lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat Jun 3 05:59:23 2006 From: andfarm at gmail.com (Andrew Farmer) Subject: Tool Release - Tor Blocker On 02 Jun 06, at 21:47, str0ke wrote: > Umm what about the new ip addresses that are added to the tor network? > > http://serifos.eecs.harvard.edu/cgi-bin/exit.pl? > sortbw=1&addr=1&textonly=1 > > This wouldn't really be a complete fix. Not to mention that: 1] Some of the IP addresses in this module won't be matched properly, as they contain leading spaces. 2] More importantly, this module could be replaced with some extra Apache configuration (Deny stanzas), or by iptables configuration, assuming you aren't brain-dead enough to run a web server under Windows. 3] Even more importantly, this module's author fails to recognize the existence of anonymous HTTP proxies, which are - if anything - easier and more commonly used than TOR. 4] Even MORE importantly, this module's author fails to recognize the importance of hardening a server against attacks, rather than trying (and failing) to block possible sources of attack. -------------- next part -------------- A non-text attachment was scrubbed... Name: PGP.sig Type: application/pgp-signature Size: 186 bytes Desc: This is a digitally signed message part Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060602/94aece76/PGP.bin
Powered by blists - more mailing lists