Welcome to the Monastery | |
PerlMonks |
Re^5: How to implement a fourth protocolby Preceptor (Deacon) |
on Mar 30, 2007 at 14:48 UTC ( [id://607490]=note: print w/replies, xml ) | Need Help?? |
"What I actually advocate is security through proper management of technology where it's necessary rather than always borrowing blindly from someone else."
And yet you're looking at tty, because 'badbots don't use it these days'. Seriously, a protocol isn't secure because stuff doesn't use it, it's secure because stuff _does_ and it's still proven pretty resilient. "It is professionally incompetent to go looking from the outset for technology to solve your problems." If I need to open a tin can, I will go and buy a can opener. If I find that the can opener I buy is not suitable for the job, then I may look at inventing my own. But more likely, I'll go and find someone else who makes can openers to see if theirs does a better job. Which is more or less what you're doing when you're looking at using perl, NetServer::Generic to implement your new project. "Correct technical design is a from-scratch process in which only when it is complete and harmonious do you go looking for shortcuts and trade-offs and even then you need to know the full functional story 100% rather than assembling together a bunch of things you don't fully understand." Maybe, but by definition if you're doing so on a computer system build by someone else, running an OS written by someone else, using an interpreted language designed by someone else, you're _not_ starting from scratch. It's not necessary to start from scratch. Look at what you've got. Look at what you're trying to do. Then try and figure out how to get from one to the other. Personally, I don't think implementing a new protocol is the way to go, since you'll pretty much _have_ to have traffic hitting your firewall anyway. Unless you're not planning to use the IP suite, but at that point you're going to have traffic that's not routable across the public internet. It's actually more intensive for a firewall to perform protocol inspection - look at a whole packet, and try and understand what it 'is' than it is to just check the 'inbound port' field in the IP packet, and base it on that.
In Section
Seekers of Perl Wisdom
|
|