What Does “BBS” in TCPDump Output Mean

firewallioslinuxnetworkingtcpdump

I've recently implemented stricter firewall rules, and I keep seeing the Apple devices on my local network attempt to reach out to 192.168.1.156 or 192.168.1.152. In an attempt to understand what it's doing, I ran tcpdump and received this output:

19:36:05.273166 IP 192.168.22.8.53058 > 192.168.1.156.bbs: Flags [S], seq 2685942121, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2363049810 ecr 0,sackOK,eol], length 0
19:36:14.889388 IP 192.168.22.8.53064 > 192.168.1.152.bbs: Flags [S], seq 3567670609, win 65535, options [mss 1460,nop,wscale 6,nop,nop,TS val 2054024907 ecr 0,sackOK,eol], length 0

Can anyone help explain what the bbs port/protocol is, and/or why Apple devices keep trying to talk to these seemingly random IPs outside of their subnet? To be more specific, it's both iPhones and the Apple TV doing it, but not the homepods on the same network.

I’ve read about the Bulletin Bus Service, but I haven’t found any information on how or why it would be used by certain Apple devices, especially to an IP that isn’t in use.

Best Answer

Due to the comment by @Spiff I was able to find out it was trying to send traffic over port 7000/tcp, which according to a couple Apple discussion pages is for Airplay. It appears that Apple devices remember the IPs of Airplay destinations, and continuously try to connect to them.

Apple's support page does not indicate it uses port 7000 for anything, though this explanation lines up with my experience. In any event, it doesn't appear malicious, even if it is annoying to see in my firewall logs.

Related Question