I have this old TP-Link smart lightbulb, it’s the only thing that’s IoT and on WiFi in my house.

Looking through pfBlocker logs for fun, and noticed it’s been trying to connect to the Tor network.

Oh! Also, it’s been uploading and downloading 100+ MB of data a day.

  • StarkZarn
    link
    fedilink
    English
    10710 months ago

    It’s just an NTP pool. The device is trying to update it’s time. Likely it made many other requests to other servers when this one didn’t work.

    Maintaining up to date lists of anything is a game of whack a mole, so you’re always going to get weird results.

    If you’re actually unsure, pcap the traffic on your pfsense box and see for yourself. NTP is an unencrypted protocol, so tshark or Wireshark will have no problem telling you all about it.

    That said, I’d still agree with the other poster about local integration with home assistant and just block that sucker from the Internet.

    • @czardestructo
      link
      310 months ago

      Agreed. To add to this because the traffic is being blocked it keeps retrying so it’s inflating the traffic size. I have about 14 tplink WiFi switches on a vlan and my pfsense rule for NTP is less than 6 megabytes. OP is conflating legitimate NTP traffic with Tor.

    • @[email protected]
      link
      fedilink
      210 months ago

      NTP is an unencrypted protocol, so tshark or Wireshark will have no problem telling you all about it.

      Wait, it is? Pretty sure chrony.conf has some auth stuff in it.

    • @lemming741
      link
      English
      2
      edit-2
      10 months ago

      Similar to forwarding all DNS traffic to my pihole, I also forward 123 to the opnsense NTP server.

  • @jeansburger
    link
    2810 months ago

    It’s definitely been popped. Rip.

      • @jeansburger
        link
        -510 months ago

        It’s been hacked, the light bulb is likely part of some botnet or under an attacker’s control directly. Which is why it’s sending that much data continuously. IoT/smart devices don’t send a lot of data in this sort of volume as most of the time they’re idle and maybe send a heartbeat or status update every once in a while to prove they’re alive.

        This is what is called an indicator of compromise or IoC, it’s some behavior or pattern that can be used to determine what is happening or who is the one doing the attacking.

        Likely OP would need to do some analysis to be able to get attribution unless it’s a very well known botnet actor in which case attribution is fairly straightforward.

          • @jeansburger
            link
            -110 months ago

            You’re aware that you can send whatever traffic you want over any port right? Using 123/udp for NTP is just convention. A light bulb that is updating its time over Tor is suspect. TP-Link would have their own infrastructure or use public pools to update the device’s time.

            • @[email protected]
              link
              fedilink
              English
              210 months ago

              The Tor analysis is suspect in the first place. The whole thing is much ado over nothing.

  • mozz
    link
    fedilink
    2210 months ago

    You’re the one that connected an impossible-to-security-update device to the internet. You can do plenty of home automation without it needing to be that way, if you’re open to a little more setup being involved in the process.

    • @[email protected]OP
      link
      fedilink
      English
      1310 months ago

      It’s on it’s own VLAN from the beginning. Wanted to poke around but never got to it.

      I still have it connected, want to use for practice.

        • @[email protected]OP
          link
          fedilink
          English
          410 months ago

          Will do. It’s part of a long list.

          Don’t know my ADHD will hyper focus on it tho haha

      • @[email protected]
        link
        fedilink
        English
        3
        edit-2
        10 months ago

        Good on you. I use the poor man’s VLAN–guest Wi-Fi network to isolate my IoT devices.

      • mozz
        link
        fedilink
        -210 months ago

        I have no idea of all the details, but in legal terms this is called “res ipsa loquitur” – in this case, the fact that it clearly seems compromised is pretty solid evidence that it wasn’t immune to compromise.

  • Chozo
    link
    fedilink
    910 months ago

    Your house heard about the dark web and thought it needed some light.

    • @[email protected]
      link
      fedilink
      English
      6
      edit-2
      10 months ago

      I went to ask nicely for help from their support department and got a development build for one of their routers. Not only was it an ancient version of OpenWRT with the myriad of unpatched vulnerabilities, but it had absolutely dumb/weird configurations like the Wi-Fi password being a user account password exposed to a patched up SSH daemon with shell /bin/false. Just a whole lot of why and an obvious lack of care put into the software.

      Their devices function… Most of the time. That’s about all that’s redeeming.

  • @khannie
    link
    English
    810 months ago

    That’s really odd. For what it’s worth though, the company I work for does firmware updates over a Tor hidden service for customer privacy. We don’t send any data though (as that would defeat the purpose entirely), just poll for updates then download and install if there are any.

  • @Haystack
    link
    English
    710 months ago

    Fwiw the TP link bulbs usually have a local API that Home Assistant has an integration for. You can use that and block their internet access - unless they’ve removed that feature. I only used one of these briefly because someone gave it to me. Usually just use cheap ZigBee bulbs. I would throw that one out though as someone else said it’s likely been compromised already…

    • @[email protected]OP
      link
      fedilink
      English
      210 months ago

      I’m all in on ZigBee and z-wave. The bulb is isolated, don’t even know my app login.

      Do you mind sharing what ZigBee lightbulbs you recommend?

      • @Flying_Hellfish
        link
        English
        2
        edit-2
        10 months ago

        The zigbee bulbs I’ve had the best luck with are Innr, although they are kind of pricy. Ikea bulbs are good for the price, but every one I have, has very loud coil whine when off. I had some on bedside stands and had to move them to other rooms. Sengled are nice when they work, I’ve had issues with them dropping off my network.

        Both Ikea and Innr are also repeaters, Sengled does not do repeaters in their bulbs. Neither Ikea or Innr are exactly cheap, but they’ve been the most solid for me.

  • @[email protected]
    link
    fedilink
    310 months ago

    Thats why my Smart Home is build on Zigbee. (Yeah VLANs and so on, but so many clients still makes your wifi worse)

    • Bizarroland
      link
      fedilink
      210 months ago

      I’m installing a new Wi-Fi setup soon and I will be putting all of my iot devices on an iot network that is segmented from my main wifi.

      I will also be jailbreaking them from tuya and running a local home assistant.

      Bit of a hassle but it’s a fun experiment to get my “smart” home set up just for me.

      • @[email protected]
        link
        fedilink
        110 months ago

        The thing is it still impacts the other Wifi Channels and Networks (or at least those on the same band, guessing mist IoT uses 2.4GHz) even tho other Channels are used.

        But, i see the appeal, since most smart home devices you can get cheap are Wifi connected. Hope that changes with the ESP32-H2 and -C6. Those are relatively recently released.

        Wifi is just such a heavy proticol for just sending sensor data and some commands around, imho.

        • Bizarroland
          link
          fedilink
          110 months ago

          It doesn’t affect it that much. It’s very easy to separate out the bands and to put your iot devices far away from your regular Internet devices.