Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Don Y Newsgroups: sci.electronics.design Subject: Re: Chinese downloads overloading my website Date: Fri, 15 Mar 2024 05:42:50 -0700 Organization: A noiseless patient Spider Lines: 24 Message-ID: References: <7qujui58fjds1isls4ohpcnp5d7dt20ggk@4ax.com> <6lekuihu1heui4th3ogtnqk9ph8msobmj3@4ax.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Fri, 15 Mar 2024 12:42:59 -0000 (UTC) Injection-Info: dont-email.me; posting-host="c86af28dc75bef790d14c8cfb4054056"; logging-data="2402639"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18fwacPFBO6Lbj4UldTpaTA" User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Cancel-Lock: sha1:ANHFgsW/MAnU4ZzmsKGOMko+kPE= Content-Language: en-US In-Reply-To: Bytes: 2509 On 3/15/2024 4:33 AM, Peter wrote: > > Don Y wrote: > >> I operate a server in stealth mode; it won't show up on >> network probes so robots/adversaries just skip over the >> IP and move on to others. Folks who *should* be able to >> access it know how to "get its attention". > > Port knocking ;) Effectively, yes. It's a bit tedious to use -- and the server-side code is far from "standard" -- but it is great at stealth. I'm not sure how it would work in situations with lots of *intended* traffic, though... [I've been making little boxes with a NIC on one end, stack in the middle, and some form of communications I/O on the other (serial port, USB, GPIB, CAN, DMX, etc.). The stealth feature was one of the most requested capabilities (as it lets an interface be deployed and routed -- without fear of some hacker/script-kiddie stumbling onto it and dicking with the attached device).]