473,378 Members | 1,372 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Securing socket server

Where can I find information on how to secure a socket server? I'd like to
implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.
Nov 16 '05 #1
3 869
HI Juan,

Always authenticate the client first, and if possible try to restrict the
IP sources other than that there is nothing much you can do to avoid a
hacker to connect to your server.
You can use a couple of techniques to try to minimize the possible
ocurrence of a break in, for example disconnect the client if an unknow
command is received (I do this) or if you know that no more than a certain
numbers of clients will connect at the same time you can control how manies
connection are live at the same time. Also if the protocol you defined is
text in the ruotine where you get the command check if the receiving string
is sending a command bigger than your limit, if so drop the conneciton.

Hope this help,

--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"Juan" <ju*****************@ANTISPAMhotmail.com> wrote in message
news:eo**************@TK2MSFTNGP10.phx.gbl...
Where can I find information on how to secure a socket server? I'd like to
implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.

Nov 16 '05 #2
Yes, and in addition, maintain a blacklist. If a particular client IP
address trys to execute an invalid command or tries to connect multiple
times simultaneously [in an attempt to overwhelm your system], drop the
connection and store that IP address in a Hashtable somewhere so that all
future connection attempts from that IP will be dropped.

"Ignacio Machin ( .NET/ C# MVP )" <ignacio.machin AT dot.state.fl.us> wrote
in message news:en*************@TK2MSFTNGP09.phx.gbl...
HI Juan,

Always authenticate the client first, and if possible try to restrict the
IP sources other than that there is nothing much you can do to avoid a
hacker to connect to your server.
You can use a couple of techniques to try to minimize the possible
ocurrence of a break in, for example disconnect the client if an unknow
command is received (I do this) or if you know that no more than a certain
numbers of clients will connect at the same time you can control how manies connection are live at the same time. Also if the protocol you defined is
text in the ruotine where you get the command check if the receiving string is sending a command bigger than your limit, if so drop the conneciton.

Hope this help,

--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"Juan" <ju*****************@ANTISPAMhotmail.com> wrote in message
news:eo**************@TK2MSFTNGP10.phx.gbl...
Where can I find information on how to secure a socket server? I'd like to implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.


Nov 16 '05 #3
Thanks, those measures make a lot of sense... I also want to encrypt the
password for transmission... any resources I can use on how to do this?

Juan.
"David Sworder" <Gi********@CSILasVegas.com> escribió en el mensaje
news:OU**************@TK2MSFTNGP12.phx.gbl...
Yes, and in addition, maintain a blacklist. If a particular client IP
address trys to execute an invalid command or tries to connect multiple
times simultaneously [in an attempt to overwhelm your system], drop the
connection and store that IP address in a Hashtable somewhere so that all
future connection attempts from that IP will be dropped.

"Ignacio Machin ( .NET/ C# MVP )" <ignacio.machin AT dot.state.fl.us> wrote in message news:en*************@TK2MSFTNGP09.phx.gbl...
HI Juan,

Always authenticate the client first, and if possible try to restrict the
IP sources other than that there is nothing much you can do to avoid a
hacker to connect to your server.
You can use a couple of techniques to try to minimize the possible
ocurrence of a break in, for example disconnect the client if an unknow
command is received (I do this) or if you know that no more than a certain numbers of clients will connect at the same time you can control how manies
connection are live at the same time. Also if the protocol you defined is text in the ruotine where you get the command check if the receiving

string
is sending a command bigger than your limit, if so drop the conneciton.

Hope this help,

--
Ignacio Machin,
ignacio.machin AT dot.state.fl.us
Florida Department Of Transportation

"Juan" <ju*****************@ANTISPAMhotmail.com> wrote in message
news:eo**************@TK2MSFTNGP10.phx.gbl...
Where can I find information on how to secure a socket server? I'd

like to implement the necessary measures to avoid hackers attacks and to
authenticate the clients...

thanks,
Juan.



Nov 16 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
by: Juan | last post by:
Where can I find information on how to secure a socket server? I'd like to implement the necessary measures to avoid hackers attacks and to authenticate the clients... thanks, Juan.
4
by: zbcong | last post by:
Hello: I write a multithread c# socket server,it is a winform application,there is a richtextbox control and button,when the button is click,the server begin to listen the socket port,waiting for a...
2
by: zhebincong | last post by:
Hello: I write a multithread c# socket server,it is a winform application,there is a richtextbox control and button,when the button is click,the server begin to listen the socket port,waiting...
4
by: Chris Tanger | last post by:
Context: C# System.Net.Sockets Socket created with constructor prarmeters Internetwork, Stream and TCP everything else is left at the default parameters and options except linger may be changed...
11
by: Wm. Scott Miller | last post by:
Hello all! We are building applications here and have hashing algorithms to secure secrets (e.g passwords) by producing one way hashes. Now, I've read alot and I've followed most of the advice...
2
by: Rene Sørensen | last post by:
We are 4 students working on a assignment, that our teacher gave use, normally we do this is C++, but the 4 of us, use C# more often that C++ so… We made a small games called reversi, now our job...
8
by: Sharon | last post by:
Hi all. How can i secure socket communications? Is it possible to use ssl? Thanks, Sharon.
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.