Get hands-on experience with 20+ free Google Cloud products and $300 in free credit for new customers.

what is the network traffic under name ssl for bigquery API

Hi, I am currently using bigquery API to extract data to my local server from the GCP BQ but my security team reached me out they can find few network traffic for this BQ API like this  

스크린샷 2023-09-05 오후 2.34.34.png

I am currently using service account for authentication of BQ API

so I assume ssl is probably for authentication network traffic. 

anyone knows?

1 12 1,029
12 REPLIES 12

Yes, your assumption is correct. The SSL traffic that your security team is observing is likely associated with the authentication of the BigQuery API using your service account.

When you use a service account to authenticate to the BigQuery API, the client library you are using will make an HTTPS request to Google's OAuth 2.0 server to exchange the service account credentials for an access token. This access token is then used to authenticate subsequent requests to the BigQuery API.

Please note: BigQuery API authentication using a service account

  1. The client library makes an HTTPS request to Google's OAuth 2.0 server to exchange the service account credentials for an access token.
  2. The OAuth 2.0 server verifies the service account credentials and returns an access token.
  3. The client library uses the access token to authenticate subsequent requests to the BigQuery API.

The SSL traffic that your security team is observing is likely associated with step 1 of this process.

In addition to authentication, SSL is also used to encrypt the data being transferred between your client and the BigQuery service. This helps protect your data from being intercepted and read by unauthorized parties.

 

@ms4446 
Thank you very much for your explanation, do you also know what is the 'google-base' under the name of application? 

Yes, "google-base" is a generic User-Agent string component that some Google services and tools use when making requests. It indicates that the traffic is originating from a Google-owned application or tool, but it doesn't specify which exact service or tool is responsible for the traffic.

When monitoring network traffic, it's not uncommon to see "google-base" in the User-Agent string, especially when dealing with Google Cloud services. If you see this in your logs or monitoring tools, it suggests that the traffic is from a Google service, but you'd need more context to pinpoint the exact service or application.

If you're trying to audit or control network traffic related to GCP services, you might need additional monitoring or logging to get more granular details about the sources of that traffic.

@ms4446 
Thank you for your reply!
I got one more question..! sorry
Can we actually specify the destination URL for google-base or ssl like bigquery.googleapis.com?

No, you cannot specify a different destination URL for "google-base" or SSL when interacting with Google services like BigQuery. The term "google-base" is often associated with the User-Agent string in HTTP requests, indicating that the traffic is from a Google service. SSL, on the other hand, is a protocol for secure communication, not a destination.

When you use the BigQuery API, the client library handles connections to the appropriate endpoints based on your configuration, such as the dataset's region. You don't typically need to manually specify the destination URL.

Regarding service account authentication: when you use a service account with the BigQuery API, the client library will communicate with Google's OAuth 2.0 authentication servers to exchange the service account's credentials for an access token. This process is automatic and abstracted away from the user.

@ms4446 
Hi! I have one more question that related to the ssl we discussed above.
The security team contact me again and want to know those ip address under name 'ssl' is also related to google auth.  All IP range I know is from this document  https://www.gstatic.com/ipranges/goog.json.   Is there other IP ranges that are reserved for ssl?

Hi @hyunchul ,

The document - https://www.gstatic.com/ipranges/goog.jsonlists all of the IP addresses used by Google services. These IP addresses can be used for any Google service, including SSL and authentication, but they are not exclusive to any particular service or protocol. SSL is a security protocol that encrypts data between two systems, but it is not tied to any specific IP address. Instead, it can be used on any IP address that supports SSL.

Therefore, any IP address listed in the goog.json document could be used by Google for SSL or authentication. If you are unsure whether an IP address is being used by Google for SSL or authentication, you should cross-reference it with the official list provided in the document. In short, the IP ranges in the goog.json document are for Google services in general, and they can be used for SSL and authentication, but they are not reserved exclusively for those purposes.

Always refer to official Google documentation for accurate and up-to-date information.

@ms4446 
Thanks for the quick reply on my question!
I can see many ip addresses under name 'ssl' which does not fall into the ip range that google json file describe. If you see the attached file below, source IPs are dynamic but many of those does not match with the IP range in goog.json document. do you know why..?

스크린샷 2023-09-21 오후 1.31.34.png

If you're observing IP addresses under the name "ssl" that don't match the IP ranges provided in the goog.json document, there could be several reasons:

  1. Non-Google Traffic: The traffic labeled as "ssl" might not be exclusively related to Google services. SSL is a general security protocol used by many services and applications across the internet. Just because traffic is labeled as "ssl" doesn't mean it's from Google.

  2. Outdated IP List: Google's infrastructure is vast and continuously evolving. While the goog.json document provides a list of known IP ranges, it's possible that not every IP used by Google services is listed, or the list might not be up-to-date. However, Google usually keeps such lists updated for the benefit of users.

  3. Third-Party Services: If you're using third-party tools, plugins, or integrations in conjunction with Google services, they might generate SSL traffic from different IP addresses.

  4. Proxies or VPNs: If your infrastructure or the systems you're monitoring use proxies, VPNs, or other network routing tools, the observed IP addresses might be those of the proxy or VPN, rather than the actual source of the traffic.

  5. Potential Security Concerns: If there's a significant amount of unexpected traffic, especially if it doesn't match known IP ranges and shows unusual patterns, it's essential to investigate further. It could be benign, but it's always a good practice to ensure it's not malicious activity.

To get a clearer picture:

  • Cross-Reference with Other Google IP Lists: Google provides other IP range lists for different services. You might want to check if the IPs fall under any other official Google IP lists.

  • Deep Dive into Logs: Analyze the logs to see if there are any patterns, specific times of the day when the traffic spikes, or any other details that might give clues about the source and nature of the traffic.

  • Contact Google Support: If you're using GCP or other Google services, consider reaching out to Google Cloud Support. They might provide insights or verify if certain IP addresses are indeed associated with Google.

Remember, just because traffic is labeled "ssl" doesn't mean it's related to Google. SSL is a widespread protocol used across the internet for secure communication.

@ms4446 
Thank you for your well organized reply.

I have looked up those ip address under ssl and I found out that FASTLY and DATACAMP LIMITED using most of those IP address. Is there any relationship between google and them?

There is a collaborative relationship between Google and Fastly. Fastly is a content delivery network (CDN) provider, and they have established various partnerships and integrations with Google, especially related to Google Cloud Platform services. This means that some of the IP addresses you're observing under SSL might be associated with Fastly due to these integrations.

DataCamp Limited is known for offering online courses in data science and machine learning. I am not aware of any  direct known relationship between Google and DataCamp Limited. I am not sure why you might be seeing IP addresses associated with DataCamp Limited under SSL.

It's important to understand the origin and purpose of the traffic you're observing. If you have concerns about specific IP addresses or traffic patterns, it's always a good idea to investigate further and ensure that the traffic aligns with expected and legitimate activities.

Always exercise caution online, and if you're ever unsure about the legitimacy of a website or service, it's worth taking the time to research and verify its authenticity.

@ms4446 
Thank you so much for your support which helps a lot

I guess there are other application or process is running other than what I am doing

I will take bit more time to research to find what they are but sounds like it is not from me.

thank you!!