Re:

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Then it becomes impossible to know if a page REALLY exists or if my emails are going where intended, or coming from where stated... so am I to assume that traffic addressing in general has FAILED?


See us online at http://www.LOVEnCompany.com.

---------- Original Message ----------
From: Kaya Saman <SamanKaya@xxxxxxxxxxxx>
To: users@xxxxxxxxxxxxxxxx
Subject: Re:
Date: Wed, 11 Nov 2009 14:54:31 +0200

André Warnier wrote:
> Stephen Love wrote:
>> Ok, now we're getting somewhere... just ENOUGH to eliminate the path
>> inbetween... I'd just like to ask APACHE for a unique signature of
>> the machine sending the message to compare it against others. Nothing
>> more, nothing less.
>>
>>
>> See us online at http://www.LOVEnCompany.com.
>>
> Well, it looks like this list already gave you all the possible
> human-level help. If that does not solve your problem, maybe you
> should ask for some higher-level intervention.
>
>
>
Please check the OSI systems stack for further information which is
directly compatible with the TCP/IP system's stack - in fact it's kind
of an expanded version that all network engineers use!!

Basically in the underlying network components you have physical, media
access, and network layers (1-3); layers 4-7 usually deal with the
computers themselves which start from ports and go to the apps themselves.

Now layer 2, at least true for Ethernet means that the MAC address of
the system is only point to point between machine and switch port, after
that things change. Layer 3 is convoluted by the intervention of NAT or
proxy so the only thing you are likely to get is the WAN IP address of
the network.

Unique identifiers are impossible, even using Cisco's proprietary CDP
(cisco discovery protocol) which discoverers neighboring Cisco devices
cannot go beyond next hop device as uses layer 2 addressing as reference!!!

The only way I suppose in theory one could do what you are after is for
the user to download a little app that has a unique signature and
broadcasts the full system info according to that. So at least with the
client part of the program you could have say 1 x 10^50 unique
signatures generated by a shell script or program then link them to a
server somewhere...... I do believe this is called spyware though and is
highly illegal!!!

In all honesty I think the best way is going through webalizer, GeoIP,
awstats, or Ntop!!! And if going through reverse proxy with Squid like
me; unlike me you can form the logs of Squid in a different way and
hence forward those to Apache, then get Apache to read those 'different'
logs so that you have the correct data collection available to you........
As far as I know of this would be about the only way to go! At least you
get the WAN IP of the remote network and can collect and collate
geographic locational information and also ISP info too :-)

Without using divine power or alien intervention.......


---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
  "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx

____________________________________________________________
Weight Loss Program
Best Weight Loss Program - Click Here!


[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux