lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jun 3 05:53:29 2006 From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu) Subject: Tool Release - Tor Blocker On Sat, 03 Jun 2006 00:21:49 EDT, Jason Areff said: > ---------- > security through obscurity isnt security > ---------- Yes... And as the people who got addresses in the 69/8 address block that *used* to be bogon space, security through bitrotted filters isn't security either... > char *listof33[] = { > "62.178.28.11", "83.65.91.110", "86.59.21.38", "202.173.141.155", > "69.70.237.137", "209.172.34.176", "66.11.179.38", "216.239.78.246", For bonus points, estimate the amount of time before addresses on this list become invalid because they're not Tor nodes, and Tor nodes get created that aren't on this list. This list is going to bitrot really fast, and needs a way to be easily updated by the people who install it. And with some 400 entries on the list, it would be nice performance wise if it used a sorted list and a binary search, so that for the vast majority of cases, you'd be done in 9 or 10 interations rather than 400. And if it gets to 1000 exit nodes, it will only add one more interation. ;) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 226 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060603/ea451df9/attachment.bin
Powered by blists - more mailing lists