Skip to content
Discussion options

You must be logged in to vote
这当中,sakurafrp 节点和 frpc 并不知道你正在遭受攻击(rdp 的流量是加密的,在不使用深度包分析等技术的情况下无从得知流量是验证爆破攻击包还是正常流量),而如果你在 frpc 和 rdp 之间部署防御措施,并且该防御措施不支持 [Proxy Protocol](https://www.haproxy.org/download/1.8/doc/proxy-protocol.txt) 等代理协议的话,该软件在通过映射访问的情况下只能获得 frpc 的内网 IP(e.g. 127.0.0.1),因此在不支持代理的情况下在这一层进行屏蔽和拉黑比较麻烦

Replies: 1 comment 5 replies

Comment options

You must be logged in to vote
5 replies
@Huaweidev
Comment options

@LTHPKBTE
Comment options

Answer selected by Huaweidev
@Huaweidev
Comment options

@LTHPKBTE
Comment options

@Huaweidev
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
2 participants