Beefy Boxes and Bandwidth Generously Provided by pair Networks
Don't ask to ask, just ask
 
PerlMonks  

Re^4: How to implement a fourth protocol

by Moron (Curate)
on Mar 27, 2007 at 18:04 UTC ( [id://606822]=note: print w/replies, xml ) Need Help??


in reply to Re^3: How to implement a fourth protocol
in thread How to implement a fourth protocol

Port knocking is discussed elsewhere in the thread - so you can see the problem with that.

I hope to be able to reduce the risks of "untested" by seeking as much tried and tested material as possible hence the reference to NetServer::Generic which I presume IS tested. I might be able to build the protocol over another for example, but I left that idea out to give people a chance to suggest it ;) e.g. Telnet. Of course I may be being naive about that idea - I'm not a networking guru, so I didn't want to put that idea in people's minds too early.

-M

Free your mind

  • Comment on Re^4: How to implement a fourth protocol

Replies are listed 'Best First'.
Re^5: How to implement a fourth protocol
by Fletch (Bishop) on Mar 27, 2007 at 18:48 UTC
    . . . I'm not a networking guru . . .

    Don't take this the wrong way, but: Stop now, because you don't know enough and you're probably going to screw something up (as if the mention of Telnet in the context of secure protocols didn't prove that already :). In all likelihood you probably don't even know what you don't know (if I may wax Rumsfeldian).

    There's an entire very good book on the subject which one probably could summarize in one sentence: "Security is hard; doing security correctly, even for people that know what they're doing, is hard and even the experts often make mistakes.".

    Now that I've at least hopefully dulled your hopes, let me say that I'm not saying 100% that you shouldn't do it (more like 99.8% that you shouldn't, lowered to a 99.4% once you've read Schneier and understand more of the implications of what you're proposing). But don't undertake this lightly and make sure you pay attention to prior art and reuse proven, tested components where possible.

    And if the desire persists, repeatedly apply the Schneier book to the forehead until the urge passes. :)

    A reply falls below the community's threshold of quality. You may see it by logging in.
Re^5: How to implement a fourth protocol
by jgamble (Pilgrim) on Mar 28, 2007 at 18:37 UTC

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://606822]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others studying the Monastery: (7)
As of 2024-04-19 09:35 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found