-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Interesting.  Something like: wget --user-agent=AvantGo
> --referer=http://avantgo.com http://space.com/syn/avantgo/

        No, space.com is actually doing something a bit smarter than that,
in fact. They appear to be looking at REMOTE_ADDR, and determining if the
request comes from an allowed set of addresses in the AvantGo.com netblock.
If not, the request is denied.

        There's a way around it, but it's not an easy path, mangling the
packet itself, but you'll never see the data coming back, since a forged
REMOTE_ADDR would send the response to the request off to the address you're
forging, i.e. AvantGo somewhere.

        The other option is to hack a root DNS server to point that IP and
netblock back to you. I don't recommend this approach, however =)

        There's a third approach, but I'm not going to discuss it on a
public mailing list out in the open, where members and employees of AvantGo
are most-certainly subscribed and listening.


d.

perldoc -qa.j | perl -lpe '($_)=m("(.*)")'

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.1.92 (GNU/Linux)

iD8DBQE9j5urkRQERnB1rkoRAklKAKDGnCBvjWagd253WXB5OWb34oZ4xQCgrAsq
rOvDxNZc4BcJRJrLWxWMv6k=
=NrLV
-----END PGP SIGNATURE-----

_______________________________________________
plucker-list mailing list
[EMAIL PROTECTED]
http://lists.rubberchicken.org/mailman/listinfo/plucker-list

Reply via email to