svchost.exe

svchost.exe

am 22.11.2006 13:38:56 von Nevets Steprock

Having Comodo in "high" mode to check what servers programs contact I
notice "svchost.exe" that constantly tries to conect lots of servers
of different IP's at port 80 and 443. Anyone know what this is? The
list of servers include:

akamaitechnologies.com
207.46.209.124
207.46.253.125
65.55.192.126
207.46.157.125

Is this normal, is it Microsoft Update, or should I block and search
for something on my system?
--
Lars-Erik - http://www.osterud.name - ICQ 7297605

Re: svchost.exe

am 22.11.2006 13:50:44 von unknown

Post removed (X-No-Archive: yes)

Re: svchost.exe

am 22.11.2006 14:33:57 von Nevets Steprock

Sebastian Gottschalk wrote:

> Yes, this is Windows' Automatic Updates. And if you didn't know this, then
> you've understand the reason why you should not run any host-based packet
> filter or firewall without a clue.

The main problem is to check the addresses, nslookup couldn't get any
domain for those adresses. If they had I'd seen that they where MS.

BTW: Firewalls should show the DNS-name, not only the IP :-(
--
Lars-Erik - http://www.osterud.name - ICQ 7297605

Re: svchost.exe

am 22.11.2006 14:37:29 von BrianF

"Sebastian Gottschalk" wrote in message
news:4sivgaFvrpmmU1@mid.dfncis.de...
> Lars-Erik ?terud wrote:
>
>> Having Comodo in "high" mode to check what servers programs contact I
>> notice "svchost.exe" that constantly tries to conect lots of servers
>> of different IP's at port 80 and 443. Anyone know what this is? The
>> list of servers include:
>>
>> akamaitechnologies.com
>> 207.46.209.124
>> 207.46.253.125
>> 65.55.192.126
>> 207.46.157.125
>>
>> Is this normal, is it Microsoft Update, or should I block and search
>> for something on my system?
>
> Yes, this is Windows' Automatic Updates. And if you didn't know this, then
> you've understand the reason why you should not run any host-based packet
> filter or firewall without a clue.

That's a very arrogant and unhelpful thing to say to someone who just needs
a bit of advice.
You should be ashamed of yourself.

Re: svchost.exe

am 22.11.2006 14:43:47 von alf

Lars-Erik Østerud wrote:
> Sebastian Gottschalk wrote:
>
>> Yes, this is Windows' Automatic Updates. And if you didn't know this, then
>> you've understand the reason why you should not run any host-based packet
>> filter or firewall without a clue.
>
> The main problem is to check the addresses, nslookup couldn't get any
> domain for those adresses. If they had I'd seen that they where MS.
>
> BTW: Firewalls should show the DNS-name, not only the IP :-(

Whois?

/----------------------------------------------------------- ------

c/p from one other whois query:

Akamai serves the images and streaming content for many of the
most popular Internet web-sites. When you connect to a
web-site your browser first contacts the content provider and downloads
an html file. This file contains embedded URLs that tell your
browser where to find all the objects necessary to finish
displaying the page. In the case of an "Akamaized" site, these
URLs point to the Akamai Network. Next, your browser makes
connections to the URLs to obtain the images or streaming
content. Again, for an "Akamaized" site, your browser will
contact an Akamai server to obtain the requested items.
Generally a TCP server listens on a well-known port < 1023
(for example port 80 for HTTP), and a TCP client connects from a
port > 1023 assigned by the operating system. So a connection
from port 80 of the Akamai server to a high numbered port on
your machine, is a normal HTTP transaction.
If you'd like to learn more visit the FAQ at
http://www.akamai.com/en/html/misc/support_faq.html

/----------------------------------------------------------- -

whois 207.46.209.124 ???

GeekTools Whois Proxy v5.0.4 Ready.
Final results obtained from whois.arin.net.
Results:

OrgName: Microsoft Corp
OrgID: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US

NetRange: 207.46.0.0 - 207.46.255.255
CIDR: 207.46.0.0/16
NetName: MICROSOFT-GLOBAL-NET
NetHandle: NET-207-46-0-0-1
Parent: NET-207-0-0-0-0
NetType: Direct Assignment
NameServer: NS1.MSFT.NET
NameServer: NS5.MSFT.NET
NameServer: NS2.MSFT.NET
NameServer: NS3.MSFT.NET
NameServer: NS4.MSFT.NET
Comment:
RegDate: 1997-03-31
Updated: 2004-12-09

RTechHandle: ZM39-ARIN
RTechName: Microsoft
RTechPhone: +1-425-882-8080
RTechEmail: noc@microsoft.com

OrgAbuseHandle: ABUSE231-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com

OrgAbuseHandle: HOTMA-ARIN
OrgAbuseName: Hotmail Abuse
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@hotmail.com

OrgAbuseHandle: MSNAB-ARIN
OrgAbuseName: MSN ABUSE
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@msn.com

OrgNOCHandle: ZM23-ARIN
OrgNOCName: Microsoft Corporation
OrgNOCPhone: +1-425-882-8080
OrgNOCEmail: noc@microsoft.com

OrgTechHandle: MSFTP-ARIN
OrgTechName: MSFT-POC
OrgTechPhone: +1-425-882-8080
OrgTechEmail: iprrms@microsoft.com

# ARIN WHOIS database, last updated 2006-11-21 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.

Results brought to you by the GeekTools WHOIS Proxy
Server results may be copyrighted and are used with permission.

/----------------------------------------------------------- -------

So, eveything seems to be OK. Possible Windows update.

Re: svchost.exe

am 22.11.2006 15:03:48 von Nevets Steprock

BrianF wrote:

> That's a very arrogant and unhelpful thing to say to someone who just needs
> a bit of advice.

Ahh. I work at support (and have used news 10 years too)
I'm used to it :-)

The strange think is that "nslookup" doesn't have info on the MS
addresses. Why have Microsoft choosed to not DNS register thise IPs
--
Lars-Erik - http://www.osterud.name - ICQ 7297605

Re: svchost.exe

am 22.11.2006 15:16:53 von BrianF

"Lars-Erik Østerud" <.@.> wrote in message
news:f1b12$456458c3$54d05007$22598@news.chello.no...
> The strange think is that "nslookup" doesn't have info on the MS
> addresses. Why have Microsoft choosed to not DNS register thise IPs
> --
But if you use the CyberAbuse Whois look-up they are all listed as MS ip
addresses. In fact, I think it is safe to say that all 207.46.x.x numbers
belong to MS

brianf

Re: svchost.exe

am 22.11.2006 15:53:32 von unknown

Post removed (X-No-Archive: yes)

Re: svchost.exe

am 22.11.2006 15:56:34 von unknown

Post removed (X-No-Archive: yes)

Re: svchost.exe

am 22.11.2006 16:36:36 von Nevets Steprock

Sebastian Gottschalk wrote:

> > BTW: Firewalls should show the DNS-name, not only the IP :-(
> They can't. DNS and HTTP are distinct protocols.

Well, the firewall could do a lookup on the IP address before
displaying an alert box. This would aid the user in desiding.
--
Lars-Erik - http://www.osterud.name - ICQ 7297605

Re: svchost.exe

am 22.11.2006 16:50:14 von Ansgar -59cobalt- Wiechers

Lars-Erik Østerud <.@.> wrote:
> The strange think is that "nslookup" doesn't have info on the MS
> addresses. Why have Microsoft choosed to not DNS register thise IPs

Why should they have done this? It's good practice, but not required, to
create PTR records in DNS. The hosts in question apparently are backend
servers for Windows Update, maybe loadbalanced by Round Robin DNS.

cu
59cobalt
--
"If a software developer ever believes a rootkit is a necessary part of
their architecture they should go back and re-architect their solution."
--Mark Russinovich

Re: svchost.exe

am 22.11.2006 16:53:56 von Ansgar -59cobalt- Wiechers

BrianF wrote:
> "Lars-Erik Østerud" <.@.> wrote:
>> The strange think is that "nslookup" doesn't have info on the MS
>> addresses. Why have Microsoft choosed to not DNS register thise IPs
>
> But if you use the CyberAbuse Whois look-up they are all listed as MS
> ip addresses. In fact, I think it is safe to say that all 207.46.x.x
> numbers belong to MS

Keep in mind, though, that whois and nslookup do entirely different
things. whois, when fed an IP address, returns information on the owner
of the netblock the IP in question belongs to. nslookup OTOH returns a
name resolved by a PTR record when fed an IP address. If there's no PTR
record for that address, nslookup will certainly fail.

cu
59cobalt
--
"If a software developer ever believes a rootkit is a necessary part of
their architecture they should go back and re-architect their solution."
--Mark Russinovich

Re: svchost.exe

am 22.11.2006 16:58:23 von Nevets Steprock

Ansgar -59cobalt- Wiechers wrote:

> Lars-Erik Østerud <.@.> wrote:
> > The strange think is that "nslookup" doesn't have info on the MS
> > addresses. Why have Microsoft choosed to not DNS register thise IPs
>
> Why should they have done this? It's good practice, but not required, to

It would have made it easier to deside if to allow/disallow access if
you knew the name of the machine (them you could say "a-ha, it's that
software trying to connect to it's update server, or similar...)
--
Lars-Erik - http://www.osterud.name - ICQ 7297605

Re: svchost.exe

am 22.11.2006 17:09:02 von Ansgar -59cobalt- Wiechers

Lars-Erik Østerud <.@.> wrote:
> Ansgar -59cobalt- Wiechers wrote:
>> Lars-Erik Østerud <.@.> wrote:
>>> The strange think is that "nslookup" doesn't have info on the MS
>>> addresses. Why have Microsoft choosed to not DNS register thise IPs
>>
>> Why should they have done this? It's good practice, but not required,
>> to
>
> It would have made it easier to deside if to allow/disallow access if
> you knew the name of the machine (them you could say "a-ha, it's that
> software trying to connect to it's update server, or similar...)

ORLY? Then how about your firewall reporting that there's traffic to
someserver.windowsupdate.com. Would you approve that? How about
windows-update.com, windowsupdate.net, windowsupdates.com or
winupdate.org? Which of them would you approve? Which not? And why?

cu
59cobalt
--
"If a software developer ever believes a rootkit is a necessary part of
their architecture they should go back and re-architect their solution."
--Mark Russinovich

Re: svchost.exe

am 22.11.2006 17:32:22 von unknown

Post removed (X-No-Archive: yes)

Re: svchost.exe

am 22.11.2006 17:35:02 von unknown

Post removed (X-No-Archive: yes)

Re: svchost.exe

am 22.11.2006 20:55:13 von ibuprofin

On Wed, 22 Nov 2006, in the Usenet newsgroup comp.security.firewalls, in article
, Lars-Erik Østerud wrote:

>The strange think is that "nslookup" doesn't have info on the MS
>addresses.

'nslookup' queries name servers. If the fools running the name servers
don't know how to set them up, or don't care, then the information will
not be there. You could use 'whois' which queries the registrar data
bases, but microsoft didn't think you'd need to know that information,
and didn't include the tool. There are toy web tools that can be used
to query those servers.

>Why have Microsoft choosed to not DNS register thise IPs

Microsoft follow standards??? What a bizarre concept. They can't
follow their own standards, why do you think they might even know about
international standards?

Old guy

Re: svchost.exe

am 23.11.2006 02:22:48 von TheDog

Sebastian Gottschalk wrote:
> Lars-Erik ׳terud wrote:
>
>
>>Having Comodo in "high" mode to check what servers programs contact I
>>notice "svchost.exe" that constantly tries to conect lots of servers
>>of different IP's at port 80 and 443. Anyone know what this is? The
>>list of servers include:
>>
>>akamaitechnologies.com
>>207.46.209.124
>>207.46.253.125
>>65.55.192.126
>>207.46.157.125
>>
>>Is this normal, is it Microsoft Update, or should I block and search
>>for something on my system?
>
>
> Yes, this is Windows' Automatic Updates. And if you didn't know this, then
> you've understand the reason why you should not run any host-based packet
> filter or firewall without a clue.

That was kind of cold there. I thought I was bad. I am suppose to be the
*dog* in the NG. ;-)

Re: svchost.exe

am 24.11.2006 16:07:28 von BrianF

"Sebastian Gottschalk" wrote in message
news:4sj6sbFv14gnU1@mid.dfncis.de...
> BrianF wrote:
>
> 2. It's not even arrogant, it's just the truth.

That's the excuse used by all arrogant people. What they don't understand
(have never been taught) is how to tell the truth in a diplomatic way.
Prejudice against Outlook Express users is just such arrogance. Ridicule
Microsoft if you must but leave the users alone.

brianf

Re: svchost.exe

am 24.11.2006 17:32:59 von unknown

Post removed (X-No-Archive: yes)

Re: svchost.exe

am 24.11.2006 19:07:26 von BrianF

"Sebastian Gottschalk" wrote in message
news:4sol7bFvfgpkU1@mid.dfncis.de...
> BrianF wrote:
>
>>> 2. It's not even arrogant, it's just the truth.
>>
>> That's the excuse used by all arrogant people. What they don't understand
>> (have never been taught) is how to tell the truth in a diplomatic way.
>
> Huh? This was the diplomatic way. I respectfully pointed out the problem
> in
> his misconception.

Respectfully? I don't think so and, as you can see, another poster has also
commented on your tone.
>
>> Prejudice against Outlook Express users is just such arrogance.
>
> What prejudice? Outlook Express and security being mutually exclusive is a
> well-known fact,

Well-known to a relatively small band of IT-savvy individuals; not to most
non-technical users.

> so that why I should not expect any serious security advice from OE users.

Which OE user is giving security advice?

brianf