The method of user authentication in IPTABLES for Login`y

Affiliates: 1 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0

Content: 2.doc 394,5 kB


The challenge is to find a method or algorithm for user authentication in IPTABLES. "Is it possible to implement in IPTABLES authorization for the user?". The work proved the relevance of a single method with a detailed description of its installation.

Additional information

I have analyzed the available market tools to solve such a problem. To my surprise, they were all part of a commercial project (disparate billing systems, traffic analyzers). Problem description User authentication on the Internet is virtually absent.
(Either very scarce, there is only information about the authorization of IP-MAC). After examining the structure of iptables, plus the application of the information that was able to dobyt- I had the idea to solve the problem, which I will describe in sequence in this report. I decided to create a database that will store all user data (which must authorize in iptables):


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)