Packets

Blacklist

Adds current session identity context to blacklist and may terminate the session.

Blacklist marks current session identity context as blacklisted for the application. This operation is available only after successful Initialize.

Request

Blacklist uses packet type = 6.

{
  "type": 6,
  "id": 7,
  "comment": "fraud detected"
}

Prop

Type

Response

{
  "id": 7,
  "status": 1
}

Prop

Type

Behavior notes

  • In blacklist-apply flows, server sends the operation response and then closes the session with close code 4203.
  • If request is rejected early (for example by quota), connection usually stays open and regular response is returned.

Blacklist statuses

StatusConstantReturned when
1OkBlacklist operation accepted.
6InternalServerErrorServer failed to process request due to an internal error.
604AppBlacklistsQuotaExceededApplication owner reached the application plan limit for blacklist entries.

Connection-close cases (before/around this usecase)

Blacklist can cause session close in addition to regular protocol/session guards:

Close codeErrorWhen it happens
4200connection is not initializedRequest was sent before successful Initialize.
4201rate limit hitGlobal per-session packet rate limit was exceeded.
4203session was blacklistedSession was blacklisted by this operation and server terminated the connection.
4302invalid request bodyPacket body does not match the required schema for this operation.

On this page