Well perhaps I'm over my head here, not really my field but it seems
that with the exception of some forms of abuse all these can be done by
inspecting the packet headers. My understanding of DPI, as Deep Packet
Inspection was looking at the content not just the routing and protocol
information.

On 12/5/2012 11:28, Petter Ericson wrote:
> Transparent IPv4-to-IPv6 tunneling, detection of certain 
> forms of abuse, QoS modificaton, traffic monitoring and 
> shaping.
>
> Obviouly, these are mostly happening at a firewall or 
> equivalent, which is kind of the point. Very little DPI
> is legitimate in core networking.
>
> /P
>
> On 05 December, 2012 - Wayne Moore wrote:
>
>> What legitimate uses do you see?
>>
>> On 12/5/2012 10:34, Petter Ericson wrote:
>>> There are legitimate uses for DPI,
>> -- 
>> Necessity is the plea for every infringement of human freedom.
>> It is the argument of tyrants; it is the creed of slaves.
>>
>>     William Pitt (1759-1806)
>>
>> --
>> Unsubscribe, change to digest, or change password at: 
>> https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Necessity is the plea for every infringement of human freedom.
It is the argument of tyrants; it is the creed of slaves.

    William Pitt (1759-1806)

--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to