18点是什么时辰| 540是什么意思| 小孩子为什么老是流鼻血| 百褶裙搭配什么上衣| 验大便能查出什么| 总维生素d偏低会导致什么| 狮子座前面是什么星座| 肠粘连有什么症状| 规律宫缩是什么感觉| 女频是什么| 大白片是什么药| 五合是什么意思| 甲功三项查的是什么| 甜蜜素是什么东西| 旭五行属性是什么| 吃红枣有什么好处| 区长是什么级别的干部| 教育基金是什么意思| value是什么意思| 挂科有什么影响| 狗与什么属相相冲| 口苦口臭口干吃什么药| 过敏吃什么药最有效| 小囊性灶是什么意思| 南京市徽为什么是貔貅| 蒲公英泡水喝有什么效果| 干性皮肤适合什么牌子的护肤品| 鱼肝油又叫什么名字| 转氨酶偏高是什么原因引起的| 什么情况下做冠脉ct| 水落石出是什么意思| 四川为什么叫四川| 薄荷有什么功效和作用| 心阳虚吃什么药| 低筋面粉可以做什么| 肺部感染吃什么药| 喝温开水有什么好处| 酒后第二天吃什么| ykk是什么牌子| 怕冷又怕热是什么原因| 刷牙时牙酸是什么原因| 原生家庭什么意思| 频繁打喷嚏是什么原因| 白龙马是什么生肖| 什么可以美白牙齿| 夜盲吃什么维生素| 宝宝病毒感染吃什么药效果好| choice是什么意思| 势在必得是什么意思| 冰点是什么意思| M3什么意思| 卵巢多囊症是什么原因造成| 世界上有什么花| 八一建军节什么生肖| 引体向上练什么肌肉| 头发细软是什么原因| 腹泻吃什么水果| 甲状腺挂什么科室| 等闲之辈是什么意思| 什么样的风景| 揽子是什么意思| coupon什么意思| 澳门有什么好玩的地方| 吃脆骨有什么好处| 为什么癌症治不好| 开眼镜店需要什么设备| 三三两两是什么生肖| 产妇刚生完孩子适合吃什么| 无料案内所是什么意思| 肠胃炎吃什么抗生素| 八哥鸟吃什么饲料最好| 一什么麦子| 奶奶和孙女是什么关系| 文化传媒是干什么的| 黄标车是什么意思| 乳头为什么是黑的| 为什么姨妈会推迟| 青少年膝盖痛什么原因| 结节是什么原因引起的| 胎位lop是什么意思| 为什么会被鬼压床| 什么食物养肝护肝最好| 24小时动态脑电图能查出什么| 手心脚心热是什么原因| 什么人| 拔牙有什么危害| 欢喜是什么意思| 植树节是什么季节| 保肝护肝吃什么药好| 什么是烂桃花| 刑妻克子是什么意思| 快速补血吃什么| 死不瞑目是什么意思| 女生下体瘙痒用什么药| 运动出汗多是什么原因| 妇科炎症用什么药最好| 拉肚子吃什么饭| 老虎头是什么牌子衣服| ac是什么意思| 阿拉伯人属于什么人种| 蝉长什么样| 回乳是什么意思| 喉咙沙哑吃什么药| 矢气是什么意思| 血沉高是什么病| 月嫂下户是什么意思| kiki是什么意思| 葛根粉是什么| 脊髓炎吃什么药| 海水倒灌是什么意思| 海龟汤什么意思| 芒果与什么食物相克| 儿童嗓子哑了什么原因| 狰狞是什么意思| spiderman是什么意思| 男人下面流脓吃什么药| 护理专业主要学什么| 吃什么东西会误测怀孕| 姓陆的女孩取什么名字好| 什么是白内障症状| 纷纷扬扬是什么意思| 僵尸为什么怕糯米| 碳足迹是什么| loewe是什么意思| 唇周围长痘痘是什么原因| 吃中药不能吃什么东西| 热爱是什么意思| 属猴的和什么属相最配| 痔疮什么样子图片| 臭氧是什么味道| 咳嗽白痰吃什么好得快| hp是阳性什么意思| 屁股上有痣代表什么| 炼乳是什么做的| 2010年是什么生肖| 笑靥如花是什么意思| 平行宇宙是什么意思| 肚脐眼左边疼是什么原因| nb是什么意思| 拉比是什么意思| 小候鸟是什么意思| 胚根发育成什么| 洗脑是什么意思| 褒姒是什么意思| 牟利什么意思| 黑色素痣看什么科| 什么叫痤疮| 硝酸酯类药物有什么药| 玄胡又叫什么| 吃完饭就犯困是什么原因| 牙龈发黑是什么原因| 布尔乔亚什么意思| pvd是什么材料| 什么是有机食品和无机食品| 报应是什么意思| 尿结石是什么引起的| 容易手麻脚麻是什么原因| loser是什么意思| 淋巴细胞偏高说明什么问题| ca医学上是什么意思| 什么叫打板| 今天吃什么| 眼睛看东西变形扭曲是什么原因| 抽脂手术对身体有什么副作用| 胃不好可以喝什么茶| 牙神经痛吃什么药| mlb中文叫什么| 手掌心痒是什么原因| 舌头肥厚是什么原因| 孕妇吃什么鱼好| 高血压突然变成低血压是什么原因| 瞎子吃核桃砸了手是什么生肖| 中药一般什么时候喝最好| 什么头什么节| 兰桂坊是什么地方| 秋刀鱼是什么鱼| 梦见捉黄鳝是什么意思| 宫寒是什么原因引起的如何调理| 日本投降是什么时候| 一月十八是什么星座| 黑色加什么颜色是棕色| 下午2点是什么时辰| 穷搬家富挪坟是什么意思| 唵嘛呢叭咪吽什么意思| 狗狗吃什么| 珊瑚绒是什么面料| 持续高烧不退是什么原因| gr是什么元素| abo溶血症是什么意思| 耳石症吃什么药| 鲍温病是什么病| 榴莲皮可以做什么| 法图麦在回族什么意思| 灏读什么| 造纸术是什么时候发明的| 西亚是什么人种| 锲而不舍下一句是什么| 喜用神什么意思| 单绒双羊是什么意思| 灵魂是什么| 吹风扇感冒了吃什么药| 吃什么改善睡眠| 发烧有什么症状| 20年是什么婚姻| 缸垫呲了什么症状| 米果念什么| 超声波是什么| 精忠报国是什么意思| 安徽有什么好吃的| 尿道感染吃什么药| 物有所值是什么意思| KP什么意思| 劳宫穴在什么位置| 茜是什么意思| 早上十点是什么时辰| 下午六点半是什么时辰| 什么人不能爬泰山| 眼睛出现飞蚊症什么原因怎么办| 脚背肿是什么原因引起的| 万兽之王是什么动物| 又什么又什么式的词语| 男人有霉菌是什么症状| 张衡发明了什么东西| 什么是低血糖| 任达华是什么生肖| 雨云是什么字| 章鱼的血液是什么颜色| 阿莫西林主要治疗什么| 上火了吃什么水果降火最快| 美国人喜欢什么颜色| 包皮过长有什么影响| 血氨高会导致什么后果| 为什么会突然耳鸣| 为什么有的女人欲太强| 尹是什么意思| 法令纹深代表什么面相| 什么是黄色视频| 口若什么什么| 孕中期头疼是什么原因| 120是什么电话| 胸腔里面像岔气了的疼是什么原因| 枪代表什么生肖| 孙策字什么| 20年是什么婚| 脑委缩有什么症状| 什么是心脑血管疾病| 下午右眼跳是什么预兆| 疼痛科主要看什么病| 前列腺增生是什么原因引起的| 阴道没水什么原因| 若无其事的若是什么意思| 工厂体检一般检查什么| 巴宝莉是什么品牌| 生活的意义是什么| 3月14号是什么星座| 头晕做什么检查| 什么分什么裂| 夜间抽搐的原因是什么| 脑鸣去医院挂什么科| 孕妇口腔溃疡能用什么药| 什么原因会引起胎停| 苦瓜干泡水喝有什么功效| 尿多是什么原因女性| loves是什么意思| 百度Jump to content

李希袁誉柏魏亮马兴瑞王荣参加义务植树活动

From Wikipedia, the free encyclopedia
(Redirected from Nullroute)
百度 大量地方隐性债务还未统计姚胜委员表示,从目前情况看,地方债务风险还是可控的,但是不可以掉以轻心,对全国%的负债率和全国地方%的债务率要作分析,不宜简单与国际上的其他国家相比。

In networking, a black hole refers to a place in the network where incoming or outgoing traffic is discarded[1] (or "dropped"[2] or sinkholed[3][4]) without informing the source that the data did not reach its intended recipient.[1]

When examining the topology of the network, the black holes themselves are invisible, and can only be detected by monitoring the lost traffic.

The name[3] is presumed to have originated from a concept of an astronomical location, a black hole.

Addresses

[edit]

A black hole IP address specifies a host machine that is not running or an address to which no host has been assigned.[1]

Even though TCP/IP provides a means of communicating the delivery failure back to the sender via ICMP, traffic destined for such addresses is often just dropped.

Blackholed addresses are undetectable only to protocols that are both connectionless and unreliable (e.g., UDP). Connection-oriented or reliable protocols (TCP, RUDP) will either fail to connect to a blackholed address or will fail to receive expected acknowledgements.

For IPv6, the black hole prefix is 100::/64.[4]

For IPv4, no black hole address is explicitly defined, however the reserved IP addresses can help achieve a similar effect. For example, 198.51.100.0/24 is reserved for use in documentation and examples[5]; while the RFC advises that the addresses in this range are not routed, this is not a requirement.

With the invention of cryptocurrencies addresses as locations where monies exist, there is the possibility of blackholing a quantity of crypto.[6]

Firewalls and "stealth" ports

[edit]

Most firewalls (and routers for household use) can be configured to silently discard packets addressed to forbidden hosts or ports, resulting in small or large "black holes" in the network.

Personal firewalls that do not respond to ICMP echo requests ("ping") have been designated by some vendors[7] as being in "stealth mode".

Despite this, in most networks the IP addresses of hosts with firewalls configured in this way are easily distinguished from invalid or otherwise unreachable IP addresses: On encountering the latter, a router will generally respond with an ICMP network rsp. host unreachable error.[8] Network address translation (NAT), as used in home and office routers, is generally a more effective way of obscuring the layout of an internal network.[9] [10] [11]

PMTUD black holes

[edit]

Some firewalls incorrectly discard all ICMP packets, including the ones needed for Path MTU discovery to work correctly. This causes TCP connections from/to/through hosts with a lower MTU to hang.

Black hole filtering

[edit]

A null route or black hole route is a network route (routing table entry) that goes nowhere. Matching packets are dropped (ignored) rather than forwarded, acting as a kind of very limited firewall. The act of using null routes is often called blackhole filtering.[12]

Black hole filtering refers specifically to dropping packets at the routing level, usually using a routing protocol to implement the filtering on several routers at once, often dynamically to respond quickly to distributed denial-of-service attacks (DDoS).

Remote Triggered Black Hole Filtering (RTBH) is a technique that provides the ability to drop undesirable traffic before it enters a protected network.[2] The Internet Exchange (IX) provider usually acquires this technology to help its members or participants to filter such attacks.[13]

Null routes are typically configured with a special route flag; for example, the standard iproute2 command ip route allows to set route types unreachable, blackhole, prohibit which discard packets. Alternatively, a null route can be implemented by forwarding packets to an illegal IP address such as 0.0.0.0, or the loopback address.

Null routing has an advantage over classic firewalls since it is available on every potential network router (including all modern operating systems), and adds virtually no performance impact. Due to the nature of high-bandwidth routers, null routing can often sustain higher throughput than conventional firewalls. For this reason, null routes are often used on high-performance core routers to mitigate large-scale denial-of-service attacks before the packets reach a bottleneck, thus avoiding collateral damage from DDoS attacks — although the target of the attack will be inaccessible to anyone. Blackhole filtering can also be abused by malicious attackers on compromised routers to filter out traffic destined to a certain address.

Routing typically only works on the Internet Protocol layer and is very limited in packet classification. It is bound to be stateless due to the nature of IP routers. Typically, classification is limited to the destination IP address prefix, source IP address and incoming network interface.

DNS-based Blackhole List

[edit]

A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is a list of IP addresses published through the Internet Domain Name System (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists. The term "Blackhole List" is sometimes interchanged with the term "blacklist" and "blocklist".

A DNSBL is a software mechanism, rather than a specific list or policy. There are dozens of DNSBLs in existence,[14] which use a wide array of criteria for listing and delisting of addresses. These may include listing the addresses of zombie computers or other machines being used to send spam, listing the addresses of ISPs who willingly host spammers, or listing addresses which have sent spam to a honeypot system.

Since the creation of the first DNSBL in 1997, the operation and policies of these lists have been frequently controversial,[15][16] both in Internet advocacy and occasionally in lawsuits. Many email systems operators and users[17] consider DNSBLs a valuable tool to share information about sources of spam, but others including some prominent Internet activists have objected to them as a form of censorship.[18][19][20][21] In addition, a small number of DNSBL operators have been the target of lawsuits filed by spammers seeking to have the lists shut down altogether.[22]

Black hole e-mail addresses

[edit]

A black hole[23] e-mail address is an e-mail address which is valid (messages sent to it will not generate errors), but all the received messages are automatically deleted, and never stored or seen by humans. These addresses are often used as return addresses for automated e-mails.

See also

[edit]

References

[edit]
  1. ^ a b c "GuardDuty EC2 finding types: Trojan:EC2/BlackholeTraffic". amazon.com. Amazon. 2024.
  2. ^ a b "Blackhole" (PDF). cisco.com. CISCO. Retrieved 25 June 2023.
  3. ^ a b "DNS Blackhole (AS112) Service". www.iana.org. Internet Corporation for Assigned Names and Numbers. 15 June 2010. Retrieved 24 February 2025.
  4. ^ a b N. Hilliard; D. Freedman (August 2012). A Discard Prefix for IPv6. Internet Engineering Task Force. doi:10.17487/RFC6666. ISSN 2070-1721. RFC 6666. Informational.
  5. ^ J. Arkko; M. Cotton; L. Vegoda (January 2010). IPv4 Address Blocks Reserved for Documentation. Internet Engineering Task Force. doi:10.17487/RFC5737. ISSN 2070-1721. RFC 5737. Informational. Updates RFC 1166.
  6. ^ "XRP LEDGER LEARNING PORTAL". xrpl.org. XRP LEDGER FOUNDATION. Retrieved 24 February 2025.
  7. ^ Apple Inc., botXhacker" "About the Application Firewall"
  8. ^ Kurose, J. F.; Ross, K. W. (2021). Computer Networking: A Top-Down Approach (8th ed.). Pearson. ISBN 978-0136681557.
  9. ^ Strebe, Matthew (2019). Network Security Foundations: Technology Fundamentals for IT Success. Sybex. ISBN 978-0782143270.
  10. ^ "RFC 3022: Traditional IP Network Address Translator (Traditional NAT)". IETF. January 2001.
  11. ^ Wool, Avishai (2004). "A quantitative study of firewall configuration errors". IEEE Computer. 37 (6): 62–67. doi:10.1109/MC.2004.2.
  12. ^ "Palo Alto Networks Support for Null Routes". knowledgebase.paloaltonetworks.com. PALO ALTO NETWORKS. 25 September 2018.
  13. ^ "HKIX".
  14. ^ "DNS & RHS blackhole lists". Archived from the original on 21 March 2013. Retrieved 26 March 2013.
  15. ^ C. Lewis; M. Sergeant (January 2012). Overview of Best Email DNS-Based List (DNSBL) Operational Practices. Internet Research Task Force (IRTF). doi:10.17487/RFC6471. ISSN 2070-1721. RFC 6471. Informational.
  16. ^ "RBLMon.com: What are RBLs and How do they Work?". Archived from the original on 4 September 2017. Retrieved 26 March 2013.
  17. ^ "Revealing Botnet Membership Using DNSBL Counter-Intelligence" (PDF). Retrieved 26 March 2013.
  18. ^ "RBL Criticism". 11 February 2008. Retrieved 26 March 2013.
  19. ^ "Electronic Frontier Foundation, EFFector, Vol. 14, No. 31, Oct. 16, 2001". 12 January 2012. Retrieved 26 March 2013.
  20. ^ "Verio gags EFF founder over spam". The Register. Retrieved 26 March 2013.
  21. ^ "Choosing Spam over Censorship". Archived from the original on 21 April 2003. Retrieved 26 March 2013.
  22. ^ "EMarketersAmerica.org sues anti-spam groups". Retrieved 26 March 2013.
  23. ^ Exim internet mailer specification document,the Redirect router University of Cambridge
[edit]
3.17是什么星座 地下党是什么意思 猫条是什么 世界上最大的数是什么 一天从早到晚叫什么日
中气下陷是什么意思 梦到钱丢了预示着什么 离婚需要什么手续 低密度胆固醇高吃什么药 排卵期后是什么期
亚型是什么意思 法院院长是什么级别 左氧氟沙星是什么药 木字多一撇是什么字 痹症是什么意思
吉尼斯是什么意思 ctp是什么意思 肝看什么科 飒爽什么意思 胃黏膜病变是什么意思
人分三六九等什么意思onlinewuye.com 乳腺无回声结节是什么意思96micro.com 智商140是什么水平youbangsi.com 肠炎吃什么药好得快hcv9jop8ns2r.cn 整天想睡觉是什么原因hcv9jop4ns5r.cn
硫黄是什么hcv9jop4ns8r.cn 嘴唇有点发黑是什么原因引起的hcv9jop1ns4r.cn 节气是什么意思hcv8jop0ns4r.cn 藏毛窦挂什么科hcv7jop6ns9r.cn 耳膜破了有什么症状hcv9jop3ns0r.cn
喝酒拉肚子吃什么药hcv9jop5ns7r.cn 睡眠不足会引起什么症状0735v.com 用字五行属什么hcv8jop6ns2r.cn 孕妇尿路感染吃什么药hcv8jop3ns0r.cn 中元节是什么时候hcv8jop8ns8r.cn
近字五行属什么hcv9jop5ns8r.cn 知柏地黄丸适合什么人吃hcv8jop5ns2r.cn 黄帝内经是什么时期的hcv8jop1ns0r.cn 红细胞偏高有什么危害hcv9jop0ns6r.cn 扛幡是什么意思hcv8jop6ns3r.cn
百度 技术支持:克隆侠蜘蛛池 www.kelongchi.com