lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun Apr 23 18:26:54 2006 From: str0ke at milw0rm.com (str0ke) Subject: Proxy Detection On 4/23/06, Andrew A <gluttony@...il.com> wrote: > Tor does not give an x-forward-for. Easy fix to detect the Tor users is just to dump a cache file every hour or so and regex the connecting ip address. http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sortbw=1&addr=1&textonly=1 > use newer proxies A simple `"ip" proxy` query to yahoo/google/alta/, based off of the results would do the trick as well. I use this technique and haven't had any problems. > x-forward-for HTTP_X_FORWARDED_FOR HTTP_VIA HTTP_CLIENT_IP HTTP_PROXY_CONNECTION FORWARDED_FOR X_FORWARDED_FOR X_HTTP_FORWARDED_FOR HTTP_FORWARDED /str0ke
Powered by blists - more mailing lists