TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why Is This Website Port Scanning Me?

1294 pointsby BCharlieabout 5 years ago

66 comments

segfaultbuserrabout 5 years ago
It&#x27;s why Tor Browser restricts access to localhost by default. This problem was already predicted and considered by Tor developers back in 2014, see ticket #10419 - <i>Can requests to 127.0.0.1 be used to fingerprint the browser</i> [0] and has been fixed since then. Scanning localhost is a dangerous way to fingerprint the user if there are local open ports.<p>If you are not using Tor Browser and want to fix the security hole without disabling WebSocket completely, running the web browser in a separate network namespace is a workaround - you get a loopback interface which is independent from the main namespace, and you create a NAT interface within the network namespace to allow outgoing traffic. It&#x27;s also a possibility for a website to probe other machines, such as the setting page on your router. For better protection, you should block all the local addresses defined by RFC1918 via netfilter&#x2F;iptables as well.<p>For developers who needs less restrictive blocking for debugging, you can run multiple Firefox processes in different profiles (<i>firefox -P --new-instance</i>), each running in a different network namespace - to make it easy, you can code everything in a shell script and create desktop icons for them. I normally use an ad-blocked and 3rd-party-cookies-blocked profile for web browsing, but a naked Firefox profile for development.<p>[0] <a href="https:&#x2F;&#x2F;trac.torproject.org&#x2F;projects&#x2F;tor&#x2F;ticket&#x2F;10419" rel="nofollow">https:&#x2F;&#x2F;trac.torproject.org&#x2F;projects&#x2F;tor&#x2F;ticket&#x2F;10419</a>
评论 #23248725 未加载
评论 #23250966 未加载
评论 #23249603 未加载
souterrainabout 5 years ago
The greater issue is that browsers are allowing code executing from the public Internet <i>scope</i> (scope meaning security domain) network access to the localhost scope or the Intranet scope (RFC1918 addresses.)<p>If anything, this should require very explicit permission granting from the user. I’d prefer it be something more like an undocumented toggle accessible solely to developer types.
评论 #23247326 未加载
评论 #23246896 未加载
评论 #23253193 未加载
评论 #23247175 未加载
评论 #23247683 未加载
评论 #23247039 未加载
评论 #23247078 未加载
jolmgabout 5 years ago
&gt; Port Scanning is Malicious<p>Though port scanning can be (and maybe even frequently is) done with malicious intent by looking for misconfigured&#x2F;bugged servers, I disagree that it&#x27;s inherently malicious. Port scanning is just about checking to see what services a host is offering you. It&#x27;s like going to a random shop at a mall and asking what services they provide. Would asking about their services be malicious?<p>It feels like the reason asking about services is considered malicious is because shops frequently give out info to the public that they shouldn&#x27;t have. It&#x27;s like:<p>client: What services do you provide?<p>shop owner: Well, I can provide you with a list of all my clients along with their personal information they entrusted to me.<p>So, is the client being malicious for asking or is the shop owner the one that was in the wrong for mistakenly providing that info to the public?<p>I feel the only reason we don&#x27;t blame the shop owner is because even though he&#x27;s the one that mistakenly discloses private info, sometimes he&#x27;s just following a script written by a random programmer unassociated with him. Maybe the response was a mistake on the programmers part, maybe it was a mistake in how the shop owner used the script (a configuration error). In the end, it&#x27;s simpler to blame the client for asking out-of-the-box questions (after all, most clients just come in to ask if you&#x27;re giving out flyers&#x2F;pamphlets because that&#x27;s what everybody does) and so they don&#x27;t feel responsible for the response that results.<p>I can provide a shop that also offers things different than http(s) with open access to the public. It shouldn&#x27;t be a crime&#x2F;violation to ask me if I offer them.
评论 #23250186 未加载
评论 #23249195 未加载
评论 #23251832 未加载
评论 #23249999 未加载
评论 #23302341 未加载
badRNGabout 5 years ago
This raises the question: Is port scanning without consent a violation of the CFAA? Either it is legal, and researchers should face no repercussions for doing so, or it isn&#x27;t and eBay is non-compliant with CFAA. I recall hearing about someone either being arrested or convicted due to port scanning a courthouse, but it was many years ago and I can&#x27;t find the case with a cursory Google search.<p>I have to wonder what value eBay would get from port scanning its customers. Is it part of an attempt to detect bots&#x2F;attackers? Is malware running on their server trying to determine if the client is likely vulnerable to some propagation method?
评论 #23246643 未加载
评论 #23246558 未加载
评论 #23247086 未加载
评论 #23246728 未加载
评论 #23247052 未加载
评论 #23253134 未加载
评论 #23246671 未加载
评论 #23248110 未加载
评论 #23246553 未加载
评论 #23246577 未加载
评论 #23247010 未加载
评论 #23246619 未加载
评论 #23246529 未加载
splonkabout 5 years ago
&gt; Furthermore, when I installed and ran a VNC server, I didn&#x27;t detect any difference in site behavior - so why is it looking for it?<p>Not an eBay employee, but used to work in fraud detection. Two very obvious related guesses from my experience:<p>1. Fingerprinting a user to help identify account takeover (ATO). Open port signatures is probably a pretty good signal for that kind of thing (and it doesn&#x27;t seem to be measured in <a href="https:&#x2F;&#x2F;panopticlick.eff.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;panopticlick.eff.org&#x2F;</a>).<p>&gt; However it is also a valid tool used by administrators for remote access to machines, or by some end user support software, so the presence of VNC is a poor indicator of malware.<p>2. In a Bayesian sense, this probably isn&#x27;t right. I don&#x27;t know what eBay&#x27;s traffic looks like but I&#x27;m willing to bet that all other things being equal, traffic coming from a machine with an open VNC port is riskier. Fraud detection is a game of probabilities, so the existence of a valid user showing a particular characteristic doesn&#x27;t mean that the characteristic isn&#x27;t useful in a fraud model. The example I always give is that when I was doing this (quite some time ago), we could have had a 99% accuracy rate for a simple rule banning IPs from Turkey, Ghana, Nigeria, and Vietnam. It&#x27;s not because there weren&#x27;t any valid users from those countries, it&#x27;s just that the fraudsters where overwhelmingly likely to be using IPs from those countries.
评论 #23285156 未加载
评论 #23254141 未加载
评论 #23256875 未加载
braxxoxabout 5 years ago
Port scanning from a web page, combined with DNS rebinding, can present a really nasty attack, and can effect an entire private network, not just localhost.<p>Some more info here: <a href="https:&#x2F;&#x2F;medium.com&#x2F;@brannondorsey&#x2F;attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;@brannondorsey&#x2F;attacking-private-networks...</a><p>Example code: <a href="https:&#x2F;&#x2F;github.com&#x2F;brannondorsey&#x2F;dns-rebind-toolkit" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;brannondorsey&#x2F;dns-rebind-toolkit</a><p>A malicious DNS rebind server: <a href="https:&#x2F;&#x2F;github.com&#x2F;brannondorsey&#x2F;whonow" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;brannondorsey&#x2F;whonow</a><p>Disclaimer: I performed some of this research a few years ago. So those resource suggestions are my own, but they feel very relevant here.
crazygringoabout 5 years ago
First of all, fraud detection seems like a legitimate use case here. And WebSockets has many valid uses.<p><i>HOWEVER</i> -- how the hell is localhost port scanning allowed to happen <i>without my permission</i>?!<p>This feels no different from a website trying to check the existence of named directories on my file system or something.<p>Does WebSockets not require permission to function at all, or shouldn&#x27;t it be limited to some kind of CORS-type policy or <i>something</i> to connect without a permissions dialog? Or <i>even</i> if it&#x27;s allowed to port scan the entire public internet, at least block your local machine and network without explicit permission?
评论 #23252710 未加载
relaunchedabout 5 years ago
This use doesn&#x27;t seem to be covered by eBay&#x27;s privacy policy <a href="https:&#x2F;&#x2F;www.ebay.com&#x2F;help&#x2F;policies&#x2F;member-behaviour-policies&#x2F;user-privacy-notice?id=4260" rel="nofollow">https:&#x2F;&#x2F;www.ebay.com&#x2F;help&#x2F;policies&#x2F;member-behaviour-policies...</a>
parliament32about 5 years ago
Lots of chat in the comments about how this is all websockets&#x27; fault, but don&#x27;t forget you can portscan localhost with pure JS as well.<p><a href="https:&#x2F;&#x2F;portswigger.net&#x2F;research&#x2F;exposing-intranets-with-reliable-browser-based-port-scanning" rel="nofollow">https:&#x2F;&#x2F;portswigger.net&#x2F;research&#x2F;exposing-intranets-with-rel...</a>
评论 #23251537 未加载
bjt2n3904about 5 years ago
Every time I hear about some shiny new feature being added to a browser, I think...<p>1) Will I ever actually use this<p>2) How is this gonna screw me over<p>WebSockets, WebBluetooth, WebAssembly, Web-You-Can-Access-my-Accelerometer-and-Battery, haven&#x27;t ever wanted to use those. Ever. For anything. For any reason. (Edit 3: Oh yeah, I forgot! WebRTC!)<p>Edit: Fantastic. You can&#x27;t disable it in Firefox. So what, does Firefox need a freaking iptables implementation now? [1]<p>1 - <a href="https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1091016" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1091016</a><p>&quot;The only theoretical reason for the WebSocket pref these days is the possibility to disable it easily in case there is a security issue found in the protocol itself or so.&quot;<p>The protocol itself is the security issue. ALL OF IT.<p>Edit 2: So I don&#x27;t have the time to investigate every new fad when it comes out. I originally thought WebSockets were raw sockets, but they aren&#x27;t. Firefox blocks access to port 22 -- I was hoping all privileged ports, but it seems just those. Opening a WebSocket to netcat dumps out a HTTP request, so it seems unlikely that you&#x27;d be able to talk with anything that doesn&#x27;t talk HTTP and WebSockets. Firefox also seemingly blocks access to 192.168&#x2F;24 and 10&#x2F;8.<p>This makes me less angry. But what STILL make me angry is that I have to sit and research about some stupid thing that I don&#x27;t want and can&#x27;t turn off. Sooner or later, some web dev is gonna argue that all sites should be loaded over WebSockets because his bloated javascript stack performs marginally better, and then WebSockets <i>won&#x27;t</i> be something I can turn off. Websites will just whitepage.<p>Edit 4: Done researching this now. I went to ebay on Firefox, and wasn&#x27;t getting websocket scans. But I&#x27;ve got a stack of uBlock and NoScript... maybe that&#x27;s interfering with it some how? Opened up a stock config for google-chrome -- that&#x27;s my browser for &quot;some dumb new web tech that isn&#x27;t working in Firefox&quot; -- not seeing any scans when I open up inspector and click &quot;WS&quot;.<p>Regardless, his point still stands. You can totally use WebSockets as a port scanner for localhost, assuming the Content Security Policy allows it. Now I gotta go update my nginx configs...
评论 #23248568 未加载
评论 #23247491 未加载
评论 #23247357 未加载
评论 #23247409 未加载
评论 #23247287 未加载
评论 #23247611 未加载
评论 #23247249 未加载
评论 #23248741 未加载
评论 #23247520 未加载
评论 #23247186 未加载
评论 #23248129 未加载
评论 #23249975 未加载
评论 #23247488 未加载
评论 #23247837 未加载
评论 #23248310 未加载
评论 #23248690 未加载
评论 #23247426 未加载
评论 #23249104 未加载
评论 #23247961 未加载
评论 #23248616 未加载
Jonnaxabout 5 years ago
Browsers should be blocking this by default.<p>&quot;This website is trying to access services on your local PC, do you want to allow?&quot;<p>Or at least as blockers should have a rule for it.
osoloabout 5 years ago
My kids complained today that Google Classroom isn&#x27;t working. After a quick investigation, I noticed that Snort on my firewall blocked the relevant Google server due to incoming TCP port scans. Sigh.
评论 #23247218 未加载
评论 #23246997 未加载
评论 #23247932 未加载
xg15about 5 years ago
To my knowledge, a lot of effort has been put into the design of CORS (and related APIs) to specifically prevent misuse like that. A well-behaved Websocket implementation should not give the calling script any indication <i>why</i> a connection failed.<p>I know timing oracles are difficult to avoid in many cases - but the technique shown here seems to actually exploit different kinds of exceptions being thrown by the browser.<p>This seems like a straight-up bug and pretty serious security vulnerability to me.
评论 #23253757 未加载
maayankabout 5 years ago
If anyone thinks of implementing this, don&#x27;t forget to guard against reflection attacks[1]<p>EDIT: revisiting my comment (and the wikipedia article linked), a reflection or amplification attack in this context is sending traffic and generating (perhaps much more) traffic from a different source than yours as part of an attack. For example, you could spoof the IP address of the HTTP packets and cause the server to port scan another machine -&gt; little traffic (HTTP request) causing a lot of traffic (port scanning). As part of a DDOS attack, a botnet for example could use this to amplify their attack and masquerade the source.<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Denial-of-service_attack#Reflected_&#x2F;_spoofed_attack" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Denial-of-service_attack#Refle...</a>
fareeshabout 5 years ago
Why is localhost &#x2F; 127.0.0.1 allowed from a remote JS file without any permissions?
jamesfisherabout 5 years ago
Potentially you can do more than just port scan; it&#x27;s possible to use&#x2F;access the servers that you have running on your local machine if they&#x27;re left open. See my post about this: <a href="https:&#x2F;&#x2F;jameshfisher.com&#x2F;2019&#x2F;05&#x2F;26&#x2F;i-can-see-your-local-web-servers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;jameshfisher.com&#x2F;2019&#x2F;05&#x2F;26&#x2F;i-can-see-your-local-web...</a>
discreditableabout 5 years ago
From the title I assumed this was going to be something else. I remember some sites used to port scan you on registration. This was to check if registrations were from an open proxy, which was a very strong bot indicator. I might be misremembering but I think Slashdot used to do it. There were also some plugins for phpBB forums that did it too. I used one back in the day and it helped quite a bit with spam registrations.
评论 #23249575 未加载
评论 #23247048 未加载
xur17about 5 years ago
Is there a way to block this at the browser level? Ex: block access to localhost for all domains (except from localhost itself)?
评论 #23246877 未加载
评论 #23246814 未加载
评论 #23250894 未加载
评论 #23246867 未加载
评论 #23246762 未加载
gfxgirlabout 5 years ago
This is bad and should be blocked IMO, at least by default, but can a site do anything other than find out which ports respond to a websocket request? AFAIK they can&#x27;t send arbitrary network packets. The websocket will only open if the port they are trying to talk to speaks websocket back. This is mentioned in the article.<p>I&#x27;m not saying that&#x27;s okay. I still don&#x27;t want them scanning ports on my machine. There might be some services that offer a websocket connection like Plex for example, or the Kinect driver, or Leap Motion. I also don&#x27;t want them cataloguing ports that are open.
sitkackabout 5 years ago
I can&#x27;t believe of the 363 comments no one has mentioned Samy K and his awesome Poisontap project. Parts of which did this local scanning and connecting to your internal router management page.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;samyk&#x2F;poisontap" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;samyk&#x2F;poisontap</a><p>See also, <a href="https:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2010&#x2F;01&#x2F;05&#x2F;geo_location_stealing_hack&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2010&#x2F;01&#x2F;05&#x2F;geo_location_steali...</a>
annoyingnoobabout 5 years ago
If the bank is checking on my security then its reasonable for me to check the security of the bank, right?
评论 #23248788 未加载
laurentdcabout 5 years ago
&gt; Furthermore, when I installed and ran a VNC server, I didn&#x27;t detect any difference in site behavior - so why is it looking for it?<p>I think behind the scenes they keep log of some sort of fraud risk, e.g. geoip different from billing country, suddenly a new operating system, vnc&#x2F;teamviewer running would probably flag your account (even for benign purposes, e.g. you can get your money back or purchase cancelled if that info can prove your transaction was actually unauthorized).<p>I worked on a ecommerce where the previous developers implemented a rudimentary &quot;score&quot; system like that so that suspicious orders would be put in queue for phone verification (this was pre gdpr)
评论 #23246644 未加载
jcofflandabout 5 years ago
Port scanning localhost from a webpage has been possible for a long time and does not require websockets.<p><a href="http:&#x2F;&#x2F;jsscan.sourceforge.net&#x2F;" rel="nofollow">http:&#x2F;&#x2F;jsscan.sourceforge.net&#x2F;</a>
_bxg1about 5 years ago
I don&#x27;t follow what this has to do with websockets specifically; they just go over HTTP, so why couldn&#x27;t you do this with a regular HTTP request?<p>Either way it seems easy to mitigate at the browser level: block all requests to localhost that don&#x27;t originate from a page served on localhost. It&#x27;s not that different from the CORS policy.
gfxgirlabout 5 years ago
Yes, a drive by web page shouldn&#x27;t be able to do this but similarly a native app shouldn&#x27;t be able to do this and yet I suspect some not insignificant percent of native apps, especially on mobile on both OSes are doing this either directly, the app dev is doing it deliberately, or via one of the many 3rd party libraries they included but aren&#x27;t aware of the behavior.<p>I really want the OS to prevent this by default and require permission from the user. I want apps (probably only possible on iOS&#x2F;Android) to have to list the sites they&#x27;ll connect to, that list will have to be reasonably small 10-30 sites with special exceptions for browsers<p>This would have 2 positive affects. #1 it would prevent the apps from scanning the network. #2 it would effectively force apps to launch the user&#x27;s browser for external links instead of an embedded browser in which they can spy on all activity.
Giorgiabout 5 years ago
I don&#x27;t think motivation is malware detection, I am assuming this is sort of fraud detection (like carding)
akerroabout 5 years ago
Interesting, port scanning is illegal in some countries as it&#x27;s classified as security testing, it can be only performed with permission.<p>How would you feel is someone was walking on busy car parking and checking if doors of the cars are open? It&#x27; what port scanning is, checking if the car has open door.
评论 #23249107 未加载
评论 #23248770 未加载
anderspitmanabout 5 years ago
Curious what HN thinks about this hypothetical: Imagine you have a web app designed to talk to a specific backend server API. It&#x27;s also common for users to run instances of the server on their local machine. How would you feel about the app checking a (single) well-known port to see if there&#x27;s a local server running, and prompting the user: &quot;we detected you&#x27;re running a local copy of the server, do you want to connect to it?&quot;<p>This doesn&#x27;t seem to be done very often, and the public cases usually seem to be pretty ugly (Zoom). But I could see it being useful. Imagine for example an app for browsing S3 directories, that could also detect if you&#x27;re running a minio server and allow you to connect to it, and transfer data back and forth between your different backends.
评论 #23250145 未加载
ilikenwfabout 5 years ago
This slideshow by an NSA dude seems to go into this, from 2016.<p><a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;meeting&#x2F;96&#x2F;materials&#x2F;slides-96-saag-1&#x2F;" rel="nofollow">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;meeting&#x2F;96&#x2F;materials&#x2F;slides-96-...</a>
csagan5about 5 years ago
There is an open Chromium bug for this: <a href="https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=378566" rel="nofollow">https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=378566</a><p>I hope they consider it still valid and not close it.<p>These are the blocked ports: <a href="https:&#x2F;&#x2F;github.com&#x2F;chromium&#x2F;chromium&#x2F;blob&#x2F;83.0.4103.53&#x2F;net&#x2F;base&#x2F;port_util.cc#L22" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;chromium&#x2F;chromium&#x2F;blob&#x2F;83.0.4103.53&#x2F;net&#x2F;b...</a><p>Accessing localhost and LAN addresses works perfectly fine, except for those ports.<p>I am going to patch Bromite so that it doesn&#x27;t allow any access to localhost nor private networks.
评论 #23253264 未加载
XaspR8dabout 5 years ago
This does suggest to me that browser websocket requests against localhost should at least:<p>1) return the same error message for all failures (unless some opt-in &#x2F; launch flag is set)<p>2) fiddle with the timing slightly to make timing attacks less useful? (how long is a localhost TLS connection? 100ms? I think devs can wait a handful of frames for their failure response.)<p>I have no idea how many legitimate apps are leveraging some kind of localhost connection -- it sounds like an unusual use case but I can certainly imagine some enterprise app that ties into desktop services or programs by that route.<p>EDIT: Of course banning them outright or requiring specific user whitelisting of domains would work as well. Just trying to get away with the smallest change.
rurbanabout 5 years ago
Many questionable Russian sites do full port scans not only on localhost but on all the private subnets. I had to block all access to ports above 1024 for all local subnets. Usually people don&#x27;t have firewall rules for that.
franga2000about 5 years ago
Allowing ws connections to local addresses can be pretty useful in many cases (admittedly, many of these could be better solved with WebExtensions&#x27; native messaging) so disallowing it would not fly.<p>But since this is pretty rare, a message saying: &quot;this website is trying to connect to services running on your computer - allow&#x2F;deny?&quot; would be pretty easy to implement and solve this for good. Sites that need this already require you to jump through hoops, so one more popup would be fine, but sites that do this for other reasons would probably not want to risk a popup.
thanksforfishabout 5 years ago
See also: BeEF[1]<p>Theres lots of scanning&#x2F;attacks you can do using the web browser as your scanning tool. Its troubling that major sites are starting to use some of these techniques, but these techniques have been readily available to attackers with open source tooling.<p>I think it&#x27;s long overdue for browser to find a way to mitigate these sorts of attack vectors. If the security folks can&#x27;t justify it due to BeEF, maybe the privacy folks can using articles like this.<p>[1] <a href="https:&#x2F;&#x2F;beefproject.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;beefproject.com&#x2F;</a>
TekMolabout 5 years ago
When you do this:<p><pre><code> new WebSocket(&quot;ws:&#x2F;&#x2F;127.0.0.1:8080&quot;) </code></pre> An application listening on 8080 is indeed getting a packet delivered.<p>Run this to see the packet:<p><pre><code> nc -lp 8080 </code></pre> And the page can figure that out via the error returned.<p>I wonder if that is in line with the same origin policy.<p>On the other hand, maybe the same is possible by creating an image with src=&quot;<a href="http:&#x2F;&#x2F;127.0.0.1&#x2F;hello.jpg&quot;" rel="nofollow">http:&#x2F;&#x2F;127.0.0.1&#x2F;hello.jpg&quot;</a> and looking at the onload&#x2F;onerror event?
评论 #23250514 未加载
blakesterzabout 5 years ago
hmmm, so the conclusion is:<p>&quot;Whether the port scan is used as part of an infection or part of e-commerce or bank &quot;security checks&quot;, it is clearly malicious behavior and may fall on the wrong side of the law.&quot;<p>Though I really don&#x27;t know what ebay or banks or any site might be doing, it seems like it&#x27;s almost certainly a defensive thing looking for signs of trouble. I don&#x27;t know if I&#x27;d call it malicious. Isn&#x27;t this totally harmless in this case? That is, eBay portscans me, how is this malicious?
评论 #23247316 未加载
foobarplopp27about 5 years ago
This guy Just has it wrong when he calls port scanning an adversarial technique. It&#x27;s Just a way to discover Services. You can then use the result to do malicious things but it&#x27;s not like the only or even main purpose. I humbly refer to this: <a href="https:&#x2F;&#x2F;koeln.ccc.de&#x2F;ablage&#x2F;portscan-policy.xml" rel="nofollow">https:&#x2F;&#x2F;koeln.ccc.de&#x2F;ablage&#x2F;portscan-policy.xml</a> (Google translate can help with the german)
owaisloneabout 5 years ago
This is scary. I&#x27;ve always left locally running services unprotected for convenience given they can&#x27;t be accessed from outside. I can imagine a lot of people running local apps, servers or databases without any auth that could contain sensitive information. Would a webpage be able scrape data from such services? Any way to disable this completely in Firefox and Chrome?
评论 #23247379 未加载
swalshabout 5 years ago
I can think of a legitimate use case for this. If you watch some of these scammer youtube videos, one common thing they seem to do is get on a screensharing application, and have the user log into their bank account. From there, the scammer inspects the html, and manipulates the values to trick the victim.<p>A bank knowing if someone else is watching your screen is a decent security measure.
brainzapabout 5 years ago
This is why the websocket implementation does not have meaningful error codes, so people can not abuse it. But they still do.
thisisnotabout 5 years ago
in firefox it seems you can disable websocket with network.websocket.max-connections = 0<p>Firefox and the illusion of privacy<p>(1)<a href="https:&#x2F;&#x2F;www.remembertheusers.com&#x2F;2018&#x2F;03&#x2F;0455-firefox-and-the-illusion-of-privacy.html" rel="nofollow">https:&#x2F;&#x2F;www.remembertheusers.com&#x2F;2018&#x2F;03&#x2F;0455-firefox-and-th...</a>
homamiabout 5 years ago
How does it work in practice? It seems in Chrome these errors cannot be caught try-catch blocks.<p><pre><code> try { var socket = new WebSocket(&#x27;ws:&#x2F;&#x2F;localhost:808&#x27;); } catch (ex) { console.log(ex) &#x2F;&#x2F; control does not reach here }</code></pre>
评论 #23251286 未加载
paddlesteamerabout 5 years ago
Actually , I&#x27;m pleased ebay is doing this. It wasn&#x27;t a new issue but now ebay doing it, it took a lot of attention. It&#x27;s like disclosing a security issue in WebSocket protocol. Now I&#x27;m sure next releases of the most browsers will fix it.
bosswipeabout 5 years ago
Javascript was a mistake, seriously. The benefit-cost ratio from the user&#x27;s point of view is disastrous. I&#x27;d rather slog through less fancy data entry forms than suffer endless tracking, privacy and security attacks.
mirimirabout 5 years ago
Please ELI5 why it doesn&#x27;t happen for www.ebay.com using Firefox in Debian. I see no websocket connections to localhost in Network Monitor or iftop.
drbenwayabout 5 years ago
I&#x27;ve noticed many of the survey for cash sites use websockets to scan for running services on your machine Personally I think its straight up evil
评论 #23252980 未加载
problem_haltingabout 5 years ago
I see the port scanning behavior in Firefox and Chrome but not in Brave, even with Brave shields down. Anyone else use Brave?
barbarbarabout 5 years ago
So if disable javascript - it will not be possible?
null4bl3about 5 years ago
Now scanning for open ports I can do on Linux.<p>But how would I go about monitoring which ports are being scanned on Linux?<p>No tool doing this comes to mind
jquastabout 5 years ago
See also, <a href="http:&#x2F;&#x2F;localrouter.net&#x2F;" rel="nofollow">http:&#x2F;&#x2F;localrouter.net&#x2F;</a>
snikchabout 5 years ago
Did they check the source of the request? My guess would have been an extension doing this instead of the site.
pknerdabout 5 years ago
I just tried myself and could not find any such thing. MAy be a bug or removed after seeing it featured on HN?
skizmabout 5 years ago
Is there a setting or something in either chrome or FF to block websites from being able to port scan you?
评论 #23249388 未加载
3fe9a03ccd14ca5about 5 years ago
How do I prevent this? Is there something I can do to block localhost (RFC 1918) port scanning?
m3047about 5 years ago
Apropos past issues with Zoom installing a local server, this is important to consider.
dreamcompilerabout 5 years ago
Damn. Yet another example of &quot;This is why we can&#x27;t have nice things.&quot;
JaceLightningabout 5 years ago
Poorly written article: mixes facts and opinions<p>&gt; it seems many sites are port scanning visitors for dubious reasons.<p>Claims that in the intro, but then admits ebay is scanning for VPNs, which probably means it&#x27;s doing fraud detection, which is definitely not a dubious reason, and is probably actually beneficial to the customer.
lucaserbabout 5 years ago
I downloaded Brave for the first time today after reading this.
tonymetabout 5 years ago
anyone know the config or flag in Chrome to disable any requests to localhost? Ideally excluding origin=localhost, but if not possible i can dev on a different account
azinman2about 5 years ago
Any suggestions of ways to block this? Any Safari extensions?
dawnerdabout 5 years ago
eBay must have some logic to determine who to scan. I can&#x27;t get it to trigger on my windows desktop or mac.
lucaserbabout 5 years ago
Downloading Brave Browser right now...
zlynxabout 5 years ago
If you want analogies, this is like walking into a bank to do business and the security guard checking to see if you&#x27;re wearing a mask.
评论 #23249241 未加载
awinter-pyabout 5 years ago
TLDR because you have javascript enabled
kgersenabout 5 years ago
port scanning is fine and should not be illegal. It&#x27;s just &quot;looking&quot; at a house to see if there is a door and what type of key (protocol) it uses.<p>Trying to open a connection on the other hand it&#x27;s like trying to open the door. That should be considered as a violation.
评论 #23246722 未加载
评论 #23246649 未加载
评论 #23246746 未加载
评论 #23246797 未加载
评论 #23246710 未加载
评论 #23246686 未加载
评论 #23246760 未加载
评论 #23246723 未加载
superkuhabout 5 years ago
Port scanning isn&#x27;t malicious behavior. Port scanning is about equivalent to walking down the street and looking at the architecture of the buildings.
评论 #23248447 未加载