Advertisement
Guest User

haste

a guest
Apr 29th, 2019
428
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.92 KB | None | 0 0
  1. Bob DoleToday at 9:43 PM
  2. what ports does haste use?
  3. Joey <Haste>Today at 9:49 PM
  4. @Bob Dole We don't publish the ports that Haste uses. It is compatible with any standard NAT implementation
  5. Bob DoleToday at 9:50 PM
  6. Well, it's interesting, because I found some disturbing traffic associated with haste on my network based around UDP port 10000
  7. Joey <Haste>Today at 9:50 PM
  8. What makes it disturbing?
  9. Bob DoleToday at 9:51 PM
  10. 1) the fact that you dont publish information about what ports it uses anywhere 2) the fact that my computer is connecting to servers that are openly accessible from the internet
  11. so i spent a lot of time trying to trace down where this traffic was coming from
  12. if this information was easily accessible at least people would know. it's random IPs on a high UDP port, which most people would associate with botnet traffic. If you google UDP port 10000 the first thing that comes up is rootkit keyloggers
  13. Joey <Haste>Today at 9:52 PM
  14. You can scan our software with Google's security software and find that it is not malicious.
  15. https://virustotal.com/
  16. Many applications use high UDP ports... all Steam games, for example
  17. Bob DoleToday at 9:53 PM
  18. I'm sure the actual executable is not malicious, what I'm trying to explain is that since there's no documentation on what type of network behavior it exhibits, people might get the wrong idea
  19. Joey <Haste>Today at 9:53 PM
  20. And most other UDP-based games
  21. Sure, but publishing that also takes away our competitive advantage
  22. People are welcome to reverse engineer our product at their leisure, knowing that it violates our license agreement
  23. Bob DoleToday at 9:54 PM
  24. That's a really odd stance to take when it would help a lot of people to be able to see where this weird network traffic is coming from
  25. So since I thought I was rootkitted, I canceled all of my credit cards
  26. So you can see the type of thing you could stop from happening by simply documenting what type of stuff we can expect
  27. Joey <Haste>Today at 9:56 PM
  28. We have chosen not to document it, but people are welcome to inquire about it in support tickets. So far, we've never had a ticket about such traffic
  29. Bob DoleToday at 9:56 PM
  30. I'm asking here what ports it uses. is that not good enough?
  31. Can you confirm UDP 10000 is one of them at least?
  32. Joey <Haste>Today at 9:56 PM
  33. Yes, that's why you see it associated with the Haste application.
  34. Bob DoleToday at 9:57 PM
  35. I mean I didn't know until I looked at traffic on my firewall and saw it go away when I uninstalled haste. If you google that port you'll see it's not associated with anything good
  36. Joey <Haste>Today at 9:57 PM
  37. Our software is also signed, unlike most malicious software
  38. Port numbers are arbitrary
  39. Here's the code signature for our software
  40.  
  41. If your executable is signed like that, it's not been manipulated
  42. It would break the signature
  43. Bob DoleToday at 9:58 PM
  44. Okay, thanks for the talk. I canceled my subscription with Haste because I think it's disingenuous to not publish what type of network activity users can expect.
  45. Joey <Haste>Today at 9:59 PM
  46. Well, we discuss the type of network traffic in our terms of service and privacy policy.
  47. Bob DoleToday at 9:59 PM
  48. Is there a URL I can go to, so that I can see it?
  49. Joey <Haste>Today at 9:59 PM
  50. It's in the footer of all of our pages:
  51. https://haste.net/terms-of-service
  52. https://haste.net/privacy-policy
  53. Haste
  54. Terms of Service - Haste
  55. Haste terms of service.
  56. Haste
  57. Privacy Policy - Haste
  58. Haste reduces latency and improves network stability for gamers without invading your privacy! Read our policies to understand what we do with your data.
  59. For starters:
  60. information about your game play (including, without limitation, your location, network performance, game statistics, network statistics, network path, hardware configuration, network traffic, record of performance, and connectivity to the rest of the Internet);
  61. Information Gathered from Your Use of the Services. We automatically collect certain data when you use the Services, such as (1) IP address; (2) domain server; (3) type of device(s) used to access the Services; (4) web browser(s) used to access the Services; (5) referring webpage or other source through which you accessed the Services; (6) geolocation information; (7) beta use information, (8) information about your game play (including, without limitation, your location, network performance, game statistics, network statistics, network path, hardware configuration, network traffic, record of performance, and connectivity to the rest of the Internet); and (9) other statistics and information associated with the interaction between your browser or device and the Services (collectively “Traffic Data”). Depending on applicable law, some Traffic Data may be Personal Information.
  62. Bob DoleToday at 10:01 PM
  63. How exactly does that translate into someone associating your application with the traffic I mentioned? Your TOS basically says you have carte blanche to use any protocol/port you want
  64. Joey <Haste>Today at 10:02 PM
  65. Yes, for the purpose of analyzing and optimizing your connection based on testing we perform of your connection
  66. Bob DoleToday at 10:03 PM
  67. I can see this is going nowhere. I would highly encourage you to publish what ports and to what IPs people will be seeing traffic to. Also to lock down SSH on the servers your send people's traffic to. Hopefully you can pass my complaint along
  68. It just seems shady and botnet like to the outsider
  69. Joey <Haste>Today at 10:04 PM
  70. For security reasons, we do not intend on publishing ports or IP addresses. SSH is already locked down on all infrastructure.
  71. Bob DoleToday at 10:04 PM
  72. it's not
  73. I was able to open an SSH connection to every IP
  74. which makes it look even more like a hacked botnet
  75. Joey <Haste>Today at 10:04 PM
  76. Sure, but your connection was dropped immediately because we don't accept password authentication.
  77. Unless someone has a valid private key file, they're not getting in
  78. Bob DoleToday at 10:05 PM
  79. Alright. Please consider my complaint, thank you.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement