I have this old TP-Link smart lightbulb, it’s the only thing that’s IoT and on WiFi in my house.
Looking through pfBlocker logs for fun, and noticed it’s been trying to connect to the Tor network.
Oh! Also, it’s been uploading and downloading 100+ MB of data a day.
Egh… More bad info. Seems to be prolific here on Lemmy
And yeah, definitely not Tor (I happen to know the TPLink KASA HS100 protocol too). The chip running on them wouldn’t even have sufficient resources to run tor more likely lol
Plus, as others have said, port 123 is NTP
Ok, it’s not Tor, but why would it generate 100 MB of NTP traffic every day?
How do you know it is? Dpi is often wrong about both protocol. And size
123 isn’t the normal protocol though, so let’s assume it is malicious (I will admit I could be wrong here). Packet dumps is the way to prove it. If op posts packet dumps, that would be useful (as I could be wrong, the normal protocol is a different port generally though).
Also, important to note that if they’re uk hs100 plugs, they have different firmware too… The UK ones have one of the protocols shut off
I didn’t mean to say that. My point wanted to be that it is a bit too much traffic for it to be honest NTP traffic (as it was assumed above), unless the program sending it has a honest bug
Dpi on these cheap routers sometimes often doesn’t even calculate the data downloaded correctly. Ie, we can’t even rely on the 100mb figure
I’m a little confused. Why do you think this is a cheap router?
As I know pfBlocker is a component of the pfSense firewall OS, and if OP runs that on their router, it must almost certainly be an x86 machine and have much more RAM than the amount that cheap routers have, according to the minimum reqs.