On Mon, Aug 9, 2010 at 3:18 PM, Zaid Ali <z...@zaidali.com> wrote:
> The devil is always in the details. The Network management piece is quite
> glossed over and gives a different perception in the summary. You can't
> perform the proposed network management piece without deep packet inspection
> which violates every users privacy.

how is that though? you COULD do something odd like say: "Anything to
zaid-ali's netblocks is preferred in queues over things to
jolymacfie's netblocks. that wouldn't require any DPI at all, just a
traffic classification engine on/near the endpoint, say like on the
DocSIS modem, or on the handset itself... many handsets are unix-ish
things with some ability to do 'firewall' things, certainly they could
mark packets outbound, certainly at peering points a network could
classify in simple ways and mark packets properly there as well.

nothing required DPI, unless you want to delve into: "That is not ssh
on port 22"

port 443 is the new port 80! woot!

-chris

Reply via email to