Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • How will you prevent hosts from maliciously reporting other, innocent hosts as miscreants?
    • Luckily, that isn't my problem. The problem of trust is one that each network operator will have to deal with.

      All I can do is to not mandate a particular solution, and instead to let evolution decide.

      On my company-internal ThreatNet, I simple have the server only allow connections from IPs inside my network.

      On a commercial one, perhaps we use SIRC, passworded accounts and certificates to verify validated users.

      I imagine there are a number of different solutions to the trust problem.