On 21.10.2024 16:59, Eduardo M KALINOWSKI wrote:
On 20/10/2024 15:44, Alexander V. Makartsev wrote:
Hello.

I host some Debian ISO images via BitTorrent, among other things and
recently I have noticed very high interest in one torrent in particular: "debian-12.5.0-amd64-netinst.iso". My torrent client shows multiple connections from various networks (more IPs than /24),
and according to "whois", all originating from China.
The odd part is these remote clients report their ID as "unknown", connect using TCP protocol non-encrypted
and never send more than 4 download requests.

Are they actually speaking the BitTorrent protocol? Could this be caused by simply connecting to the host (in some kind of port scan), or perhaps connecting and probing for some other vulnerability, maybe not even related to BitTorrent (something like "GET /admin?user=admin&password=imasuperhacker HTTP/1.0")?
It doesn't look like some port scan or automated exploitation attempts. Those are usually one-offs. Instead, these suspicious connections successfully negotiate with my torrent client and stay connected, downloading that one ISO file indefinitely. If I manually throttle these connections they disconnect after some time and soon after a new connection from another IP from the same subnet or different network establishes. So it is an automated distributed process, the only thing still missing is the purpose of it. I know there are techniques to fool DPI systems and mask SNI of the outgoing HTTPS connections, but AFAIK they should go to 443/tcp port and my torrent port is different. I'm pretty sure that other peers of tracker at "bttracker.debian.org" are having exactly the same problem.

--

 With kindest regards, Alexander.

 Debian - The universal operating system
 https://www.debian.org

Reply via email to