Open terryednacot opened 1 year ago
Hello Mike,
Within my role in cyber security, a significant aspect involves the examination, authorization, and limitation of access to our corporate software by way of IP Addresses. Despite employing various other techniques to limit access, we've observed that this remains one of the most effective approaches to prevent extensive misuse.
After thorough internal deliberation regarding the IP Protection proposal, we have notable apprehensions about the potential consequences of eliminating IP addresses. This change could render us vulnerable to misuse, which is a concern we share across our legal department due to its implications for compliance.
Could you kindly provide insights into how the proposal aims to address these challenges?
Appreciate your assistance.
I would like to also chime in on this one, and ask how legitimate websites will see protection proxy users. Will we see just all zeros or blank IP addresses? Or will we see a leased fake IP? If a fake IP, how many times per year, month, week, day, or hour can they change to a new fake IP? I ask because I'd like to know whether website designers would be able to at least temporarily block abusers (until they change their fake IP again). TIA for a reply.
When traffic flows through the IP Protection proxies, websites will see the IP address of the second proxy. Multiple users can share the same proxy IP address at a time. When a user loads multiple web pages, those loads can use different IPs. This is required to prevent tracking of users. Because of this, proxy IP addresses cannot be relied upon as stable identifiers for any purpose.
Hi David, As a result of this feature, application layer attacks can be more difficult to detect and mitigate, ranging from Distributed L7 DDoS to various business logic abuse/fraud attacks performed by malicious bots. How is Google going to prevent such attackers and fraudsters from abusing this feature? These risks cannot be solved by authenticated browsers. In today's market, there are many security risk-based solutions that use various ways to positively correlate the user, session, browser, and source IP to ensure that the user is indeed who he claims to be. The path to hell is filled with good intentions...
When traffic flows through the IP Protection proxies, websites will see the IP address of the second proxy. Multiple users can share the same proxy IP address at a time.
this way if a web application firewall will block a malicious user, it will block many innocent users as well; whitelisting Google network is obviously not an option.
I would rather block a few legitimate users than allow some hacker unlimited freedom to test out their various exploits.
Originally filed at https://github.com/spanicker/ip-blindness/issues/14 by @spanicker