从全新重启后,我进入netstat -an | more
终端 shell,并99.86.32.24
从 netstat 的输出中找到一个通过端口连接到我的系统的外部 ip 地址443
。我选择不向 cannonical 遥测服务器发送诊断报告,但我已连接到 cannonical 和 amazon aws,为什么?
以下是将 amazon ip 作为参数传递后的 whois 命令的输出:
NetRange: 99.85.128.0 - 99.87.191.255
CIDR: 99.85.128.0/17, 99.87.128.0/18, 99.86.0.0/16, 99.87.0.0/17
NetName: AMAZO-4
NetHandle: NET-99-85-128-0-1
Parent: NET99 (NET-99-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS16509
Organization: Amazon.com, Inc. (AMAZO-4)
RegDate: 2018-01-10
Updated: 2018-01-11
Ref: https://rdap.arin.net/registry/ip/99.85.128.0
OrgName: Amazon.com, Inc.
OrgId: AMAZO-4
Address: Amazon Web Services, Inc.
Address: P.O. Box 81226
City: Seattle
StateProv: WA
PostalCode: 98108-1226
Country: US
RegDate: 2005-09-29
Updated: 2020-04-07
Comment: For details of this service please see
Comment: http://ec2.amazonaws.com
Ref: https://rdap.arin.net/registry/entity/AMAZO-4
OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-266-4064
OrgTechEmail: [email protected]
OrgTechRef: https://rdap.arin.net/registry/entity/ANO24-ARIN
OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-266-4064
OrgNOCEmail: [email protected]
OrgNOCRef: https://rdap.arin.net/registry/entity/AANO1-ARIN
OrgRoutingHandle: ADR29-ARIN
OrgRoutingName: AWS Dogfish Routing
OrgRoutingPhone: +1-206-266-4064
OrgRoutingEmail: [email protected]
OrgRoutingRef: https://rdap.arin.net/registry/entity/ADR29-ARIN
OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-266-4064
OrgAbuseEmail: [email protected]
OrgAbuseRef: https://rdap.arin.net/registry/entity/AEA8-ARIN
OrgRoutingHandle: IPROU3-ARIN
OrgRoutingName: IP Routing
OrgRoutingPhone: +1-206-266-4064
OrgRoutingEmail: [email protected]
OrgRoutingRef: https://rdap.arin.net/registry/entity/IPROU3-ARIN
我在这里的总体问题是,如果我选择不发送遥测数据,为什么 ubuntu 会连接到任何其他远程服务器?这种/这些连接有什么原因吗?或者我应该多疑吗?
答案1
Canonical 在 AWS 中托管一些内容和更新镜像。您在此处看到的可能就是这些。
答案2
既然你问了,就我个人而言,我会小心谨慎,用 iptables 阻止它,并密切关注它的再次出现。当然,如果它影响到操作系统所需的任何服务,请留意。如果是这样,请在这里报告。现在,如果你不小心谨慎,那你就疯了。
使用上面注释中的提示来确定涉及哪些应用程序以开始您的调查。
事实上,我是在搜索“dogfish routing”时发现了这个问题,因为我发现来自另一个包含相同字符串的网络块 54.64.0.0/13 AMAZON-2011L 的可疑流量。