Welcome, Guest. Please login or register.

Author Topic: TCP stack monitoring program?  (Read 1717 times)

Description:

0 Members and 1 Guest are viewing this topic.

Offline Thematic

  • Jr. Member
  • **
  • Join Date: Aug 2003
  • Posts: 69
    • Show all replies
Re: TCP stack monitoring program?
« on: September 17, 2003, 09:38:23 PM »
I think MiamiDX has just what you are looking for either internally (accessible with scripts) or as facilities that external tools can analyse.
But restricting applications, as opposed to certain ports? Doesn't sound right, since these are typically done with user discriminations, and we know AmigaOS is meant to be singleuser.

At least I recall seeing something on Aminet relating to this - and specifically Miami Deluxe.

Anyway extensive monitoring programs are very hard/impossible to do feasibly with those stacks inferior to MiamiDX (low, device level is another matter). Therefore I am removed for using AmiTCP. Roadshow (v) me please! ;)
So you have the strings in your palm. Do you know what they are for?
 

Offline Thematic

  • Jr. Member
  • **
  • Join Date: Aug 2003
  • Posts: 69
    • Show all replies
Re: TCP stack monitoring program?
« Reply #1 on: September 18, 2003, 01:02:01 AM »
Firewall add-on applications hardly achieve the level of usability of a tcp/ip-stack that has it integrated from the start.

Yet this is sort of interesting, Amiga programs generally use either bsdsocket.library or TCP: device for the traffic. So you could not for instance let the TCP: device always have access, as that would be a security hole the size of Saturn. Which I think, leads to having a dual approach, the firewall program should intercept access both at the low- and high-level. Essentially a hack, I believe. Patching dos.library apart from having some extra wild stuff at bsdsocket.library, possibly even core parts of the operating system. Suppose every OpenLibrary() at it would be checked against the lists, and if it matches the "offender" list, it would be silently refused the library pointer with a zero returned, instead. In some cases, the program would just be silent about it as well, but likely it would give an error message, possibly in a requester. This would happen every time it was not granted access.

What of the logical device then? Mufs only works on filesystem devices I'm sure, so no help from there. Perhaps the ARexx scripts and whatnot, that require TCP: would have to be left out.

Detecting the programs is also tricky. As the task name more often than not depends on where a program was started from, it would be necessary to use wildcards. So how is the poor watchdog going to know the difference between yam, yam:yam and lyam? Somehow checking the starting/current directory of each program that tries to open a socket, would be very weird in my opinion. You would be tied to a certain installation path. So at the very least, the user would be swamped with configuration issues.

I haven't actually done these things personally but this is how I perceive it. May be too huge a task for one or two hobbyists to get done.

Also read the last paragraph from
So you have the strings in your palm. Do you know what they are for?