IP address blocking
   HOME

TheInfoList



OR:

IP address blocking, or IP banning, is a configuration of a network service that blocks requests from
hosts A host is a person responsible for guests at an event or for providing hospitality during it. Host may also refer to: Places *Host, Pennsylvania, a village in Berks County People *Jim Host (born 1937), American businessman *Michel Host ( ...
with certain
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es. IP address blocking is commonly used to protect against
brute force attack In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct ...
s and to prevent access by a disruptive address. IP address blocking can be used to restrict access to or from a particular geographic area, for example, the syndication of content to a specific region through the use of
Internet geolocation In computing, Internet geolocation is software capable of deducing the geographic position of a device connected to the Internet. For example, the device's IP address can be used to determine the country, city, or ZIP code, determining its geogra ...
and blocking. IP address blocking is possible on many systems using a
hosts file The computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually maintained and made available via file sharing by Stanford Research Institute for the ...
.
Unix-like A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, although not necessarily conforming to or being certified to any version of the Single UNIX Specification. A Unix-li ...
operating systems commonly implement IP address blocking using a
TCP wrapper __NOTOC__ TCP Wrappers (also known as tcp_wrappers) is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or subnetwork IP address ...
.
Proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
s and other methods can be used to bypass the blocking of traffic from IP addresses. However, anti-proxy strategies are available, such as DHCP lease renewal.


How it works

Every device connected to the Internet is assigned a unique
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
, which is needed to enable devices to communicate with each other. With appropriate software on the host website, the IP address of visitors to the site can be logged and can also be used to determine the visitor's
geographical location In geography, location or place are used to denote a region (point, line, or area) on Earth's surface or elsewhere. The term ''location'' generally implies a higher degree of certainty than ''place'', the latter often indicating an entity with an ...
. Logging the IP address can, for example, monitor if a person has visited the site before, for example to vote more than once, as well as to monitor their viewing pattern, how long since they performed any activity on the site (and set a time out limit), besides other things. Knowing the visitor's
geo-location In geography, location or place are used to denote a region (point, line, or area) on Earth's surface or elsewhere. The term ''location'' generally implies a higher degree of certainty than ''place'', the latter often indicating an entity with an ...
indicates, besides other things, the visitor's country. In some cases requests from or responses to a certain country would be blocked entirely.
Geo-blocking Geo-blocking or geoblocking is technology that restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, such as checking t ...
has been used, for example, to block shows in certain countries. Such as
censorship Censorship is the suppression of speech, public communication, or other information. This may be done on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient". Censorship can be conducted by governments ...
of shows deemed inappropriate especially frequent in places such as China. Internet users may circumvent
geo-blocking Geo-blocking or geoblocking is technology that restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, such as checking t ...
and censorship and protect personal identity and location to stay anonymous on the internet using a
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
connection. On a website, an IP address block can prevent a disruptive address from access, though a warning and/or account block may be used first. Dynamic allocation of IP addresses by
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
s can complicate incoming IP address blocking, rendering it difficult to block a specific user without blocking many IP addresses (blocks of IP address ranges), thereby creating collateral damage. For websites with low enough popularity (often intentionally, with explicitly declaring the majority of potential visitors as out of scope) the large-scale collateral damage is often tolerable: the most of website accesses, when addresses belong to the same IP range, are accesses of persons just having a dynamic IP address, but the same ISP, country, city and city districts, based on which IP ranges are assigned by ISPs. On websites with low enough total count of visitors it is improbable that all these features match for anyone but a single person, and usually Terms of Service of the majority websites reserve the right of their admins to block access at own discretion, this way granting them right to impose collateral damage.


Implementations

Unix-like A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, although not necessarily conforming to or being certified to any version of the Single UNIX Specification. A Unix-li ...
operating systems commonly implement IP address blocking using a
TCP wrapper __NOTOC__ TCP Wrappers (also known as tcp_wrappers) is a host-based networking ACL system, used to filter network access to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or subnetwork IP address ...
, configured by host access control files ''/etc/hosts.deny'' and ''/etc/hosts.allow''. Both companies and schools offering remote user access use
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, w ...
programs such as
DenyHosts DenyHosts is a server log, log-based intrusion prevention, intrusion-prevention security tool for Secure Shell, SSH servers written in Python (programming language), Python. It is intended to prevent brute-force attacks on SSH servers by monitorin ...
or
Fail2ban Fail2ban is an intrusion prevention software framework. Written in the Python programming language, it is designed to prevent against brute-force attacks. It is able to run on POSIX systems that have an interface to a packet-control system or f ...
for protection from unauthorised access while allowing permitted remote access. This is also useful for allowing remote access to computers. It is also used for
Internet censorship Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org) but exceptionally may extend to all Int ...
. IP address blocking is possible on many systems using a
hosts file The computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually maintained and made available via file sharing by Stanford Research Institute for the ...
, which is a simple text file containing hostnames and IP addresses. Hosts files are used by many operating systems, including Microsoft Windows, Linux, Android, and OS X.


Circumvention

Proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
s and other methods can be used to bypass the blocking of traffic from IP addresses. However, anti-proxy strategies are available. Consumer-grade internet routers can sometimes obtain a new public IP address on demand from the
internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privat ...
using DHCP lease renewal to circumvent individual IP address blocks, but this can be countered by blocking the range of IP addresses from which the internet service provider is assigning new IP addresses, which is usually a shared IP address prefix. However, this may impact legitimate users from the same internet service provider who have IP addresses in the same range, which inadvertently creates a
denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conn ...
. In a 2013 United States court ruling in the case '' Craigslist v. 3Taps'', US federal judge
Charles R. Breyer Charles Roberts Breyer (born November 3, 1941) is an American attorney and jurist serving as a United States federal judge, Senior United States district judge of the United States District Court for the Northern District of California. Breyer se ...
held that circumventing an address block to access a website is a violation of the
Computer Fraud and Abuse Act The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (), which had been included in the Comprehensive Crime Control Act of 1984. The law pro ...
(CFAA) for "unauthorized access", punishable by
civil damages At common law, damages are a remedy in the form of a monetary award to be paid to a claimant as compensation for loss or injury. To warrant the award, the claimant must show that a breach of duty has caused foreseeable loss. To be recognised at ...
.


See also

* Block (Internet) *
Content-control software An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software dete ...


References


External links

{{DEFAULTSORT:Ip Blocking Internet security Blacklisting