in reply to Unique User Logging and Lock Out
A malicious user could pull off some list of public anonymous proxies and script requests through each of them at random intervals, which makes it very hard to filter out bad requests.
You could implement a CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart), in order to stop automated requests. There are several implementations out there, for example GD::SecurityImage.
As a sidenote, most non-anomyous proxies set the HTTP_X_FORWARDED_FOR header which usually is the users IP, however if proxies several proxies were chained together, it would be a commadelimited list of the proxies IPs. HTTP_VIA and HTTP_CLIENT_IP are other ones I remember from the top of my head. These variables enable you to identify proxies and distinguish users behind it.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: Unique User Logging and Lock Out
by benizi (Hermit) on Nov 19, 2004 at 00:40 UTC |