in reply to Re^2: How to implement a fourth protocol
in thread How to implement a fourth protocol
I'm assuming that we're talking about a public service here, and not something that can be very easily protected by something akin to VPN. In order to detect a bot, you have to allow it some initial degree of access so you can discern its intent. There's really no other way to determine the intent of a previously unseen client. After something at the server level determines that the client is malicious, then it has to work to defend itself. The lowest level available to us is the TCP/IP layer, where we can decide at the packet level whether to accept, reject, or drop the packets without the overhead of reassembling them into messages. This is the level where the firewall lives, very efficiently sieving bits. So, the easy way to implement a defensive measure is to give the server or some lightweight middleware the smarts to detect malicious activity and the means to communicate to the firewall "I don't want to hear from IP address ww.xx.yy.zz on my port nn any more". Bam, problem solved. From that point forward you don't analyze payloads, and the firewall just sieves bits. The best efficiency comes if you just drop those packets without bothering to tell the client that you don't want them. It's a bit rude, but it's efficient.
So, again, how would the certain to introduce vulnerability new protocol be faster/easier/better than the existing tools which are readily available today?
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: How to implement a fourth protocol
by Moron (Curate) on Mar 27, 2007 at 18:20 UTC | |
by gloryhack (Deacon) on Mar 27, 2007 at 20:06 UTC | |
by Moron (Curate) on Mar 28, 2007 at 12:51 UTC | |
by tirwhan (Abbot) on Apr 02, 2007 at 12:17 UTC | |
by Moron (Curate) on Apr 02, 2007 at 12:53 UTC | |
| |
by sgifford (Prior) on Mar 27, 2007 at 19:48 UTC | |
by Moron (Curate) on Mar 28, 2007 at 12:41 UTC |