I had a suspicious event on my fully updated Fairphone 5 which led me to check its network behaviour. Running cat /proc/net/udp on adb shell, briefly after establishing the wifi connection, something with UID 1020 opens a UDP connection and closes it a bit later.
I can’t find any app with UID 1020 via ADB or installed app managers.
Would a user installed app be able to get a UID that low? The others are all 5 digits and higher.
Could UID have been spoofed, so could it have been from a malicious app?
If yes, what paths could I have gotten it from? Because I didn’t install anything weird except from App Lounge or f-droid, and I haven’t granted any suspicious app accesses, especially not any accessibility stuff.
So not sure what was going on. Can’t reproduce after reinstall, unfortunately (or fortunately?).
android_filesystem_config.h on Android code search has a list of UIDs for daemons/services (or whatever the best term is) and shows my “missing” UID 1020 to be the **MulticastDNSResponder **.
Cross checks for the 1002 Bluetooth and 1027 NFC which I mentioned above are passed, too.
So I’m happy. And I’ve learned stuff. Learning by panicking, if you will
I seem to have gathered that the MultiDNS service is run on demand, so if an app is installed that requests it, it will run, if not, then not. So it’s very plausible that the behaviour I observed is not reproducable on a different phone with other apps, or a freshly installed one, for that matter.