Join us

How I Block All 26 Million Of Your Curl Requests

How I Block All 26 Million Of Your Curl Requests

A developer built a razor-sharp TLS fingerprinting and blocking tool—all in kernel space—with eBPF and XDP. It hooks into incoming packets, scrapes TLS Client Hello messages, and cranks out simplified JA4-style hashes from their cipher suite lists.

The fun part? It's running under tight stack limits, so the dev stuffed a custom O(n²) sort into the hash logic. Yeah—bubble-sort energy, in 2024. But it fits. For state management, it leans on eBPF maps as on-the-fly blacklists. No stack overflows. No userspace detours.

System shift: Real-time packet filtering is moving down the stack. Kernel-level signals. No more babysitting by bloated firewalls or load balancers.


Let's keep in touch!

Stay updated with my latest posts and news. I share insights, updates, and exclusive content.

Unsubscribe anytime. By subscribing, you share your email with @devopslinks and accept our Terms & Privacy.

Give a Pawfive to this post!


Only registered users can post comments. Please, login or signup.

Start writing about what excites you in tech — connect with developers, grow your voice, and get rewarded.

Join other developers and claim your FAUN.dev() account now!

Avatar

DevOpsLinks #DevOps

FAUN.dev()

@devopslinks
DevOps Weekly Newsletter, DevOpsLinks. Curated DevOps news, tutorials, tools and more!
Developer Influence
1

Influence

1

Total Hits

43

Posts