Post by Jorgen GrahnAs far as I can tell, it's just some guy on
Solicited traffic is traffic that's in response to something you
initiated on your end, like clicking a web link or logging into your
email server to send or retrieve email. Unsolicited traffic is not
in response to a request. The mechanics of how the packets differ
assumes some detailed knowledge of the 7 layer OSI model and might
be more than you want to know.
I must say I have no precise idea what he's talking about, especially
in that odd reference to the OSI model.
What he means is that you mean need to understand the application to
know whether a particular packet is solicited or not. An application
might contains some application-level request that another machine
with a different IP address initiate a TCP connection to me. That
connection is technically solicited. But you'd have to understand the
application protocol to realize that.
Post by Jorgen GrahnPost by EltonThe main question is: Where and how do the solicited and unsolicited
inbound traffic differ from each other?
And also: How do ISP's who block unsolicited inbound traffic on home
customers computers ports, distinguish it from solicited inbound
traffic?
They don't block "unsolicited inbound traffic" by that definition of
"unsolicited".
Post by Jorgen Grahn- solicited TCP packets are packets that are part of an existing TCP
connection
- they can just block TCP SYNs from the world to you. All TCP
connections start with a SYN.
Sure, but that blocks a lot of traffic that may well be requested by
something you did on your end. It's comparable to ISP's that block
"spoofed traffic", but what they mean by "spoofed" is not that the
origin is invalid or incorrect but simply that it's not the one *they*
assigned. Shoot at the wall, towards the target, and call whatever you
can hit the bullseye.
DS