Over night my security server captured an ip address/port from overseas…
It made one attempt. It wasn’t a port scan since it was just one hit but it did contain a valid port forwarded to one of my servers at 32400…
The PMS server in question did not respond to the system since I trapped it, and that maybe why there was only one hit…
Question is; how would they have known the forwarded port to use? since no scans had been detected.
I have no users overseas everyone is in the US…
The source IP was from Italy…
There is nothing in the logs…
They never got that far, I trapped it so the PMS server never saw it and didn’t respond.
I see access by the Plex API Servers (Amazon) from all over and I know those IP address.
This was from Italy and a general ISP address, not directly associated with anyone.
If they somehow obtained your Plex token it would be easy enough for them to find your server, its public IP address, and its public port. No need for a port scan.
If you visit this link and replace [your token here] with your token, it will load an XML document listing all your servers and their details: https://plex.tv/api/resources?X-Plex-Token=[your token here]
On some browsers (I’m looking at you, Safari) you have to view the page source as it just loads a blank page.
You can find your token using the second article I linked.
If you mean how would someone (who’s not you) go about finding your Plex token, I’m not sure.
Thanks…
I saw that thread when it was reported… It’s also what has got me thinking…
I don’t use Tautulli and its not loaded anywhere on my systems…
What precautions does Plex take to keep us safe…
Would it be possible for a rogue player to create a Plex add on that would collect information and no one know it.
That’s why when I saw that single hit with the correct information I posted it.
I don’t collect packet information about the hit’s because there is little I could to other then what I am doing.
Would it be nice to see what they were trying to do, did it contain a token, all good questions but I don’t know.
Plex Inc. cannot police what users decide to install on their systems. If you install WebTools which asks for your Plex credentials, it is up to you to decide if you trust the developer enough to do that. I do trust @dane22 , so I use it.
There may be steps which Plex Inc can take, after it has gained knowledge of a security issue. But it will not proactively inspect the source code of all 3rd-party add-ons.
How many Plex users do you think have the background knowledge to do those checks…
most would be from an unknown developer, dane22 I do not know you,
I do not use your app, but that’s because I don’t see a need for it.
I’m not trying to make this personal just pointing out that care does need to be taken.
And I do believe that Plex should take on the responsibility that an addon meets it’s security requirements for it’s users.