lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <0EE8C7F7-9929-41E0-ADE2-DB2BC5483C88@gmail.com> Date: Mon, 21 Mar 2011 13:39:52 -0700 From: bk <chort0@...il.com> To: Alien Chatter <feedalienscoffee@...il.com>, Full Disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: Gmail and China's GFW On Mar 21, 2011, at 10:52 AM, Alien Chatter wrote: > $ sudo iptables -I INPUT -m string --algo bm --hex-string > '|476f6f676c6520496e63311830160603550403140f6d61696c2e676f6f676c652e636f6d30819f30|' > -j DROP > > Try it, you will get a connection timeout: > > $ curl --connect-timeout 60 https://mail.google.com/ > curl: (28) SSL connection timeout > > The same applies for Twitter, Facebook... Much more efficient than > DNS/IP blocking! > Because searching for a bytestring in payload generates so much less load than just overriding a DNS result at the recursive server (that users are forced to issue queries to) or a simply drop SYNs based on IP header value that routers/firewalls are optimized for... I think you forgot your coffee this morning. It's not just for aliens you know. -- chort _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists