![]() The Linux Kernel and its modules (Netfilter) are much more reliable, competent and effective to treat these kind of tasks. No one will do a best job regarding this task, than the Kernel of you Operating System (hoping that you're using a Nix-like OS). Do not let application handle this task, at least on a Production environment. Traffic must be treated at the Network Layer of your Operating System.Use a Virtual Private Network (VPN) Using a VPN is arguably the best and most convenient method available today for hiding your real IP address and its accompanying online activities from prying eyes. If you don't have a Firewall running on your server, you should configure it. In this section, I’ll discuss four methods you can use to hide your IP address, as well as the pros and cons of each. To deny/allow traffic, from any source to specific ports, it's a job for the Firewall of the Operating System, on the Network Layer of its Kernel. Incoming traffic/packets, firstly, they pass through the analysis of the Kernel of your Operating System. Considering that you're using a Nix-like OS, you can deny/allow incoming connections using Netfilter via IPTABLES, with rules like these. $ /sbin/iptables -A INPUT -dport 80 -j REJECTĪlthough you can easily achieve the expected result via Flask (as pointed out on the elected answer), this kind of issue should be treated at the Network Layer of the Operating System. Open the Tor browser and use it like your regular browser, knowing your real IP address is hidden. Click on the download file and follow the installation instructions. Doing so will make it seem like the VPN server's IP address is your own. Using this method, you can connect through an external server. $ /sbin/iptables -A INPUT -s your_ip_address -dport 80 -j DROP Go to the Tor website and download the installation file for your device. The most discrete way to vanish from your Internet Service Provider's or (ISP's), government's, advertisers', or hackers' sights is using a VPN or Virtual Private Network. Here's something presented on many forums, which allows localhost traffic + external access to your Flask app from your_ip_address, but reject all traffic from other IP address: $ /sbin/iptables -A INPUT -i lo -j ACCEPT This IPTABLES/Netfilter rule will attend your need, dropping all incoming traffic, EXCEPT the traffic originated from your_ip_address to port 80: $ /sbin/iptables -A INPUT -s ! your_ip_address -dport 80 -j DROP
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |