473,511 Members | 17,164 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Securing socket server

Where can I find information on how to secure a socket server? I'd like to
implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.
Nov 16 '05 #1
3 2182
HI Juan,

Always authenticate the client first, and if possible try to restrict the
IP sources other than that there is nothing much you can do to avoid a
hacker to connect to your server.
You can use a couple of techniques to try to minimize the possible
ocurrence of a break in, for example disconnect the client if an unknow
command is received (I do this) or if you know that no more than a certain
numbers of clients will connect at the same time you can control how manies
connection are live at the same time. Also if the protocol you defined is
text in the ruotine where you get the command check if the receiving string
is sending a command bigger than your limit, if so drop the conneciton.

Hope this help,

--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"Juan" <ju*****************@ANTISPAMhotmail.com> wrote in message
news:eo**************@TK2MSFTNGP10.phx.gbl...
Where can I find information on how to secure a socket server? I'd like to
implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.

Nov 16 '05 #2
Yes, and in addition, maintain a blacklist. If a particular client IP
address trys to execute an invalid command or tries to connect multiple
times simultaneously [in an attempt to overwhelm your system], drop the
connection and store that IP address in a Hashtable somewhere so that all
future connection attempts from that IP will be dropped.

"Ignacio Machin ( .NET/ C# MVP )" <ignacio.machin AT dot.state.fl.us> wrote
in message news:en*************@TK2MSFTNGP09.phx.gbl...
HI Juan,

Always authenticate the client first, and if possible try to restrict the
IP sources other than that there is nothing much you can do to avoid a
hacker to connect to your server.
You can use a couple of techniques to try to minimize the possible
ocurrence of a break in, for example disconnect the client if an unknow
command is received (I do this) or if you know that no more than a certain
numbers of clients will connect at the same time you can control how manies connection are live at the same time. Also if the protocol you defined is
text in the ruotine where you get the command check if the receiving string is sending a command bigger than your limit, if so drop the conneciton.

Hope this help,

--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"Juan" <ju*****************@ANTISPAMhotmail.com> wrote in message
news:eo**************@TK2MSFTNGP10.phx.gbl...
Where can I find information on how to secure a socket server? I'd like to implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.


Nov 16 '05 #3
Thanks, those measures make a lot of sense... I also want to encrypt the
password for transmission... any resources I can use on how to do this?

Juan.
"David Sworder" <Gi********@CSILasVegas.com> escribió en el mensaje
news:OU**************@TK2MSFTNGP12.phx.gbl...
Yes, and in addition, maintain a blacklist. If a particular client IP
address trys to execute an invalid command or tries to connect multiple
times simultaneously [in an attempt to overwhelm your system], drop the
connection and store that IP address in a Hashtable somewhere so that all
future connection attempts from that IP will be dropped.

"Ignacio Machin ( .NET/ C# MVP )" <ignacio.machin AT dot.state.fl.us> wrote in message news:en*************@TK2MSFTNGP09.phx.gbl...
HI Juan,

Always authenticate the client first, and if possible try to restrict the
IP sources other than that there is nothing much you can do to avoid a
hacker to connect to your server.
You can use a couple of techniques to try to minimize the possible
ocurrence of a break in, for example disconnect the client if an unknow
command is received (I do this) or if you know that no more than a certain numbers of clients will connect at the same time you can control how manies
connection are live at the same time. Also if the protocol you defined is text in the ruotine where you get the command check if the receiving

string
is sending a command bigger than your limit, if so drop the conneciton.

Hope this help,

--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"Juan" <ju*****************@ANTISPAMhotmail.com> wrote in message
news:eo**************@TK2MSFTNGP10.phx.gbl...
Where can I find information on how to secure a socket server? I'd

like to implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.



Nov 16 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
256
by: Juan | last post by:
Where can I find information on how to secure a socket server? I'd like to implement the necessary measures to avoid hackers attacks and to authenticate the clients... thanks, Juan.
4
7069
by: zbcong | last post by:
Hello: I write a multithread c# socket server,it is a winform application,there is a richtextbox control and button,when the button is click,the server begin to listen the socket port,waiting for a...
2
26482
by: zhebincong | last post by:
Hello: I write a multithread c# socket server,it is a winform application,there is a richtextbox control and button,when the button is click,the server begin to listen the socket port,waiting...
4
18087
by: Chris Tanger | last post by:
Context: C# System.Net.Sockets Socket created with constructor prarmeters Internetwork, Stream and TCP everything else is left at the default parameters and options except linger may be changed...
11
3405
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
2
2864
by: Rene Sørensen | last post by:
We are 4 students working on a assignment, that our teacher gave use, normally we do this is C++, but the 4 of us, use C# more often that C++ so… We made a small games called reversi, now our job...
8
6340
by: Sharon | last post by:
Hi all. How can i secure socket communications? Is it possible to use ssl? Thanks, Sharon.
0
7245
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
7144
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
7356
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
1
7085
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
7512
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
1
5069
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
3227
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
1577
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
0
449
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.