lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <814b9d50604231026o7e22ccau2f44a66a28839660@mail.gmail.com>
Date: Sun Apr 23 18:26:54 2006
From: str0ke at milw0rm.com (str0ke)
Subject: Proxy Detection

On 4/23/06, Andrew A <gluttony@...il.com> wrote:
> Tor does not give an x-forward-for.

Easy fix to detect the Tor users is just to dump a cache file every
hour or so and regex the connecting ip address.

http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sortbw=1&addr=1&textonly=1

> use newer proxies
A simple `"ip" proxy` query to yahoo/google/alta/, based off of the
results would do the trick as well.  I use this technique and haven't
had any problems.

> x-forward-for
HTTP_X_FORWARDED_FOR
HTTP_VIA
HTTP_CLIENT_IP
HTTP_PROXY_CONNECTION
FORWARDED_FOR
X_FORWARDED_FOR
X_HTTP_FORWARDED_FOR
HTTP_FORWARDED

/str0ke

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ