Jump to content
  • Suspicious Telnet Activity


    donjon56

    Game Version: (A18 b155 / A18.1 bxxx / etc)

    Platform: (PC / Mac)

    OS/Version: (Windows / Linux / Mac)

    CPU Model: (Intel i5 9600K / AMD Ryzen 7 1800x / etc)

    System Memory: (4 GB / 8 GB / 16 GB / etc)

    GPU Model and VRAM: (nVidia GTX 1060 4 GB / AMD RX 580 8 GB / etc)

    Screen Resolution: (width and height)

    Video Settings: (Low / Medium / High / Ultra / Custom (Custom has many combinations, so just list the settings you think are relevant to the bug if any))

    Game mode: (MP host / MP client / SP / Client on dedi, RWG or NAV)

    Server

     

    2022-01-29T15:32:23 0.840 INF Version: Alpha 20 (b238) Compatibility Version: Alpha 20, Build: Windows 64 Bit
    2022-01-29T15:32:23 0.840 INF System information:
    2022-01-29T15:32:23 0.841 INF    OS: Windows 10  (10.0.14393) 64bit
    2022-01-29T15:32:23 0.841 INF    CPU: AMD Ryzen 9 3950X 16-Core Processor  (cores: 32)
    2022-01-29T15:32:23 0.841 INF    RAM: 131001 MB
    2022-01-29T15:32:23 0.841 INF    GPU: Null Device (128 MB)
    2022-01-29T15:32:23 0.842 INF    Graphics API: NULL 1.0 [1.0] (shader level 5.0)

     

    Did you wipe old saves? (Yes/No) N/A

    Did you start a new game? (Yes/No) N/A

    Did you validate your files? (Yes/No) N/A

    Are you using any mods? (Yes/No) No

    EAC on or off? Off

     

    Status: NEW

     

    Bug Description:

    I am seeing unusual telnet activity on my server.

     

    I had it enabled for several weeks testing a feature, but it seems someone discovered/brute forced my 16 char random password.

     

    I am providing this report to provide you a view in to what someone is attempting to do with your telnet client / session.

     

    (I will just disable the feature for the time being)

     

    https://pastebin.com/Yu4LVGrw

     

     

    Detailed steps to reproduce the bug:

     

    1) N/A

     

     

    Actual result: (description of what is occurring)

     

    Expected result: (what you expect to occur)


    User Feedback

    Recommended Comments

    Will setup a test for telnet abuse, but question: Are you using any external tools or whatnots like server tools or a mod that increases player limit or anything of the sorts?

    Link to comment
    Share on other sites

    At the moment I was not using any modifications or tools.

     

    I was just testing the features with telnet and web console.

     

    Since Server Blend did not have any reverse proxy or tunnels for securing it, I was not planning to have it on long term.

     

    Server was set for Public with a different Password for users to join.

    Telnet and Web Console had different 16 char fully randomized passwords.

    Link to comment
    Share on other sites

    I wonder what do you view as suspicious in those logs?

    Logs show nothing but two instant telnet sessions and two long ones; logs do not suggest that anything at all was written into socket during those long sessions. It could be just the log level though. If logs are indeed scarce then without traffic dumps noone would be able to tell what happened, won't they?

     

    That said, no idea what is expected in server logs from telnet session. And 4 telnet sessions from same IP at about the same time is odd... :)

    Link to comment
    Share on other sites

    56 minutes ago, Diaboliko said:

    I wonder what do you view as suspicious in those logs?

    Logs show nothing but two instant telnet sessions and two long ones; logs do not suggest that anything at all was written into socket during those long sessions. It could be just the log level though. If logs are indeed scarce then without traffic dumps noone would be able to tell what happened, won't they?

     

    That said, no idea what is expected in server logs from telnet session. And 4 telnet sessions from same IP at about the same time is odd... :)

    This was 6+ months ago. Suspicious is that i had 16+ character random password that was not shared with anyone, nor had I actually connected to it yet.

     

    Within 5 days there was an open connection on it. Granted, there was no record of any activity other than holding open the connection. 

     

    If brute forced, that seemed oddly quick, plus there were not any login failures in the logs.

     

    This occurred three times with different passwords. I disabled after that.

     

    It was not from the same ip range 

     

    While nothing came of these connections. Given a large number of open tenet sessions. A coordinated attack could be staged against the hosting company.

    Link to comment
    Share on other sites

    Well, I kinda feel like nothing can be done on this topic. Best thing devs can do is to check that everything you could possibly want is being logged properly in logs and pay some red team to scan&test for known vulnerabilities. That's a bit too much for non-competitive game servers don't you think?

     

    Firewalling/reverse-proxying is probably best option you've got to keep it safe.

    Link to comment
    Share on other sites

    11 hours ago, Diaboliko said:

    Well, I kinda feel like nothing can be done on this topic. Best thing devs can do is to check that everything you could possibly want is being logged properly in logs and pay some red team to scan&test for known vulnerabilities. That's a bit too much for non-competitive game servers don't you think?

     

    Security-vulnerabilities would be must-fix no matter what type of game it is. Attacker might not just want to manipulate the game but take over the server and use it for spam-relay, bitcoin-mining or attacking users trying to connect.  

     

    11 hours ago, Diaboliko said:

     

    Firewalling/reverse-proxying is probably best option you've got to keep it safe.

     

    Telnet is inherently unsafe if someone is able to listen in (granted that isn't easy). I use telnet only locally so that an attacker has to be on my server already to listen in.

     

     

    I just checked my logfile and commands get listed in the log. You don't have any commands listed, so the attacker seems not to have reached the telnet input prompt (I assume he would have at least tried one of the normal commands before continuing to hack).

     

    It also looks to me like he never got past the login. At least there is no evidence to the contrary but I have no access to the code. Though messages like "An established connection was aborted by the software in your host machine" or "The operation is not allowed on non-connected sockets" very much sound like he simply failed and was thrown out already at the operating system level.

     

    Exceptions are a pretty normal way to handle exceptional and less probable paths through the code and not necessarily a sign of a vulnerability.

     

    Edited by meganoth (see edit history)
    Link to comment
    Share on other sites

    > "An established connection was aborted by the software in your host machine" or "The operation is not allowed on non-connected sockets"

    The latter one could be just an attempt to send FIN or reset TCP packet through a closed connection or sthing, not necessarily a request data.

    Link to comment
    Share on other sites

    23 hours ago, Diaboliko said:

    Well, I kinda feel like nothing can be done on this topic. Best thing devs can do is to check that everything you could possibly want is being logged properly in logs and pay some red team to scan&test for known vulnerabilities. That's a bit too much for non-competitive game servers don't you think?

     

    Firewalling/reverse-proxying is probably best option you've got to keep it safe.

    Agreed, other than implementing TLS or SSL...

     

    That falls more under host/IT for reverse proxy or VPN tunnel

    Link to comment
    Share on other sites



    Create an account or sign in to comment

    You need to be a member in order to leave a comment

    Create an account

    Sign up for a new account in our community. It's easy!

    Register a new account

    Sign in

    Already have an account? Sign in here.

    Sign In Now

×
×
  • Create New...