Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
--On Wednesday, March 27, 2013 6:48 PM -0400 Tom Metro <tmetro+blu at gmail.com> wrote: > While I can imagine some implementations of port knocking, where failed > knock sequences shut down a service, there are certainly other > implementations where that is not the case. That's precisely what I mean. Combine port knocking, automatic IP block, and IP address spoofing and you have a very easy denial of service. I am aware that there are workarounds to this, but if you have to work around a basic function of your security system then you're using the wrong security tool. -- Rich P.
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |