technote:security_linux
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
technote:security_linux [2025/10/03 02:38] – [Connection Handling Strategy] Scott Cunliffe | technote:security_linux [2025/10/03 03:00] (current) – [TapeTrack Server: Anti-Throttle and Anti-Hacking Measures] Scott Cunliffe | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== Server: Anti-Throttle and Anti-Hacking ====== |
===== Protocol Overview ===== | ===== Protocol Overview ===== | ||
Line 20: | Line 20: | ||
===== Advanced Linux Integration: | ===== Advanced Linux Integration: | ||
- | On Linux systems, TapeTrack can integrate with **eBPF** for kernel-level IP blocking. | + | On Linux systems, TapeTrack can integrate with eBPF for kernel-level IP blocking. |
To enable this: | To enable this: | ||
* Start the server with the `-B` argument and a pointer to a preloaded eBPF table. | * Start the server with the `-B` argument and a pointer to a preloaded eBPF table. | ||
- | * TapeTrack will dynamically | + | * TapeTrack will dynamically add/remove IPs from the table during the time-out period. |
- | * If enabled, connections from banned IPs will be **blocked at the kernel level**, preventing any interaction with the TapeTrack Server. | + | * If enabled, connections from banned IPs will be blocked at the kernel level, preventing any interaction with the TapeTrack Server. |
===== Further Reading ===== | ===== Further Reading ===== | ||
- | For setup instructions and eBPF integration steps, refer to the [[technote: | + | For setup instructions and eBPF integration steps, refer to the [[technote: |
- | {{tag>tapetrack | + | {{tag> |
technote/security_linux.1759459088.txt.gz · Last modified: 2025/10/03 02:38 by Scott Cunliffe