[zeromq-dev] security model recommendation

Joshua Foster jhawk28 at gmail.com
Thu Sep 8 02:42:55 CEST 2011

VPN is also available for more advanced security such as encryption and endpoint verification.


On Sep 7, 2011, at 7:41 PM, chrish at techspecs.com wrote:

> Hi,
>   Suppose 0mq is used in a commercial product and is released and is used
> by the community. Now, a hacker discovers that 0mq is being used and
> tries to get inside by imitating the protocol somehow. How to discover
> this (besides segfault)? Or worse still, the hacker simply wants to
> bring down the server and sends an empty string across REP/REQ or
> something like that. I realize iptables can be used to prevent
> unauthorized IP addresses from accessing a server but what about IP
> address that are initially authorized but turn out to be rogue by
> persons lacking social etiquette?
> Best,
>  Chris
> _______________________________________________
> zeromq-dev mailing list
> zeromq-dev at lists.zeromq.org
> http://lists.zeromq.org/mailman/listinfo/zeromq-dev

More information about the zeromq-dev mailing list