0.0.0.0 - 0.255.255.255
organisation: IANA - Local Identification
status: RESERVED
remarks: 0.0.0.0/8 reserved for self-identification [RFC1122],
remarks: section 3.2.1.3. Reserved by protocol. For authoritative
remarks: registration, seeiana-ipv4-special-registry.
changed: 1981-09
source: IANA
whois 0.54.114.30
sounds like a reverse dns query not? you have something run in the 30.114.54.0/x ?
That address belongs to the US DoD. I’m pretty sure that Mjölnir does not run something in that network.sounds like a reverse dns query not? you have something run in the 30.114.54.0/x ?
I just had a quick look at the source package of ntopng. As far as I can see, it neither calls /usr/bin/ssh, nor does it use libssh, nor does it include its own ssh client code. Therefore I think it is unlikely that it performs actual SSH connections. (However, I only had a quick look. If the authors tried to hide such things intentionally, it would certainly require a closer look.)Is this normal? Is it documented somewhere? Should I be concerned?
These connections are all very short-lived ( <= 1 sec).lsof -i tcp:22
shows it's ntopng(8) that's doing it.
That address belongs to the US DoD. I’m pretty sure that Mjölnir does not run something in that network.
Apart from that, DNS address queries use UDP port 53, not TCP port 22 (SSH).
root@t450s:~ #
lsof -i tcp:22
lsof: WARNING: compiled for FreeBSD release 12.2-RELEASE-p3; this is 12.2-RELEASE-p4.
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
ntopng 80555 ntopng 17u IPv4 0xfffff8022625c000 0t0 TCP 10.142.134.76:29581->0.54.11.134:ssh (SYN_SENT)
sshd 93238 root 3u IPv4 0xfffff80226ac8000 0t0 TCP localhost:ssh (LISTEN)
0.54.11.134:ssh
is not in reverse notation, else I'll dump this OS & install Windows 10...root@t450s:~ # vnstat -d -b 2021-01-28 -e 2021-02-26
tun0 / daily
day rx | tx | total | avg. rate
------------------------+-------------+-------------+---------------
2021-01-29 6,26 MB | 344,69 kB | 6,60 MB | 611 bit/s
2021-01-31 166,66 MB | 18,13 MB | 184,79 MB | 17,11 kbit/s
2021-02-01 2,25 GB | 72,36 MB | 2,32 GB | 214,95 kbit/s
2021-02-02 94,07 MB | 6,75 MB | 100,82 MB | 9,33 kbit/s
2021-02-03 23,37 MB | 4,78 MB | 28,14 MB | 2,60 kbit/s
>>> 2021-02-04 194,10 MB | 8,60 GB | 8,79 GB | 814,34 kbit/s <<< Look @TX
2021-02-05 262,44 MB | 16,20 MB | 278,64 MB | 25,80 kbit/s
[...]
lo0
, and then run netcat a.k.a. nc(1) in listening mode on an IP address in that range on port 22. Then see what’s coming along. If that “SSH feature” was hidden intentionally, then ntopng will not display it when monitoring itself, of course.EDIT: maybe I can use ntopng to monitor itself? It's web interface is really nice.
No no, not at all. It was ntopng that showed me these connection attempts.If that “SSH feature” was hidden intentionally, then ntopng will not display it when monitoring itself, of course.
Food for thoughtThis reminds me of Reflections on Trusting Trust. It’s a short lecture (just 3 pages) held by Ken Thompson when he received the ACM Turing Award. Highly recommended reading, even if you’re not a C programmer; it’s fascinating and scary at the same time. Note that this is from 1984, almost 40 years ago.