Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Empty attacker IP and port 0 with ftpdatalisten protocol #325

Open
Larrax opened this issue Apr 23, 2021 · 1 comment
Open

Empty attacker IP and port 0 with ftpdatalisten protocol #325

Larrax opened this issue Apr 23, 2021 · 1 comment

Comments

@Larrax
Copy link

Larrax commented Apr 23, 2021

ISSUE TYPE
Question

DIONAEA VERSION
0.11.0

OS / ENVIRONMENT
Debian 10

SUMMARY
Hi, I have some very basic questions.
We are running some Dionaea honeypots and consuming the data through hpfeeds. Analyzing the data, I noticed about ~50% of all events with application protocol "ftpdatalisten" have attacker IP as an empty string and source port 0. I have two questions related to this.

  • Is this an expected behavior? (IMHO, at least port 0 seems like corrupted data, not a legit port number. Why not send None instead?)
  • What is the meaning of such an event in the context of this "ftpdatalisten" protocol?

Thanks.
Looking forward to your replies.

STEPS TO REPRODUCE
Install dionaea from source
Run dionaea
Observe events with "ftpdatalisten" protocol

EXPECTED RESULTS
All events have legit attacker IP and port.

@welcome
Copy link

welcome bot commented Apr 23, 2021

Thanks for opening your first issue here! Be sure to follow the issue template!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant