Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar Mark Forums Read
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 07-20-2005, 04:29 PM   #1
Paul Waters
Confirmed User
 
Paul Waters's Avatar
 
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
Can Use of a Proxy Server be Detected?

The password sharing sites recommend use of a specified proxy server to avoid detection by ip logging.

Can it be done?

Or is there an database of proxy servers that can be obtained and maintained?

Thanks
__________________


Paul
Paul Waters is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:30 PM   #2
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
http://tor.eff.org/
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:35 PM   #3
Paul Waters
Confirmed User
 
Paul Waters's Avatar
 
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
Quote:
Originally Posted by azguy
It was this link in another thread that motivated me to post.

I want to control access to a pay site by ip or ip range. I want to reject anything coming through a proxy (or an onion) because it is a hole an entire country could come through.

I know I have to consider people travelling, but that is another issue.

Cheers
__________________


Paul
Paul Waters is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:43 PM   #4
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Quote:
Originally Posted by Paul Waters
It was this link in another thread that motivated me to post.

I want to control access to a pay site by ip or ip range. I want to reject anything coming through a proxy (or an onion) because it is a hole an entire country could come through.

I know I have to consider people travelling, but that is another issue.

Cheers
Nope, they usually use anonymous proxies that don't even tell you it's a proxy. Unless you maintain your own blacklists - it's nearly impossible.
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:45 PM   #5
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Quote:
Originally Posted by Paul Waters
It was this link in another thread that motivated me to post.

I want to control access to a pay site by ip or ip range. I want to reject anything coming through a proxy (or an onion) because it is a hole an entire country could come through.

I know I have to consider people travelling, but that is another issue.

Cheers
And there is no point in obtaining any databases, because proxies usually last a day or two anyway.. New ones are found every second and posted on various locations, you won't be able to keep up with that.
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:47 PM   #6
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Instead, spend your resources on protecting your member area better... there are no ways around it.
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:49 PM   #7
High Plains Drifter
Confirmed User
 
High Plains Drifter's Avatar
 
Join Date: Jun 2005
Location: ♠ ♣ ♥
Posts: 2,341
you could have a script that attempted a client proxy connection on the surfer's IP using well known proxy ports (8000, 8080, etc)... this would weed out most of the proxy traffic, but not something like the Tor network.
__________________
High Plains Drifter is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:50 PM   #8
Paul Waters
Confirmed User
 
Paul Waters's Avatar
 
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
Quote:
Originally Posted by azguy
Instead, spend your resources on protecting your member area better... there are no ways around it.
How do you protect a member area against password sharing?
__________________


Paul
Paul Waters is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:51 PM   #9
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Quote:
Originally Posted by skinnywussy
you could have a script that attempted a client proxy connection on the surfer's IP using well known proxy ports (8000, 8080, etc)... this would weed out most of the proxy traffic, but not something like the Tor network.
There are over 20 of them. It used to be the usual 3128, 8080, 1080 crap.. now you see 28882, 4440, and the list goes on. I don't think users will like porn sites attempting to connect to their computer.. there are enough myths about this industry
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:53 PM   #10
High Plains Drifter
Confirmed User
 
High Plains Drifter's Avatar
 
Join Date: Jun 2005
Location: ♠ ♣ ♥
Posts: 2,341
Quote:
Originally Posted by azguy
There are over 20 of them. It used to be the usual 3128, 8080, 1080 crap.. now you see 28882, 4440, and the list goes on. I don't think users will like porn sites attempting to connect to their computer.. there are enough myths about this industry
Yeah, you could could cycle through all the ports, nmap style, if you really wanted to... but, as you say, its probably not a good idea.
__________________
High Plains Drifter is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:55 PM   #11
Alky
Confirmed User
 
Alky's Avatar
 
Join Date: Apr 2002
Location: Houston
Posts: 5,651
Quote:
Originally Posted by skinnywussy
Yeah, you could could cycle through all the ports, nmap style, if you really wanted to... but, as you say, its probably not a good idea.
do you know how unrealistic that is? are you really serious?
Alky is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:56 PM   #12
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Quote:
Originally Posted by Paul Waters
How do you protect a member area against password sharing?
It's very simple and I don't understand how after 10 years companies still deal with this shit.

1. User signs up, password must be 8 chars or longer with at least 1 digit
2. Spend some $$ on a real programmer and come up with a simple, yet very useful, pattern recognition utility that will monitor user activity and detect irregular IP changes, browsers, cookie data. It's not hard.
3. Once the software detects unusual activity, disable the freakin account and send further instructions on re-activating it to the user's email.
4. Get rid of freakin Basic Authentication..
5. Have your login be form-based and implement a Turing test.
6. Ask yourself why it took you 10 years to figure this out lol
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:58 PM   #13
Alky
Confirmed User
 
Alky's Avatar
 
Join Date: Apr 2002
Location: Houston
Posts: 5,651
Quote:
Originally Posted by azguy
2. Spend some $$ on a real programmer and come up with a simple, yet very useful, pattern recognition utility that will monitor user activity and detect irregular IP changes, browsers, cookie data. It's not hard.
all that is overkill... if X amount of ip's login with in Y amount of time = disable
Alky is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 04:59 PM   #14
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Quote:
Originally Posted by Alky
all that is overkill... if X amount of ip's login with in Y amount of time = disable
Not true... trust me. There are forums out there that instruct people to connect to the members' area using a SPECIFIC PROXY only.
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 05:06 PM   #15
High Plains Drifter
Confirmed User
 
High Plains Drifter's Avatar
 
Join Date: Jun 2005
Location: ♠ ♣ ♥
Posts: 2,341
Quote:
Originally Posted by Alky
do you know how unrealistic that is? are you really serious?
I guessed you missed the last four words of the post that said NOT A GOOD IDEA. I was thinking of ways to identify a proxy, not specifically for this scenerio.
__________________
High Plains Drifter is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 05:08 PM   #16
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
Proxies will always be here in one form or another.. especially when the EFF themselves push anonymity technologies
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 05:09 PM   #17
azguy
Confirmed User
 
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
I just set up my 5th box on the Tor network This one is in Argentina. I'm blocking ports that can be abused easily, such as 25.
azguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 05:10 PM   #18
Paul Waters
Confirmed User
 
Paul Waters's Avatar
 
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
Quote:
Originally Posted by azguy
It's very simple and I don't understand how after 10 years companies still deal with this shit.

1. User signs up, password must be 8 chars or longer with at least 1 digit
2. Spend some $$ on a real programmer and come up with a simple, yet very useful, pattern recognition utility that will monitor user activity and detect irregular IP changes, browsers, cookie data. It's not hard.
3. Once the software detects unusual activity, disable the freakin account and send further instructions on re-activating it to the user's email.
4. Get rid of freakin Basic Authentication..
5. Have your login be form-based and implement a Turing test.
6. Ask yourself why it took you 10 years to figure this out lol
I was about 80% here. Automatically sending the email with re-activating instructions is something I didn't think of. Thank you!

__________________


Paul
Paul Waters is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-20-2005, 05:59 PM   #19
4Pics
Confirmed User
 
Industry Role:
Join Date: Dec 2001
Posts: 7,952
I think getting strongbox will save you a lot of time and headache.
4Pics is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks
Thread Tools



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.