Menu

#31 New Cisco router blocking is out, how to get around

open
nobody
None
7
2004-01-29
2004-01-26
Anonymous
No

Cicso has a new way to block P2P at the router level.
First, I want you to know that the real problem for
ISPs is the way they get network blockage due to
INCOMING packets requesting files, the popular files.
It causes a back up of packets to the point it shuts
down networks.
So please make a bittorrent type of swarmed downloads
work and work right as soon as possible and make it so
it stops hitting a client when it gets enough sources.

The Cicso thing basicly watches the connection strings
and then calls that connection "Gnutella" for example
and will throttle or block it, users choice.

So make sure MUTE connects, trades public keys,
DISCONNECTS, and then re connects using the encryption
so that the router has no clue what the connection is for.

Now watch out, because they may just assume that a
re-connect to the same port at the same IP from the
same IP within 10 seconds is therefore the same use
"Gnutella", so maybe connect back after a random delay
or always have two ports, one public and one for secure
and tell people to never use a defined port, and only
tell the other end the encrypted port number after it
sends you a public key and only tell it encrypted!

Discussion

  • Jason Rohrer

    Jason Rohrer - 2004-01-29
    • priority: 5 --> 7
     
  • Jason Rohrer

    Jason Rohrer - 2004-01-29

    Logged In: YES
    user_id=61805

    This is an excellent point. We will look into this.

     
  • gabriel ramuglia

    Logged In: YES
    user_id=608193

    basically what you are saying is the program should avoid
    packet shaping by not being indentifyable as what it is. If this
    is possible, all the more power for it. However, packet shaping
    works via stateful packet inspection, and if every mute
    connection has something in common that differs from every
    other kind of network connection, then this effort will fail. It
    could be a certain set of data that is always passed, certain
    strings that get sent before anything else, etc. If the entire
    connection is encrypted (except the negotiation) then what
    you have suggested could work.

     

Log in to post a comment.