Cisco has been building packet inspection for p2p into their routers for years now. It's pretty standard as far as I understand it (limited reading of Cisco manuals on this stuff a few years back).
-Adam On 9/19/07, H. Lally Singh <[EMAIL PROTECTED]> wrote: > > C'mon, I doubt these guys are that sophisticated. They're not going to > buy > specialized hardware to scan for this stuff, nor develop anything to fancy > when their biggest concern are the Kazaa customers who leave their > machines > online all day, uploading gigabytes of data. > > I'll guess port # range,probably mixed in with some bandwidth use > thresholds > before throttling. > > > > On 9/19/07 5:04 PM, "Michael Rogers" <[EMAIL PROTECTED]> wrote: > > > Charles Iliya Krempeaux wrote: > >> Maybe people should be hiding things out in the open. Like, make it > >> look like normal (unencrypted) HTTP, SMTP, or POP3 traffic (or > something > >> pretty common like those)... and hide the data in the data stream. > > > > It would be interesting to know how they're detecting encrypted traffic > > - measuring redundancy, as in the recent Skype paper, or just throttling > > anything that's not a recognised plaintext protocol? If the former, how > > much redundancy do you have to add to get round the filter? If the > > latter, can you just tack "GET / HTTP/1.0" to the beginning of every > > connection? > > > > Cheers, > > Michael > > _______________________________________________ > > p2p-hackers mailing list > > [email protected] > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > -- > H. Lally Singh > Ph.D. Candidate, Computer Science > Virginia Tech > [EMAIL PROTECTED] > > > > > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers >
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
