Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The main problem is how do you authenticate the request as being legitimate? It's already possible to spoof headers and "FROM-IP" (in fact, major DDoS attacks use just this as a replay attack, spoof a DNS request as coming from 1.1.1.1 and get a much larger response sent TO 1.1.1.1 from wherever).


You can send back a reply with a token to confirm ban.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: