predator78 22 Junior Poster

Also I wouldn't recommend "assuming" the router is doing anything. It should be doing what you are telling it if the settings are correct, and forwarding traffic to the machine you designated as your web-server. Another thing you shouldn't need the http:// if you are trying to access directly through the router. Simply type the address of the router into the address bar.

predator78 22 Junior Poster

Well first thing that comes to mind that you didn't state. Are you running a web-server on the machine that the traffic is being forwarded to? If not it could be getting requests but doesn't have anything to send back. Also remember when your in your testing phase you may have to turn off your security settings and start turning them on one by one until you are at your desired level of security.

predator78 22 Junior Poster

I tried pinging the router and got responce timed out. This message holds the key to your problem, the ping was sent to the router the router we can assume most likely recieved it unless there is something wrong with the hardware, but it never sent the message back. Either your addressing is incorrect thus you are not part of the network, or a setting in the router maybe incorrect. Do the things jingda requested, most likely your firewall is blocking the connection.

predator78 22 Junior Poster

A short simple answer defined here as well as some other good little tid bits, but if this is for homework I suggest you really get out and do some research. Your teacher probably isn't going to be impressed with a one sentence answer to this. Anyway by gaining the trust of a computer that is trusted by the target network you can bypass alot of security. Have a look here transitive attack.

predator78 22 Junior Poster

I haven't really studied these until today, but from the information I have gathered today they are in fact quite similar. Also it seems that the techniques would in fact work well together in my opionion. Major diffrence?

syn-cookie: Uses a timestamp and uses that to create a queue associated with the client, also provides an encrypted portion to ensure client integrity.

HFC: Uses hops(the distance from client to server) and basically creates a list of valid ip -> to hops to check against and filter out possible ip's that have been spoofed.

As far as you question reguarding using them together like I said they seem to work well together and both are great counter-measures however according to the information I gathered syn-cookie has been updated and replaced with tcpct which is a tcp extension and would probably be prefered over syn-cookie so you may want to research that as well.

s.w.a commented: thank you for your huge attention,helpful information and clear sentances +2
predator78 22 Junior Poster

GREAT RESOLUTION!!!! Yeah networks can be painful to troubleshoot. Even the greatest of us can lose sight of the obvious stuff at times as complicated as things get. A great mentor also once introduced me to packet tracer it's a great program that let's you assemble virtual networks for testing. You can also keep the configuration of you current network as a file and introduce new things or take existing things out for testing purposes to help keep your network running at an optimal level. Worth checking out for any administrator IMHO. Great work!!!

predator78 22 Junior Poster

Yes what you say is true. The rules for the key can of course be ajusted at the router, while the packet is still in packet "form". The server should maintain information about the key. Now that you have a clear picture let's look at some examples.

Client sends request to server
Server accepts the request and sends key
The rules of this key are to send data to the client unless the connection is timed out lets say 10 minutes of inactivity. At that point if the server has not had another request from the client authentication must take place again.
So server sends key and trasmits the data
Lets pretend it was a 9.50 min long video
The data is sent and the connection is still valid for 10 seconds incase of problems
After the 10 minutes the server dumps the key and the client must send a new request.

Now if we want to tighten up security on it we could possibly do something like.
Client sends request
Server recieves and sends key
Rules of this key will be that every 2 minutes the key must be renewed.
Here is our problem....
The client only requests the information once.
They push the button get authenticated and expect all the data to come at them.
One way possibly around this issue would be to install special software on the client which defines new …

predator78 22 Junior Poster

Or this havn't tested it as I am still going through it myself but I assume since it was proposed it should work. string::find

predator78 22 Junior Poster

Ok if you are just interested in how it works I can attempt to explain. The thing to realize here is that most of this is usually done automatically for us. Take for example youtube.com A client clicks the link to stream a video, when they click the link the request is sent to the server. The server recieves this and begins to send out the information requested. You seem to want to know what information is in the request packet. This explains the layout of a UDP request packet udp packet structure. So you see here there is no authentication feild in the packet. You could in theory construct your own but it's somewhat pointless. If you are interested in working with sockets and packets at the programming level that would also give you a better grasp on how they work and why. Python has great and easy networking capabilities that could help you set up a simple server and client architecture so you could run some experiments. If your main concern is what goes in the request packet the link provided in this post shows exactly what is inside a UDP request packet. If this gives you any thoughts or questions I'm glad to try and elaborate more.

predator78 22 Junior Poster

That would probably depend on what you are sending. What services does the server have that you will be sending out in UDP? Are you building your own sockets as an experiment? Are you providing voice over ip? Are you streaming video? I would have to know what you are trying to accomplish first. You say you want to know what the request is but you should already know. What is your client requesting then you can examine it at the the protocol levels.

predator78 22 Junior Poster

If you are very intent on doing this there may possibly be some extreme algorithms that you could set up in the stream of UDP packets where as they might attempt to authenicate, or realize the order they are being sent in. But to be honest that defeats the purpose of what they are being used for. If you need it secured that badly send it in tcp packets instead, example client first downloads the information in a secure connection and then they can use it when it's done downloading. If you need real-time though UDP is your freind and it can be done securely as mentioned.

predator78 22 Junior Poster

That is the point exactly. There will be no authentication done with the UDP packets. The authentication should be handled some where else before you start sending UDP packets if they are indeed that important to be secured. In fact if you try to authenicate the packets you will be setting yourself up for problems. If the packet that's authenticating doesn't reach the destination then the person it was intended for will be "shutdown". UDP packets will not authenicate, that should be the job of something else. If the client can't authenicate to the server simply do not send the information. If they can then there is no problem. I'll repeat it once more to get the point across UDP packets will not authenicate they are simply requested for and then sent in a stream, in real time for like video, voice, things of this nature.

predator78 22 Junior Poster

Depends on if you want to build a calculator to do this or simply use c++ as the calculator and produce an answer for you. A calculator is a great project for learning. I'm currently working on a small text based (for now anyway) card game and have learned much already. Just the writing of code sometimes gets you more familiarised with a language. To start make a few variables, and then preform the mathmatics on them, and have it print the results to the screen. If you don't know how try starting here tutorial.
Is a great tutorial I learned a great deal from it. They also have great refrences on libraries.

predator78 22 Junior Poster

Ok yes that makes much more sence. The fact of the matter is that you can't be sure the packet will ever reach it's destination with UDP. So your solution will have to be either to authenticate with tcp and then use UDP protocol. Or a better solution would be a diffrent method of authenication all together before a user ever reaches the network, then all of your information will be in a secure state before, during, and even after the trasmission. Think of even a very suttle approach, if you encrypt the data to be sent on the machine it's being sent from, then send it out even if someone intersepts it it will be worthless to them depending on the strength of encryption. Ok now we have that it place we have one layer of security. All of our data is wrapped up in a nice encryption. Now lets take it a step further and look at the network design. The line is coming in and what does it hit first? I really hope our firewalls are in place here. There is another layer. What comes next? All incoming requests are sent to the authentication server everything from the user to network handshake, and packet examination can be done here. Depending on the level of security needed the authentication server may or may not be a part of the main network. So what happens exactly at our authentication server? Well the user logs in and if the login …

predator78 22 Junior Poster

Remind the administrator that messages going down the line are like vehicles on the road. Sometimes in order to speed some things up you have to slow others down. If all your clients are fighting to get to the mainline all at once, well there is your bottleneck. If they wait patiently like a queue and slowly work thier way to it once they get there it's all open road baby!!!

predator78 22 Junior Poster

Sounds like a possible bottleneck somewhere but the architecture of the network would have to be known to examine if this could be the cause or not. Could also check the routers to be sure the proper protocols and schemes are being used for efficiently. And yeah sure you can alway add more lines if you have the money but if you aren't using what you have efficiently why would one assume when you get more you will be in a better spot.

predator78 22 Junior Poster

I think you are a bit confused. First of all you say you need network security, what exactly for? If you just need security for your personal pc then use your firewalls or run virtual pc when you are surfing the internet. UDP packets are hardly unreliable they are very efficient at what they do. The reason you may want to discard packets is because if there is some kind of delay you don't want to wait for the information. UDP will try to fill in the missing peices the best it can and move on, for instance if you have ever streamed live video over the network and notice a little blip that's because information was lost but the video continues to play reguardless. As far as the flow of request, it should not matter you don't need to check it. A request is made and packets start coming through if some errors are made like I said it will attempt to fix very quickly but it shouldn't get carried away cause the next packet is already arriving.

predator78 22 Junior Poster

IMHO both take a similar personality to preform the tasks that the jobs would consist of.

Database
--------
Troubleshooting and lots of patience
Extreme attention to detail
Will work with some hardware but probably mostly dealing with software
You will probably not be rewarded for things working only called out when they are not
Probably will not need to be as genius with numbers as a networker depending on the type of database you are working with
If the database goes down it should be the networkers job to unsure your backups are implimented so you can rest easy while the buck is passed to him in this situation

Network
-------
Troubleshooting and lots of patience
Extreme attention to detail
Will work with both hardware and software on a regular basis
You will probably not be rewarded for things working only called out when they are not
Need to have excellent math skills
Most likely resposible for any problems with the network including connectivity, outages, security. If you specialize in security you could be looking at a healthy paycheck.

predator78 22 Junior Poster

Well what direction do you want it to move and when? You should only have to specify an offset for your new location. For example (x+1),(y+0). Beyond that I believe we may have to take a look at your code to see what you are trying to achieve.

predator78 22 Junior Poster

Those are the coordinates you need to set for a traingle. Most graphical programs use an x,y coordinate system like so.
|-----------------x
|(0,0) (1,0) (2,0)
|(0,1) (1,1) (2,1)
|(0,2) (1,2) (2,2)
y

A triangle can be described as 3 points or this may also suprise you but possibly 4 points. If we start our triangle at (0,0), next draw a line to (0,2), then a line to (2,2), to finish we draw a line back to (0,0).

predator78 22 Junior Poster

It's hard to tell without seeing the exact page and code your using what the problem is. If there is an issue with providing that information I would suggest doing what you seem to have done already again which is to navigate the sight manually first and take good note of how you are reaching the page you are requesting. Is it some sort of popup? Is it possible you need to keep track of cookies? etc...etc...

predator78 22 Junior Poster
predator78 22 Junior Poster

Well... Being overly generous to the pyschopath side, I got a 5.

I do know a friend who would probably get like a 20-30 at least, however.

Haha I have a few freinds like this. I think the pathological lying should have a higher scoring limit than 2. My one buddies believes his lies so much he is physchotic on this fact alone :D.

predator78 22 Junior Poster

Does profile or anything below it match the spacing above it? Looks a little off to me. The r in profile is under the # in the line above it.

predator78 22 Junior Poster

That is exactly where the problem is look directly above that line buddy :).

predator78 22 Junior Poster

29, I didn't break the 30-40 mark. Booyah!

Only a true phsycho could be that proud of the acheivement please add 5 to your score plz. lol.

predator78 22 Junior Poster

Depending on the page you probably need to login to fb first before you can access that page.

VulcanDesign commented: Thanks for the help! +2
predator78 22 Junior Poster

24 possible I lied on a few or wasn't completely honest. I also have an inflated ego so I take alot of pride in creeping up close to physchoticism. Although I don't wanna get caught either so I may attempt to change my story or manipulate anyone sexually or otherwise that tries to punish me for the crime of being a little unstable.

predator78 22 Junior Poster

Think about the words though. Did you change the tuple? Or did you change the item at index of?

predator78 22 Junior Poster

Try putting it in the path manually?

predator78 22 Junior Poster

Indeed you will have to trace it back because it's not generating it in that module.

predator78 22 Junior Poster

I think you might be correct tonyjv, but in the same sence sometimes it's for educational purposes to. I can only see 2 reasons to want to do this and one is educational the other is malicious. Just remember if you send a file like that to anyone you might be sitting in a cell for a long period of time for a silly little experiment.

predator78 22 Junior Poster

What module is generating the error? Once you know that then you know to change that module to not be recursive if it is exceeding the limit.