On Friday 07 September 2007 15:26, Florent Daignière wrote:
> * Matthew Toseland <[EMAIL PROTECTED]> [2007-09-07 15:22:06]:
> 
> > On Friday 07 September 2007 15:13, you wrote:
> > > * Matthew Toseland <[EMAIL PROTECTED]> [2007-09-07 13:49:26]:
> > > 
> > > > Seems to be on a traffic analysis level as it works on encrypted 
> > bittorrent - 
> > > > I wonder if this would block Freenet?
> > > > 
> > > > 
> > 
http://torrentfreak.com/comcast-throttles-bittorrent-traffic-seeding-impossible/
> > > > 
> > 
http://www.dslreports.com/forum/r18323368-Comcast-is-using-Sandvine-to-manage-P2P-Connections
> > > > 
> > > > Thanks to whoever originally sent me this URL!
> > > 
> > > Nothing new as far as I can see ... killing TCP sessions sending out
> > > RSTs is what China has been doing for years!
> > 
> > The means of killing them isn't the interesting part. It's the means of 
> > detecting them that's of interest.
> 
> As far as I know only "transport" is cyphered using RC4 ... access to
> the tracker isn't (unless ssl is involved)...

Well it's transport they are interfering with here..
> 
> by the way preventing seeding when transfert is over is trivial ... flow
> analysis ... when you don't download, prevent "uploading". Detect that
> it switches from a "symmetrical" pattern to an asymetrical one

Exactly, it's traffic flow analysis. Widely deployed, cheap traffic flow 
analysis hardware kills us.

Attachment: pgpzVONnx8Qhc.pgp
Description: PGP signature

_______________________________________________
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Reply via email to