How Middleboxs Identify Proxy Traffics

Abstract There is no absolute safe disguise, all protocols have risks of detected. Common attack made by middle box Passive analysis (Traffic characteristic, PoC vulnerability) Usually use for plain text protocol or TLS handshake. Active analysis Usually use for Shadowsocks, V2Ray, TLS v1.3 (obtian svers’s SSL certificate) replay package Some obvious charecteristics of proxy traffic. Long connection Most HTTP traffic is short connection. bidireaction flow 99% of Web traffic(HTTP) is one-way flow, which is a group of request match a group of response, few website use websocket. ...

October 22, 2022 · 4 min · 820 words · Coia

Nginx pid error fix

If you use systemctl status nginx to check nginx status you may find a pid error appear on status panel. The words that appear may be : Can't open PID file /run/nginx.pid (yet?) after start: Operation not permitted Or Can't open PID file /var/run/nginx.pid (yet?) after start: No such file or directory This is becasue the pid file not generate before the nginx booted. The solution is to add following sentence into /usr/lib/systemd/system/nginx.service, it will let nginx wait 0.1s before executing the executable. ...

October 21, 2022 · 1 min · 104 words · Mr.W

Project Objectives: The project goal is is to benchmark Redis database in different architecture environments, analyze the performance differences and find the root cause of the components and class that cause the performance issue of riscV. Provides reference for optimization options for future servers based on the Risc V architecture. Outcome: The outcome will be a comprehensive report including list of the potencial performance bottleneck points and optimization advisements. This document will help future developers to optimize the performance of RiscV architecture servers and improve overall operating efficiency. ...

1 min · 209 words · Mr.W

Archives

archives

0 min · 0 words · Mr.W

Search

search

0 min · 0 words · Mr.W