I seriously doubt that would help him. There's a difference between
shaping traffic and not wanting any of those traffic :-]


Well, the thing is to have P2P packets identified and marked. Then you can either shape them - or drop/reject/fax them to your grandma. Identifying just by port numbers is impossible (except one wants to block any non privileged port). This is the point where ipp2p gets interesting. Am I thinking wrong?

Cheers,
Tobias

--
gentoo-user@gentoo.org mailing list



Reply via email to