Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

A person with one watch knows what time it is; a person with two watches is never sure. Proverb


tech / sci.electronics.design / Re: Chinese downloads overloading my website

SubjectAuthor
* Chinese downloads overloading my websitelegg
+- Re: Chinese downloads overloading my websiteJohn R Walliker
+- Re: Chinese downloads overloading my websiteDon Y
+* Re: Chinese downloads overloading my websitelegg
|`* Re: Chinese downloads overloading my websiteJan Panteltje
| `* Re: Chinese downloads overloading my websitelegg
|  +* Re: Chinese downloads overloading my websiteJan Panteltje
|  |+* Re: Chinese downloads overloading my websiteLiz Tuddenham
|  ||`- Re: Chinese downloads overloading my websiteJeff Liebermann
|  |`* Re: Chinese downloads overloading my websitelegg
|  | +- Re: Chinese downloads overloading my websiteDon Y
|  | `* Re: Chinese downloads overloading my websiteJan Panteltje
|  |  +* Re: Chinese downloads overloading my websitejim whitby
|  |  |+- Re: Chinese downloads overloading my websiteDon Y
|  |  |`* Re: Chinese downloads overloading my websiteJan Panteltje
|  |  | `* Re: Chinese downloads overloading my websitelegg
|  |  |  `* Re: Chinese downloads overloading my websiteDon Y
|  |  |   `* Re: Chinese downloads overloading my websitelegg
|  |  |    +- Re: Chinese downloads overloading my websiteDon Y
|  |  |    `* Re: Chinese downloads overloading my websiteMartin Brown
|  |  |     `* Re: Chinese downloads overloading my websitelegg
|  |  |      `- Re: Chinese downloads overloading my websitePeter
|  |  `* Re: Chinese downloads overloading my websitelegg
|  |   `* Re: Chinese downloads overloading my websiteDon Y
|  |    `* Re: Chinese downloads overloading my websitelegg
|  |     `* Re: Chinese downloads overloading my websiteDon Y
|  |      `* Re: Chinese downloads overloading my websitePeter
|  |       `* Re: Chinese downloads overloading my websiteDon Y
|  |        +* Re: Chinese downloads overloading my websiteLiz Tuddenham
|  |        |+- Re: Chinese downloads overloading my websiteDon Y
|  |        |+* Re: Chinese downloads overloading my websitePeter
|  |        ||`* Re: Chinese downloads overloading my websiteLiz Tuddenham
|  |        || `- Re: Chinese downloads overloading my websitePeter
|  |        |`* Re: Chinese downloads overloading my websiteDon Y
|  |        | `* Re: Chinese downloads overloading my websiteLiz Tuddenham
|  |        |  +- Re: Chinese downloads overloading my websiteDon Y
|  |        |  `- Re: Chinese downloads overloading my websiteCarlos E.R.
|  |        `* Re: Chinese downloads overloading my websitePeter
|  |         +* Re: Chinese downloads overloading my websiteCarlos E.R.
|  |         |+* Re: Chinese downloads overloading my websiteDon Y
|  |         ||`* Re: Chinese downloads overloading my websitePeter
|  |         || `* Re: Chinese downloads overloading my websiteDon Y
|  |         ||  `* Re: Chinese downloads overloading my websitePeter
|  |         ||   `- Re: Chinese downloads overloading my websiteDon Y
|  |         |`* Re: Chinese downloads overloading my websitePeter
|  |         | +- Re: Chinese downloads overloading my websiteDon Y
|  |         | `* Re: Chinese downloads overloading my websiteCarlos E.R.
|  |         |  `- Re: Chinese downloads overloading my websiteDon Y
|  |         `- Re: Chinese downloads overloading my websiteDon Y
|  `- Re: Chinese downloads overloading my websiteJasen Betts
+* Re: Chinese downloads overloading my websiteMartin Brown
|`- Re: Chinese downloads overloading my websitelegg
`* Re: Chinese downloads overloading my websitelegg
 `* Re: Chinese downloads overloading my websitePeter
  `* Re: Chinese downloads overloading my websitelegg
   `* Re: Chinese downloads overloading my websitebitrex
    `* Re: Chinese downloads overloading my websiteDon Y
     `* Re: Chinese downloads overloading my websitebitrex
      `- Re: Chinese downloads overloading my websiteDon Y

Pages:123
Re: Chinese downloads overloading my website

<ut1r44$2bmvo$3@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135767&group=sci.electronics.design#135767

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: occassionally-confused@nospam.co.uk (Peter)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Fri, 15 Mar 2024 15:56:54 +0000
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <ut1r44$2bmvo$3@dont-email.me>
References: <u14quid1e74r81n0ajol0quthaumsd65md@4ax.com> <usjiog$15kaq$1@solani.org> <t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org> <gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me> <afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me> <usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me> <ut1bm8$28gvp$1@dont-email.me> <gsrdckxea6.ln2@Telcontar.valinor> <ut1gpg$29itn$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 15 Mar 2024 15:56:52 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="a7e74668e040b52259d6fb163f51202c";
logging-data="2481144"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18VJH19UAeRuT+/ul8f9NuX"
Cancel-Lock: sha1:+vQLtv+8i71qbFy9slKT41Ta5+4=
X-No-Archive: yes
X-Newsreader: Forte Agent 3.3/32.846
 by: Peter - Fri, 15 Mar 2024 15:56 UTC

Don Y <blockedofcourse@foo.invalid> wrote:

>Then, DON'T acknowledge the packet. Pretend the network
>cable is terminated in dead air.

Can you actually do that, with a standard server? Normally every
TCP/IP packet is acked. This is deep in the system.

UDP isn't, which is why port knocking works so well.

Re: Chinese downloads overloading my website

<65f471cd$0$3158692$882e4bbb@reader.netnews.com>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135768&group=sci.electronics.design#135768

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!feeder.usenetexpress.com!tr1.iad1.usenetexpress.com!198.186.191.154.MISMATCH!news-out.netnews.com!fdc2.netnews.com!eu1.netnews.com!not-for-mail
X-Trace: DXC=1\>c]9]o?]DlGci3SDSG>CU5[F2hIijDO7J470dMQQ7KJ4R`5ADBYnBMo;g06So@_G\lfPTGbeKkKgcb_L[RISRHf@HSLgR[]oH7dKkgDfTEDLiJPUY0^i>7F
X-Complaints-To: support@frugalusenet.com
Date: Fri, 15 Mar 2024 12:05:33 -0400
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: Chinese downloads overloading my website
Newsgroups: sci.electronics.design
References: <7qujui58fjds1isls4ohpcnp5d7dt20ggk@4ax.com> <d16uuihrafv26mcoujjfir0rf9l8td4njk@4ax.com> <uspj9c$91ne$1@dont-email.me> <r4m0vih5e5d4ugd7ru8oo0gb6ppenjrtin@4ax.com> <65f36e09$0$3158691$882e4bbb@reader.netnews.com> <ut0840$1udkj$1@dont-email.me>
Content-Language: en-US
From: user@example.net (bitrex)
In-Reply-To: <ut0840$1udkj$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 23
Message-ID: <65f471cd$0$3158692$882e4bbb@reader.netnews.com>
NNTP-Posting-Host: 127.0.0.1
X-Trace: 1710518733 reader.netnews.com 3158692 127.0.0.1:48125
 by: bitrex - Fri, 15 Mar 2024 16:05 UTC

On 3/14/2024 9:26 PM, Don Y wrote:
> On 3/14/2024 2:37 PM, bitrex wrote:
>> Maybe consider hosting the web server yourself, using a virtual
>> machine/Promox as the host and a Cloudflare tunnel for security:
>
> The advantage is that you can institute whatever policies you want.
> The DISadvantage is that YOU have to implement those policies!
>
> And, nothing prevents your site from being targeted for a [D]DoS
> attack, etc.  Or, any other behavior that increases the cost to
> you (in terms of your effort or servicing/hosting fees from
> provider(s).
>
> It's often easier (less hassle) to just avail yourself of some
> free service to host the content and let THEM worry about
> these issues.  (unless you enjoy dicking with this sort of thing)
>
>

OK, don't have to self-host. There are possible privacy/security
concerns using Cloudflare for private data/WAN applications but for
public-facing generally static web pages it seems like a no-brainer,
they have pretty generous free plans.

Re: Chinese downloads overloading my website

<ut29n3$2epl6$2@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135774&group=sci.electronics.design#135774

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: blockedofcourse@foo.invalid (Don Y)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Fri, 15 Mar 2024 13:05:45 -0700
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <ut29n3$2epl6$2@dont-email.me>
References: <u14quid1e74r81n0ajol0quthaumsd65md@4ax.com>
<usjiog$15kaq$1@solani.org> <t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com>
<usm6v6$17e2c$1@solani.org> <gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com>
<usqjih$h74g$1@dont-email.me> <afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com>
<ustdn0$176f7$1@dont-email.me> <usv8fu$1nhtm$1@dont-email.me>
<usvu8g$1slrq$2@dont-email.me> <ut1bm8$28gvp$1@dont-email.me>
<gsrdckxea6.ln2@Telcontar.valinor> <ut1gpg$29itn$2@dont-email.me>
<ut1r44$2bmvo$3@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 15 Mar 2024 20:05:56 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c86af28dc75bef790d14c8cfb4054056";
logging-data="2582182"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18sTtZFQhOfqaXqNC32T2X1"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.2.2
Cancel-Lock: sha1:608SLeYwqhKKB8Ref49d7S95ntg=
Content-Language: en-US
In-Reply-To: <ut1r44$2bmvo$3@dont-email.me>
 by: Don Y - Fri, 15 Mar 2024 20:05 UTC

On 3/15/2024 8:56 AM, Peter wrote:
>
> Don Y <blockedofcourse@foo.invalid> wrote:
>
>> Then, DON'T acknowledge the packet. Pretend the network
>> cable is terminated in dead air.
>
> Can you actually do that, with a standard server? Normally every
> TCP/IP packet is acked. This is deep in the system.

You have to rewrite your stack. *You* have to handle raw
packets instead of letting services (or the "super server")
handle them for you.

[And, you can't have an active proxy upstream that blindly
intercepts them]

The server effectively does a passive open and waits for
packets ON *ANY* PORT. You obviously have to hide ALL
ports as a potential client could poke ANY port, notice a
response, then assume you are *deliberately* hiding OTHER ports
that don't reply! If you reply ANYWHERE, then the "adversary"
knows that you aren't just a "dangling wire"!

Think of an old-fashioned RdTd serial port (no handshaking lines
that you can examine as "active"). You can listen to incoming
character stream without ever responding to it -- even allowing
your driver to lose characters to overrun/parity/framing/etc. errors.

Only when you see something that you recognize do you "react".

[This is the easy way to hide an "internal" 3-pin serial port
(that you likely have for diagnostics in a product) from folks
who like looking for shells, etc. on such things!]

Of course, if something (adversary or sniffer) sees that reaction,
then the secret is out. So, you don't want to abuse this access
mechanism.

It's like tunneling under some existing protocol; it works
only as long as folks don't *notice* it!

> UDP isn't, which is why port knocking works so well.

Anything that can be routed can be used. You can knock
on UDP/x, then UDP/y, then... before trying to open a
particular UDP/TCP connection. The point is to just LOOK
at incoming packets and not blindly act on them -- even
if that action is to block the connection.

Re: Chinese downloads overloading my website

<ut29qq$2epl6$3@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135775&group=sci.electronics.design#135775

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: blockedofcourse@foo.invalid (Don Y)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Fri, 15 Mar 2024 13:07:45 -0700
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <ut29qq$2epl6$3@dont-email.me>
References: <7qujui58fjds1isls4ohpcnp5d7dt20ggk@4ax.com>
<d16uuihrafv26mcoujjfir0rf9l8td4njk@4ax.com> <uspj9c$91ne$1@dont-email.me>
<r4m0vih5e5d4ugd7ru8oo0gb6ppenjrtin@4ax.com>
<65f36e09$0$3158691$882e4bbb@reader.netnews.com>
<ut0840$1udkj$1@dont-email.me>
<65f471cd$0$3158692$882e4bbb@reader.netnews.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 15 Mar 2024 20:07:54 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c86af28dc75bef790d14c8cfb4054056";
logging-data="2582182"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18U/k7YxFWfdXXmMHgtxgCe"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.2.2
Cancel-Lock: sha1:D9avmKk9ii/JPWFSTvAFJtITYgs=
In-Reply-To: <65f471cd$0$3158692$882e4bbb@reader.netnews.com>
Content-Language: en-US
 by: Don Y - Fri, 15 Mar 2024 20:07 UTC

On 3/15/2024 9:05 AM, bitrex wrote:
> On 3/14/2024 9:26 PM, Don Y wrote:
>> On 3/14/2024 2:37 PM, bitrex wrote:
>>> Maybe consider hosting the web server yourself, using a virtual
>>> machine/Promox as the host and a Cloudflare tunnel for security:
>>
>> The advantage is that you can institute whatever policies you want.
>> The DISadvantage is that YOU have to implement those policies!
>>
>> And, nothing prevents your site from being targeted for a [D]DoS
>> attack, etc.  Or, any other behavior that increases the cost to
>> you (in terms of your effort or servicing/hosting fees from
>> provider(s).
>>
>> It's often easier (less hassle) to just avail yourself of some
>> free service to host the content and let THEM worry about
>> these issues.  (unless you enjoy dicking with this sort of thing)
>
> OK, don't have to self-host. There are possible privacy/security concerns using
> Cloudflare for private data/WAN applications but for public-facing generally
> static web pages it seems like a no-brainer, they have pretty generous free plans.

IME, most of these efforts are just a shitload of unplanned effort,
that you (later) discover. And, are under some (self-imposed?) pressure
to keep running ASAP.

[I *really* don't like something imposing a timing constraint on my
actions. "Your site is down!" "Yeah. And?"]

Re: Chinese downloads overloading my website

<ut29ss$2epl6$4@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135776&group=sci.electronics.design#135776

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: blockedofcourse@foo.invalid (Don Y)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Fri, 15 Mar 2024 13:08:51 -0700
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <ut29ss$2epl6$4@dont-email.me>
References: <usec35$130bu$1@solani.org>
<u14quid1e74r81n0ajol0quthaumsd65md@4ax.com> <usjiog$15kaq$1@solani.org>
<t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org>
<gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me>
<afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me>
<usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me>
<ut1bm8$28gvp$1@dont-email.me> <gsrdckxea6.ln2@Telcontar.valinor>
<ut1r0u$2bmvo$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 15 Mar 2024 20:09:01 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c86af28dc75bef790d14c8cfb4054056";
logging-data="2582182"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18OPJ0xxx87QEM9Tv3t8X5F"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.2.2
Cancel-Lock: sha1:4RHSHOVXBhdiEZ3RBMkA/b6EHuU=
Content-Language: en-US
In-Reply-To: <ut1r0u$2bmvo$2@dont-email.me>
 by: Don Y - Fri, 15 Mar 2024 20:08 UTC

On 3/15/2024 8:55 AM, Peter wrote:
>
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
>>> Port knocking ;)
>>
>> I was thinking of using a high port. I do that.
>
> The sniffer will find any port # in a few more seconds...

Point a nessus daemon at yourself and see what it finds.

GRC.com offers some (less exhaustive) on-line tools...

Re: Chinese downloads overloading my website

<utei5t$1fej6$1@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135824&group=sci.electronics.design#135824

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: occassionally-confused@nospam.co.uk (Peter)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Wed, 20 Mar 2024 11:43:58 +0000
Organization: A noiseless patient Spider
Lines: 11
Message-ID: <utei5t$1fej6$1@dont-email.me>
References: <usjiog$15kaq$1@solani.org> <t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org> <gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me> <afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me> <usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me> <ut1bm8$28gvp$1@dont-email.me> <gsrdckxea6.ln2@Telcontar.valinor> <ut1gpg$29itn$2@dont-email.me> <ut1r44$2bmvo$3@dont-email.me> <ut29n3$2epl6$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 20 Mar 2024 11:43:57 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="f7a9efd0a7747120066f1da88d3d48ac";
logging-data="1555046"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/sirN4XW1zgmGoIP8jlXaT"
Cancel-Lock: sha1:uA4M+QKVgCr/klxpZUOajR3oHkg=
X-Newsreader: Forte Agent 3.3/32.846
X-No-Archive: yes
 by: Peter - Wed, 20 Mar 2024 11:43 UTC

Don Y <blockedofcourse@foo.invalid> wrote:

>> Can you actually do that, with a standard server? Normally every
>> TCP/IP packet is acked. This is deep in the system.
>
>You have to rewrite your stack. *You* have to handle raw
>packets instead of letting services (or the "super server")
>handle them for you.

OK, so this is very rare.

Re: Chinese downloads overloading my website

<utet8h$1honb$3@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135825&group=sci.electronics.design#135825

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: blockedofcourse@foo.invalid (Don Y)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Wed, 20 Mar 2024 07:52:59 -0700
Organization: A noiseless patient Spider
Lines: 60
Message-ID: <utet8h$1honb$3@dont-email.me>
References: <usjiog$15kaq$1@solani.org>
<t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org>
<gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me>
<afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me>
<usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me>
<ut1bm8$28gvp$1@dont-email.me> <gsrdckxea6.ln2@Telcontar.valinor>
<ut1gpg$29itn$2@dont-email.me> <ut1r44$2bmvo$3@dont-email.me>
<ut29n3$2epl6$2@dont-email.me> <utei5t$1fej6$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 20 Mar 2024 14:53:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d6fdbaa94c63f1c94d0dc6aeabf5edd0";
logging-data="1630955"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+2k+/yT0m5YFiF3z7cHiJB"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.2.2
Cancel-Lock: sha1:RDg9GRKQdLKRkHF4ycc0aiHn/GE=
Content-Language: en-US
In-Reply-To: <utei5t$1fej6$1@dont-email.me>
 by: Don Y - Wed, 20 Mar 2024 14:52 UTC

On 3/20/2024 4:43 AM, Peter wrote:
>
> Don Y <blockedofcourse@foo.invalid> wrote:
>
>>> Can you actually do that, with a standard server? Normally every
>>> TCP/IP packet is acked. This is deep in the system.
>>
>> You have to rewrite your stack. *You* have to handle raw
>> packets instead of letting services (or the "super server")
>> handle them for you.
>
> OK, so this is very rare.

Yes. So, sysadms aren't really looking for it or trying to
defend against it.

It's not a trivial solution as you need the skillset (as well
as access to the specific server!) to be able to, essentially,
rewrite the stack.

The easiest way to do this is to build a shim service to sit
above the NIC's IRQ as an agent; intercepting network
packets and only passing "select" ones up to the underside
of the *real*/original stack. You would then track the
"state" of each client's "knocking" sequence so you would know
who to BLOCK and who to PASSTHRU at any given time.

And, you can apply it to all ports/protocols (an essential
requirement as you don't want ANYTHING to be visible to a probe).

The problem with this approach lies in knowing when to
"stop" passing packets from a particular client as you
don't have an easy way of knowing that the "real"
"service" has been terminated. This a consequence of the
monolithic nature of most kernels.

[My new OS uses an entirely different approach to the stack
so its relatively easy for me to deal with "transactions"]

The *advantage* is that you can use it to effectively tunnel
under HTTP without worrying about sysadms blocking your
specific traffic: "Why is Bob, in accounting, trying to
send datagrams to port XYZ at DonsHouseOfMagic?"

[Very few protocols are *reliably* allowed through firewalls
without some form of caching, rescheduling, rewriting, etc.
E.g., tunneling under DNS is easily "broken" by a caching
server between the client and external agency. And, most
can't deliver large payloads without raising suspicions!
And, remember, you can't "sort of" process the protocol
without indicating that you exist!]

OTOH, a TCP connection (HTTP on port 80) to DonsHouseOfMagic
likely wouldn't arouse any suspicion. Nor would the payload
merit examination. Great for slipping firmware updates through
a firewall, usage data, etc.

[HTTP/3 adds some challenges but is no worse than any other
UDP service]

Re: Chinese downloads overloading my website

<rfarckxnmm.ln2@Telcontar.valinor>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135826&group=sci.electronics.design#135826

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: robin_listas@es.invalid (Carlos E.R.)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Wed, 20 Mar 2024 16:03:55 +0100
Lines: 19
Message-ID: <rfarckxnmm.ln2@Telcontar.valinor>
References: <usec35$130bu$1@solani.org>
<u14quid1e74r81n0ajol0quthaumsd65md@4ax.com> <usjiog$15kaq$1@solani.org>
<t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org>
<gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me>
<afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me>
<usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me>
<ut1bm8$28gvp$1@dont-email.me> <gsrdckxea6.ln2@Telcontar.valinor>
<ut1r0u$2bmvo$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net lIl+60uuENBfEBBvyaM/egBSr1C1cze2KuEcxkptosOkzvsju5
X-Orig-Path: Telcontar.valinor!not-for-mail
Cancel-Lock: sha1:/dPV9GqfiC3MOTJ3BbtsT2fq2bQ= sha256:NfBe0o35Xtvtr/S/0zmORu1DvmbC4EhfN99EMgQdp+0=
User-Agent: Mozilla Thunderbird
Content-Language: es-ES, en-CA
In-Reply-To: <ut1r0u$2bmvo$2@dont-email.me>
 by: Carlos E.R. - Wed, 20 Mar 2024 15:03 UTC

On 2024-03-15 16:55, Peter wrote:
>
> "Carlos E.R." <robin_listas@es.invalid> wrote:
>
>>> Port knocking ;)
>>
>> I was thinking of using a high port. I do that.
>
> The sniffer will find any port # in a few more seconds...

Actually it takes longer than that. So far, no hits; and I would notice
when someone tries to login on ssh.

Of course, one can defend the fort from casual attackers, not from
determined attackers; those will eventually find a way.

--
Cheers, Carlos.

Re: Chinese downloads overloading my website

<utf48m$1je0g$1@dont-email.me>

  copy mid

https://news.novabbs.org/tech/article-flat.php?id=135830&group=sci.electronics.design#135830

  copy link   Newsgroups: sci.electronics.design
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: blockedofcourse@foo.invalid (Don Y)
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Wed, 20 Mar 2024 09:52:32 -0700
Organization: A noiseless patient Spider
Lines: 58
Message-ID: <utf48m$1je0g$1@dont-email.me>
References: <usec35$130bu$1@solani.org>
<u14quid1e74r81n0ajol0quthaumsd65md@4ax.com> <usjiog$15kaq$1@solani.org>
<t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org>
<gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me>
<afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me>
<usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me>
<ut1bm8$28gvp$1@dont-email.me> <gsrdckxea6.ln2@Telcontar.valinor>
<ut1r0u$2bmvo$2@dont-email.me> <rfarckxnmm.ln2@Telcontar.valinor>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 20 Mar 2024 16:52:38 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d6fdbaa94c63f1c94d0dc6aeabf5edd0";
logging-data="1685520"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+E1XwvHmJWQTEjIt/kU4dM"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.2.2
Cancel-Lock: sha1:I7VFnaKZRC25ssOcCdIoA3IFcwo=
Content-Language: en-US
In-Reply-To: <rfarckxnmm.ln2@Telcontar.valinor>
 by: Don Y - Wed, 20 Mar 2024 16:52 UTC

On 3/20/2024 8:03 AM, Carlos E.R. wrote:
> On 2024-03-15 16:55, Peter wrote:
>>
>>   "Carlos E.R." <robin_listas@es.invalid> wrote:
>>
>>>> Port knocking ;)
>>>
>>> I was thinking of using a high port. I do that.
>>
>> The sniffer will find any port # in a few more seconds...
>
> Actually it takes longer than that. So far, no hits; and I would notice when
> someone tries to login on ssh.

Why would an attacker try to breach a secure protocol -- hoping
you have enabled it without any protections??

A port scanner just needs to see if it gets a response from
a particular port, not whether or not it can invoke a particular
protocol on that port. Even "refusing the connection" tells the
scanner that there is a host at that IP.

Simple exercise: go to another host and just TRY to open a
connection to port 22 (sshd) or 23 (telnetd). Don't try to
login. What do you see on the server concerning this
activity?

You can learn a lot about the host, OS, etc. just from watching how
it reacts to connections and connection attempts (e.g., how it
assigns sequence numbers, which ports are open "by default", etc.)

> Of course, one can defend the fort from casual attackers, not from determined
> attackers; those will eventually find a way.

Only if they sense potential value beyond what they can get
for less effort, elsewhere. With all of the casual hosts out there,
(especially those folks who don't realize their security risks)
its silly to waste resources trying to get to one that poses any
sort of obstacle.

And, if you don't KNOW that there is a machine at that IP, then
what's your attack strategy? Just push packets down a black hole
and *hope* there is something there, listening (but ignoring)?

What do you do if I just hammer away at your IP even KNOWING that
you've got all your ports closed? Any *legitimate* traffic
can't get through (including replies to your outbound requests)
because I am saturating your pipe. What can you do to *stop* me
from doing this?

[The same sort of logic applies to "hidden" diagnostic ports
in devices. If I keep pushing bytes into a "debug" UART, I
consume system resources at a rate that *I* control. Was your
firmware designed to handle this possibility? Or, did you
assume only "authorized technicians" would use said port and
only in benevolent ways?]

Pages:123
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor