[zeromq-dev] security model recommendation
Joshua Foster
jhawk28 at gmail.com
Thu Sep 8 02:42:55 CEST 2011
VPN is also available for more advanced security such as encryption and endpoint verification.
Joshua
On Sep 7, 2011, at 7:41 PM, chrish at techspecs.com wrote:
> Hi,
>
> Suppose 0mq is used in a commercial product and is released and is used
> by the community. Now, a hacker discovers that 0mq is being used and
> tries to get inside by imitating the protocol somehow. How to discover
> this (besides segfault)? Or worse still, the hacker simply wants to
> bring down the server and sends an empty string across REP/REQ or
> something like that. I realize iptables can be used to prevent
> unauthorized IP addresses from accessing a server but what about IP
> address that are initially authorized but turn out to be rogue by
> persons lacking social etiquette?
>
> Best,
> Chris
>
>
> _______________________________________________
> zeromq-dev mailing list
> zeromq-dev at lists.zeromq.org
> http://lists.zeromq.org/mailman/listinfo/zeromq-dev
More information about the zeromq-dev
mailing list