Readit News logoReadit News
halb commented on Implementing fast TCP fingerprinting with eBPF   halb.it/posts/ebpf-finger... · Posted by u/halb
b0a04gl · 2 months ago
why do fingerprinting always happens right at connection start ,usually gives clean metadata during tcp syn. but what is it for components like static proxies or load balancers or mobile networks ,all of these can shift stack behavior midstream. this can make this activity itself a obsolete
halb · 2 months ago
This is a good point. I guess that if you have the luxury of controlling the front-end side of the web application you can implement a system that polls the server routinely. Over time this will give you a clearer picture. You can notice that most real-world fingerprint systems run in part on the Javascript side, which enables all sort of tricks.
halb commented on Implementing fast TCP fingerprinting with eBPF   halb.it/posts/ebpf-finger... · Posted by u/halb
OutOfHere · 2 months ago
If it's making a legitimate request, it's not an automated attack. If it's exceeding its usage quota, that's a simple problem that doesn't require eBPF.
halb · 2 months ago
What kind of websites do you have in mind when I talk about fraud patterns? not everything is a static website, and I absolutely agree with you on that point: If your static website is struggling under the load of a scraper there is something deeply wrong with your architecture. We live in wonderful times, Nginx on my 2015 laptop can gracefully handle 10k Requests per second before I even activate ratelimiting.

Unfortunately there are bad people out there, and they know how to write code. Take a look at popular websites like TikTok, amazon, or facebook. They are inundated by fraud requests whose goal is to use their services in a way that is harmful to others, or straight up illegal. From spam to money laundering. On social medial, bots impersonate people in an attempt to influence public discourse and undermine democracies.

halb commented on Implementing fast TCP fingerprinting with eBPF   halb.it/posts/ebpf-finger... · Posted by u/halb
OutOfHere · 2 months ago
More useless and harmful anti-bot nonsense, probably with many false detections, when a simple and neutral rate-limiting 429 does the job.
halb · 2 months ago
I guess the blame is on me here for providing only a very brief context on the topic, which makes it sound like this is just anti-scraping solutions.

This kind of fingerprinting solutions are widely used everywhere, and they don't have the goal of directly detecting or blocking bots, especially harmless scrapers. They just provide an additional datapoint which can be used to track patterns in website traffic, and eventually block fraud or automated attacks - that kind of bots.

halb commented on Websites are tracking you via browser fingerprinting   engineering.tamu.edu/news... · Posted by u/gnabgib
halb · 2 months ago
This is a problem because unlike cookies, that are tied to specific domains and isolated by security boundaries, fingerprints can be computed across any domain. It's easy to imagine how a website that tracks users and serves ads solely using fingerprints could be exploited to gain informations about a victim, simply by collecting their fingerprint.
halb commented on Browser spec to eventually replace GDPR and cookie banners   w3c.github.io/gpc/#abstra... · Posted by u/BostonFern
halb · 7 months ago
Finally, a better alternative to the do-not-stab header https://www.5snb.club/posts/2023/do-not-stab/

u/halb

KarmaCake day232March 28, 2023
About
https://halb.it
View Original