TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------
I take it you mean Napster, the MP3 search and grab tool by the people at
www.napster.com
I don't have an up front solution but I was looking at the napster thing a while ago
and I realized that the whole thing is really IRC with a pretty GUI on top of it, thus
you end up with a bit of a problem..... How do you stop IRC?
I'm imagining you are combating clever students with more time on their hands than is
good for them thus you can't readily block all the napster servers as they will
invariably end up finding a socket redirector to regain access to the servers
(effectively these are the IRC servers) .... While they can find ways to gain access
to the Napster servers they will always be able to discover the hosts that have the
MP3s on them....
The way to tackle this problem is not block your users from the Napster servers, but
to prevent users starting a file transfer from some random host... Thus I would
suggest setting up your RealSecure machine to look for a signature that is indicative
of a client starting a file TX by this method. Remember this signature is going to
look similar to the signature that an IRC client has when it initiates a file transfer.
Ahh well hope it helps, I don't have a RealSecure box in fact I've never seen one I've
used competing products....
Two cents worth...
Nick
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Chris Mlodnicki
Sent: Wednesday, February 16, 2000 11:01 AM
To: [EMAIL PROTECTED]
Subject: Napter Traffic Recognition
TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------
Will RealSecure get a Xpress update for Napter similar to the one for
ICQ?
Napster can be a real bandwidth hog for corporate and educational
networks, and even shutting off ports won't keep the better users from
accessing outside proxies and still eating up precious bandwidth. It
only take a few users to have that big T1 narrow down to an isdn.
Basically, I need a way to recognize Napter traffic and kill it, no
matter what port and coming from which server. Yes, a policy exists that
should keep people from doing that, but active countermeasures so far
have been most effective, if time-consuming. An automated method would
be so much easier on the admins.
Any ideas out there?
Chris Mlodnicki
NetStrategies and Mangement, Inc.