[Dxspider-support] Node verification

Kin ea3cv at cronux.net
Mon Feb 10 13:22:09 GMT 2025


Mike,

That is unfeasible. 
It would first require the cooperation of the vast majority of sysops, and
even then, the logs would have to be centralised for a time domain analysis.
It can't be done.
If it is easier to update the nodes and knowing the problems we have, only
35% of the spiders have been updated. This is unacceptable.

Kin

-----Mensaje original-----
De: Dxspider-support <dxspider-support-bounces at tobit.co.uk> En nombre de
Mike McCarthy, W1NR via Dxspider-support
Enviado el: lunes, 10 de febrero de 2025 13:54
Para: Stephen Atkins via Dxspider-support <dxspider-support at tobit.co.uk>
CC: Mike McCarthy, W1NR <lists at w1nr.net>
Asunto: [Dxspider-support] Node verification

I think I have a simple way to verify a node connection from hijacking. 
If every node that generates spots must have a DNS address, checking the DNS
IP to the IP of the connecting node when it connects would be a much simpler
way of verifying a node without changing network protocols or even requiring
passwords.

--
73 de Mike, W1NR

THAT was the equation. EXISTENCE!... SURVIVAL... must cancel out... 
programming!

- Ruk -


_______________________________________________
Dxspider-support mailing list
Dxspider-support at tobit.co.uk
https://mailman.tobit.co.uk/mailman/listinfo/dxspider-support




More information about the Dxspider-support mailing list