> Dave Smith wrote: >> Steve wrote: >> Yes anything using TCP would be vulnerable. So I'm saying for the >> purposes of this file transfer protocol lets ditch TCP all together >> and instead use UDP. > > ISPs can block UDP datagrams by port number with a single > iptables rule. They could even do it so randomly that it > appears to be natural packet loss, causing your protocol to > totally break down. Just because there's no "RST" bit in UDP > doesn't mean ISPs can't break it. And Comcast has demonstrated > that they aren't above doing something like that. > > If your aim is to get around an unscrupulous ISP, forget it. A > new protocol ain't gonna fix that problem. Choosing a new ISP > will.
Choosing a new ISP *might*, assuming you can get a new ISP where you live (I'm fortunate enough to have iProvo, otherwise Comcast would be my only available option: Qwest doesn't have DSL service in my neighborhood). There's always the possibility, though, that a new ISP would be just as bad. Running all your P2P traffic over a VPN *might* also fix the problem. (In Comcast's case, I'm fairly sure it will, but there's nothing that prevents them from degrading VPN traffic in the future, too.) Relakks.com is one VPN option that might be worth a look, if you plan on running much torrent traffic on your Comcast connection. Be careful about going over the "nonexistent" Comcast usage limits, though, or you may end up with no ISP at all. A new protocol over UDP definitely won't fix the problem, though. It's no harder to block than the old one. /* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */