Deutsch   English   Français   Italiano  
<ut1foi$29aaf$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Don Y <blockedofcourse@foo.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Chinese downloads overloading my website
Date: Fri, 15 Mar 2024 05:42:50 -0700
Organization: A noiseless patient Spider
Lines: 24
Message-ID: <ut1foi$29aaf$1@dont-email.me>
References: <7qujui58fjds1isls4ohpcnp5d7dt20ggk@4ax.com>
 <6lekuihu1heui4th3ogtnqk9ph8msobmj3@4ax.com> <usec35$130bu$1@solani.org>
 <u14quid1e74r81n0ajol0quthaumsd65md@4ax.com> <usjiog$15kaq$1@solani.org>
 <t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org>
 <gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me>
 <afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me>
 <usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me>
 <ut1bm8$28gvp$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 15 Mar 2024 12:42:59 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c86af28dc75bef790d14c8cfb4054056";
	logging-data="2402639"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18fwacPFBO6Lbj4UldTpaTA"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.2.2
Cancel-Lock: sha1:ANHFgsW/MAnU4ZzmsKGOMko+kPE=
Content-Language: en-US
In-Reply-To: <ut1bm8$28gvp$1@dont-email.me>
Bytes: 2509

On 3/15/2024 4:33 AM, Peter wrote:
> 
>   Don Y <blockedofcourse@foo.invalid> wrote:
> 
>> I operate a server in stealth mode; it won't show up on
>> network probes so robots/adversaries just skip over the
>> IP and move on to others.  Folks who *should* be able to
>> access it know how to "get its attention".
> 
> Port knocking ;)

Effectively, yes.  It's a bit tedious to use -- and the server-side
code is far from "standard" -- but it is great at stealth.  I'm
not sure how it would work in situations with lots of *intended*
traffic, though...

[I've been making little boxes with a NIC on one end, stack
in the middle, and some form of communications I/O on the
other (serial port, USB, GPIB, CAN, DMX, etc.).  The stealth
feature was one of the most requested capabilities (as it lets
an interface be deployed and routed -- without fear of some
hacker/script-kiddie stumbling onto it and dicking with the
attached device).]