<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic OpenDNS Connector packets in OpenDNS</title>
    <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176741#M3453</link>
    <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;We have 4 AD servers. &amp;nbsp;2 Server 2012. &amp;nbsp;2 Server 2012 R2. &amp;nbsp;I am seeing some POST (HTTP) requests to our AVs.&lt;/P&gt;
&lt;P&gt;I just wanted to confirm that the following packets are normal in regards to the OpenDNS connector. &amp;nbsp;It's setting off IDS alerts on our box with the following alert:&lt;/P&gt;
&lt;P&gt;2015-05-06T16:06:28-05:00 snort: [1:2013926:3] ET POLICY HTTP traffic on port 443 (POST) [Classification: Potentially Bad Traffic] [Priority: 2]: {TCP} 192.168.211.15:65010 -&amp;gt; 192.168.211.9:443&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached the shots from Wireshark. &amp;nbsp;When I follow the TCP stream I can see the data is as same as whats in the OpenDNSAuditClient log file. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;POST /connectorlog/ HTTP/1.1&lt;BR /&gt;Content-Type: application/x-www-form-urlencoded&lt;BR /&gt;Host: 192.168.211.9:8080&lt;BR /&gt;Content-Length: 155&lt;/P&gt;
&lt;P&gt;LogLine=[CON=(REMOVED)]5/6/2015 4:17:49 PM: QueryADUser SAMName is: (Removed) - Returned Query is:AD_ERR_OK DN is 61826383a8c7e24bb3102d55bcabaa54 (LOG_SAT)HTTP/1.1 200 OK&lt;BR /&gt;Server: (removed)&lt;BR /&gt;Date: Wed, 06 May 2015 10:05:33 GMT&lt;BR /&gt;Content-Type: text/plain&lt;BR /&gt;Content-Length: 0&lt;BR /&gt;Connection: keep-alive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Info from log file:&lt;/P&gt;
&lt;P&gt;5/6/2015 4:17:49 PM: QueryADUser SAMName is: (Removed) - Returned Query is:AD_ERR_OK DN is 61826383a8c7e24bb3102d55bcabaa54&lt;/P&gt;
&lt;P&gt;We are a paranoid bunch around here so I just wanted to make sure everything is copacetic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;A href="https://community.cisco.com/legacyfs/online/attachments/RxcVvZv7BwOXHeHvm50aZTZbI/shot2.jpg" rel="nofollow noreferrer"&gt;shot2.jpg&lt;/A&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 06 May 2015 16:50:12 GMT</pubDate>
    <dc:creator>mcgoosh</dc:creator>
    <dc:date>2015-05-06T16:50:12Z</dc:date>
    <item>
      <title>OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176741#M3453</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;We have 4 AD servers. &amp;nbsp;2 Server 2012. &amp;nbsp;2 Server 2012 R2. &amp;nbsp;I am seeing some POST (HTTP) requests to our AVs.&lt;/P&gt;
&lt;P&gt;I just wanted to confirm that the following packets are normal in regards to the OpenDNS connector. &amp;nbsp;It's setting off IDS alerts on our box with the following alert:&lt;/P&gt;
&lt;P&gt;2015-05-06T16:06:28-05:00 snort: [1:2013926:3] ET POLICY HTTP traffic on port 443 (POST) [Classification: Potentially Bad Traffic] [Priority: 2]: {TCP} 192.168.211.15:65010 -&amp;gt; 192.168.211.9:443&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached the shots from Wireshark. &amp;nbsp;When I follow the TCP stream I can see the data is as same as whats in the OpenDNSAuditClient log file. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;POST /connectorlog/ HTTP/1.1&lt;BR /&gt;Content-Type: application/x-www-form-urlencoded&lt;BR /&gt;Host: 192.168.211.9:8080&lt;BR /&gt;Content-Length: 155&lt;/P&gt;
&lt;P&gt;LogLine=[CON=(REMOVED)]5/6/2015 4:17:49 PM: QueryADUser SAMName is: (Removed) - Returned Query is:AD_ERR_OK DN is 61826383a8c7e24bb3102d55bcabaa54 (LOG_SAT)HTTP/1.1 200 OK&lt;BR /&gt;Server: (removed)&lt;BR /&gt;Date: Wed, 06 May 2015 10:05:33 GMT&lt;BR /&gt;Content-Type: text/plain&lt;BR /&gt;Content-Length: 0&lt;BR /&gt;Connection: keep-alive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Info from log file:&lt;/P&gt;
&lt;P&gt;5/6/2015 4:17:49 PM: QueryADUser SAMName is: (Removed) - Returned Query is:AD_ERR_OK DN is 61826383a8c7e24bb3102d55bcabaa54&lt;/P&gt;
&lt;P&gt;We are a paranoid bunch around here so I just wanted to make sure everything is copacetic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;A href="https://community.cisco.com/legacyfs/online/attachments/RxcVvZv7BwOXHeHvm50aZTZbI/shot2.jpg" rel="nofollow noreferrer"&gt;shot2.jpg&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 May 2015 16:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176741#M3453</guid>
      <dc:creator>mcgoosh</dc:creator>
      <dc:date>2015-05-06T16:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176742#M3454</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;That packet info looks right as it's gathering the audit log event from the DCs and pulling it into the OpenDNS setup on port 8080 which is the expected port between Connector and DC. The Connector will connect to each DC as well as each VA with a sync every login event.&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 May 2015 20:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176742#M3454</guid>
      <dc:creator>alexahar</dc:creator>
      <dc:date>2015-05-06T20:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176743#M3455</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Hi Alexander. &amp;nbsp;Thank you for the response. &amp;nbsp;That should put some minds at ease. &amp;nbsp;Do you also know why its transmitting on port 443 in clear text?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;POST / HTTP/1.1&lt;BR /&gt;Content-Type: application/x-www-form-urlencoded&lt;BR /&gt;Host: 192.168.211.9:443&lt;BR /&gt;Content-Length: 120&lt;/P&gt;
&lt;P&gt;VERSION=1.0&amp;amp;Type=Login&amp;amp;Username=(removed)$&amp;amp;IP=192.168.211.15&amp;amp;DN=47f8080a5a748e016767405aae2714a4&lt;BR /&gt;HTTP/1.1 200 OK&lt;BR /&gt;Date: Wed, 06 May 2015 14:05:23 GMT&lt;BR /&gt;Content-Type: text/html&lt;BR /&gt;Connection: close&lt;BR /&gt;Content-Length: 12&lt;/P&gt;
&lt;P&gt;Success!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;A href="https://community.cisco.com/legacyfs/online/attachments/4u85N0DEq0GLZhPmLipCUVHe1/shot3.jpg" rel="nofollow noreferrer"&gt;shot3.jpg&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 May 2015 20:24:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176743#M3455</guid>
      <dc:creator>mcgoosh</dc:creator>
      <dc:date>2015-05-06T20:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176744#M3456</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Here is one that alarmed us a bit. &amp;nbsp;As the IP its being sent to is not an IP in our range or related to us in any way.&lt;/P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; &lt;A href="https://community.cisco.com/legacyfs/online/attachments/f9G4AuERABqLQt0ue4HD9ypzr/shot4.jpg" rel="nofollow noreferrer"&gt;shot4.jpg&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 May 2015 20:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176744#M3456</guid>
      <dc:creator>mcgoosh</dc:creator>
      <dc:date>2015-05-06T20:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176745#M3457</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;The unencrypted traffic over port 443 would be over the internal network between the registered DCs and the Connector. I've responded to your support request so we can identify your settings and confirm some further information. The unexpected IP appears to be a spoofed login event on the DC login audit logs that the connector is passing along as expected. Each event you're seeing transmitted should match exactly with an login audit log event on the DC.&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 07 May 2015 23:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176745#M3457</guid>
      <dc:creator>alexahar</dc:creator>
      <dc:date>2015-05-07T23:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176746#M3458</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;Thanks for the explanation. &amp;nbsp;I appreciate the quick response.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 May 2015 17:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176746#M3458</guid>
      <dc:creator>mcgoosh</dc:creator>
      <dc:date>2015-05-08T17:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: OpenDNS Connector packets</title>
      <link>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176747#M3459</link>
      <description>&lt;DIV class="opendns-migrated-content"&gt;&lt;P&gt;The IP actually seemed to be a left over place holder in the OpenDNSAuditClient.exe. &amp;nbsp;I was able to find the call in the SendTestLogin function: System.Diagnostics.Stopwatch&lt;/P&gt;
&lt;P&gt;ldstr "TestUser"&lt;/P&gt;
&lt;P&gt;ldstr "12.23.34.45"&lt;/P&gt;
&lt;P&gt;ldstr "TestDn"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 May 2015 20:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/opendns/opendns-connector-packets/m-p/5176747#M3459</guid>
      <dc:creator>mcgoosh</dc:creator>
      <dc:date>2015-05-08T20:39:25Z</dc:date>
    </item>
  </channel>
</rss>

