![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
--On Wednesday, March 27, 2013 8:59 PM -0400 Tom Metro <tmetro+blu at gmail.com> wrote: > Not merely workarounds...it's trivial to design a port knocking scheme > that is resistant to DoS attacks. Perhaps, but it isn't as easy to implement such a system such that use is transparent to users. That's not me saying that security is a tradeoff with usability. That's me saying that you're using the wrong tool. > Of course any public facing server is subject to DoS attacks if the > sender can overwhelm your inbound bandwidth. That's orthogonal to the point: your port knocking "security" wall and my IP spoofing can subject you to DoS attacks with a handful of packets unless you implement workarounds for the lockout. If you have to work around a basic function of the security system just to make it usable then you're using the wrong tool for the job. But I repeat myself. -- Rich P.
![]() |
|
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |