lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jun 3 23:08:13 2006 From: asotirov at determina.com (Alexander Sotirov) Subject: Tool Release - Tor Blocker The purpose of this module is not to increase the security of your server, but to allow you to prosecute hackers after the fact. If your server has a remotely exploitable vulnerability and you block Tor nodes, you can still be hacked from any other IP address on the Internet. The only difference is that blocking Tor force the attackers to use a non-anonymized IP address, which can (at least theoretically) be traced back to them. I have doubts that this really makes a difference in practice. Blacklisting IP addresses is no substitute for actually fixing the vulnerabilities on your servers. Alex
Powered by blists - more mailing lists