I have this old TP-Link smart lightbulb, it’s the only thing that’s IoT and on WiFi in my house.

Looking through pfBlocker logs for fun, and noticed it’s been trying to connect to the Tor network.

Oh! Also, it’s been uploading and downloading 100+ MB of data a day.

  • Auzy@beehaw.org
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    10 months ago

    How do you know it is? Dpi is often wrong about both protocol. And size

    123 isn’t the normal protocol though, so let’s assume it is malicious (I will admit I could be wrong here). Packet dumps is the way to prove it. If op posts packet dumps, that would be useful (as I could be wrong, the normal protocol is a different port generally though).

    Also, important to note that if they’re uk hs100 plugs, they have different firmware too… The UK ones have one of the protocols shut off

    • ReversalHatchery@beehaw.org
      link
      fedilink
      arrow-up
      0
      ·
      10 months ago

      How do you know it is? Dpi is often wrong about both protocol.

      I didn’t mean to say that. My point wanted to be that it is a bit too much traffic for it to be honest NTP traffic (as it was assumed above), unless the program sending it has a honest bug

      • Auzy@beehaw.org
        link
        fedilink
        arrow-up
        0
        ·
        10 months ago

        Dpi on these cheap routers sometimes often doesn’t even calculate the data downloaded correctly. Ie, we can’t even rely on the 100mb figure

        • ReversalHatchery@beehaw.org
          link
          fedilink
          arrow-up
          0
          ·
          10 months ago

          I’m a little confused. Why do you think this is a cheap router?
          As I know pfBlocker is a component of the pfSense firewall OS, and if OP runs that on their router, it must almost certainly be an x86 machine and have much more RAM than the amount that cheap routers have, according to the minimum reqs.