TCP Dangerous Database

Port 2379 (etcd Client)

Learn about port 2379 (etcd Client) - security risks, vulnerabilities, and common uses. Find devices with port 2379 open.

Quick Info

Port Number
2379
Protocol
TCP
Service
etcd Client
IANA Name
etcd Client

Service Description

TCP port 2379 is the standard port used by etcd clients to communicate with the etcd server. Etcd is a distributed key-value store used for configuration management, service discovery, distributed locking, leader election, and storing relational data. It's a core component of many distributed systems, particularly Kubernetes, where it's used to store all cluster state. Etcd uses the Raft consensus algorithm to achieve fault tolerance and strong consistency across a cluster of etcd servers. Clients interact with etcd using a gRPC-based API, sending requests to read, write, and watch for changes in the key-value store. These requests are serialized using Protocol Buffers (protobuf). The etcd client library handles the complexities of discovering etcd servers, load balancing requests, and retrying failed operations.

The protocol used on port 2379 is primarily gRPC over TLS. Clients typically connect to etcd servers using secure connections to ensure the confidentiality and integrity of the data being transmitted. The gRPC layer handles request multiplexing, streaming, and error handling. The underlying data is serialized using protobuf, which defines the structure of the key-value pairs and other data structures used by the etcd API. Watch operations, a crucial part of etcd's functionality, allow clients to subscribe to changes in specific keys or prefixes, enabling real-time updates and event-driven architectures. The performance and reliability of the etcd cluster are critical for the overall health of the distributed system that depends on it.

## Firewall Recommendations

Port 2379 should be strictly firewalled to only allow connections from trusted clients and other etcd servers within the cluster. It should never be exposed to the public internet. Mutual TLS (mTLS) authentication is essential for securing communication between clients and etcd servers. Implement strong access control policies to limit which clients can read and write data. Regularly audit firewall rules and network policies to ensure they are correctly configured and up-to-date. Consider using network segmentation to isolate the etcd cluster from other parts of the network. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious activity on this port. Regularly update etcd to the latest version to patch any known security vulnerabilities. If using Kubernetes, leverage NetworkPolicies to restrict access to etcd from only authorized pods within the cluster.

Security Information

Port 2379 is a significant security risk if not properly secured because it provides access to the entire state of the distributed system, particularly in Kubernetes environments where it stores the entire cluster configuration, secrets, and service discovery information. Unauthenticated or unauthorized access to this port could allow an attacker to compromise the entire system. Common attack vectors include exploiting vulnerabilities in etcd itself, compromising the TLS certificates used for authentication, or gaining access through misconfigured firewalls or network policies. Attackers might target this port to steal sensitive data (secrets, API keys), modify cluster configurations to gain control over the system, or disrupt services by corrupting the data stored in etcd. Furthermore, if etcd is exposed to the internet without proper authentication, it becomes an easy target for automated scanners and malicious actors seeking to compromise vulnerable systems.

Known Vulnerabilities

CVE Name Severity Description
CVE-2020-15105 etcd: Improper access control in etcdserverpb.AuthServer.AuthToken High Уязвимость в etcd позволяет злоумышленнику, имеющему доступ к etcd API, обойти аутентификацию и получить доступ к конфиденциальным данным.
CVE-2023-45288 etcd: Denial of service vulnerability due to high CPU usage Medium Уязвимость в etcd, которая может привести к отказу в обслуживании из-за высокого использования ЦП при обработке определенных запросов.
CVE-2023-3955 etcd: Improper input validation leading to panic Medium Уязвимость в etcd, которая может привести к панике и перезапуску сервера из-за неправильной проверки входных данных.

Common Software

  • Kubernetes
  • CoreDNS
  • OpenShift
  • Cloud Foundry
  • Rook
  • Tectonic
  • Linkerd
  • Calico
  • Istio
  • Prometheus

Find devices with this port

Discover all devices with port 2379 open in any country.

Search Port 2379

Find all devices with port 2379 open

ScaniteX scans millions of IPs to find devices with specific ports open. Perfect for security research and network auditing.

Start Mass Scanning