Hi,
so, now that I've put in place a dns queries tracking system via Diversion/uiDivStats that tracks what domains each LAN clients queries for, I have made a step forward in investigating the following issue.
As a recap, I have Suricata installed on my RT-AC5300 via opkg/entware. I'm signalled alerts about suspect DNS queries of 2 types:
So the suspect is now confirmed to be the router itself, and the question becomes: why does he need such domains ? I would bet that neither stock firmware by itself, nor a clean Merlin install would need them, so what can it be ? Something I installed via Entware ? And how can I investigate it ?
It's not something that you'd find via an extensive (actually not viable) tcpdump on the machine as it wouldn't show the process initiating the request. The only command I can think of in linux that might help is an lsof (with -i option), but that's helpful only in the very same instant when the communication occurs, so you're highly unlikely to catch it.
Note that I'm running the latest 386.1_2 fw. The router runs Suricata, Skynet and Diversion (with pixel-srv enabled).
Thanks
Peppe
so, now that I've put in place a dns queries tracking system via Diversion/uiDivStats that tracks what domains each LAN clients queries for, I have made a step forward in investigating the following issue.
As a recap, I have Suricata installed on my RT-AC5300 via opkg/entware. I'm signalled alerts about suspect DNS queries of 2 types:
- Level: Warning, "ET DNS Query to a *.top domain - Likely Hostile" (e.g. dgafgadsgkjg.top) or "ET DNS Query to a *.pw domain - Likely Hostile" (e.g. us.bookofstorage.pw)
- Level: Alert, "ET POLICY Android Adups Firmware DNS Query 2", one example is: bigdata.adsunflower.com (explanation at: www.kryptowire.com/adups_security_analysis.html)
So the suspect is now confirmed to be the router itself, and the question becomes: why does he need such domains ? I would bet that neither stock firmware by itself, nor a clean Merlin install would need them, so what can it be ? Something I installed via Entware ? And how can I investigate it ?
It's not something that you'd find via an extensive (actually not viable) tcpdump on the machine as it wouldn't show the process initiating the request. The only command I can think of in linux that might help is an lsof (with -i option), but that's helpful only in the very same instant when the communication occurs, so you're highly unlikely to catch it.
Note that I'm running the latest 386.1_2 fw. The router runs Suricata, Skynet and Diversion (with pixel-srv enabled).
Thanks
Peppe