On Wed, 15 Oct 2014 20:22:56 -0400
Ian Grant wrote:

> Moved to misc.
> 
> Yes, you missed something: the point :-)
> 
> The idea is that the existence of this entire 'ultranet' is
> undetectable by even someone snooping all national traffic. So a TCP
> port 80 connection looks to the snooper _exactly_ like an HTTP
> connection handshake. Only the ISN and the source address mark the
> connection as 'ultra' and take it into a back room where it connects
> to the real network. If the snooper tries to connecto to that port
> they the same HTTP service that all the other muggles see.

I still don't see the benefit though but do see added complexity or
more code to audit.

Reducing DDOS against a visible SSH service maybe? Reduce password
attempts on your logs allowing them to go after targets that might
actually use passwords (port change also works there, I find)?

Reply via email to