Beefy Boxes and Bandwidth Generously Provided by pair Networks
Welcome to the Monastery
 
PerlMonks  

Re^5: How to implement a fourth protocol

by Preceptor (Deacon)
on Mar 30, 2007 at 14:48 UTC ( [id://607490]=note: print w/replies, xml ) Need Help??


in reply to Re^4: How to implement a fourth protocol
in thread How to implement a fourth protocol

"What I actually advocate is security through proper management of technology where it's necessary rather than always borrowing blindly from someone else."

And yet you're looking at tty, because 'badbots don't use it these days'. Seriously, a protocol isn't secure because stuff doesn't use it, it's secure because stuff _does_ and it's still proven pretty resilient.

"It is professionally incompetent to go looking from the outset for technology to solve your problems."

If I need to open a tin can, I will go and buy a can opener. If I find that the can opener I buy is not suitable for the job, then I may look at inventing my own. But more likely, I'll go and find someone else who makes can openers to see if theirs does a better job.

Which is more or less what you're doing when you're looking at using perl, NetServer::Generic to implement your new project.

"Correct technical design is a from-scratch process in which only when it is complete and harmonious do you go looking for shortcuts and trade-offs and even then you need to know the full functional story 100% rather than assembling together a bunch of things you don't fully understand."

Maybe, but by definition if you're doing so on a computer system build by someone else, running an OS written by someone else, using an interpreted language designed by someone else, you're _not_ starting from scratch.

It's not necessary to start from scratch. Look at what you've got. Look at what you're trying to do. Then try and figure out how to get from one to the other. Personally, I don't think implementing a new protocol is the way to go, since you'll pretty much _have_ to have traffic hitting your firewall anyway. Unless you're not planning to use the IP suite, but at that point you're going to have traffic that's not routable across the public internet. It's actually more intensive for a firewall to perform protocol inspection - look at a whole packet, and try and understand what it 'is' than it is to just check the 'inbound port' field in the IP packet, and base it on that.

  • Comment on Re^5: How to implement a fourth protocol

Replies are listed 'Best First'.
Re^6: How to implement a fourth protocol
by Moron (Curate) on Mar 30, 2007 at 16:41 UTC
    Minicomputer operating systems like Unix (later to include Linux), VMS, RSX, RSTS and mainframe operating systems like MVS were generally designed sufficiently well (in the context of suitability for general purpose) not to have to reinvent them. But if there were only Windows, then yes, I would be forced to reinvent the operating system as part of the project plan.

    Only two base protocols are used by browsers, but there are plenty more that had to be created for more specific purposes like mailservers or indeed tty. It would hardly be reinventing the wheel then if for example and hold it hold it I only say for example, I were to create a ttys for tty just as there is an https for http.

    -M

    Free your mind

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://607490]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others chilling in the Monastery: (9)
As of 2024-04-23 10:33 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found