The method of user authentication in IPTABLES for Login`y

Affiliates: 1 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0

Content: 2.doc 394,5 kB

Description

The challenge is to find a method or algorithm for user authentication in IPTABLES. "Is it possible to implement in IPTABLES authorization for the user?". The work proved the relevance of a single method with a detailed description of its installation.

Additional information

I have analyzed the available market tools to solve such a problem. To my surprise, they were all part of a commercial project (disparate billing systems, traffic analyzers). Problem description User authentication on the Internet is virtually absent.
(Either very scarce, there is only information about the authorization of IP-MAC). After examining the structure of iptables, plus the application of the information that was able to dobyt- I had the idea to solve the problem, which I will describe in sequence in this report. I decided to create a database that will store all user data (which must authorize in iptables):

Feedback

0
No feedback yet.
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)