Jump to content

Encryption is unuseful here :(


pictor

Recommended Posts

Hello,

Here a bigger part of the ISPs is using method to block the P2P traffic throught the lines.

I know in μTorrent is already present the option "Encryption Protocol" but it seems to be not sufficient to pass throught our ISPs' routers.

They keep blocking bitTorrent traffic.

But this doesn't happen with the eMule encryption. Maybe it use some more trick.

My question is: are you planning to develope a stronger encryption protocol that could pass even with this routers?

Or we must get used to not download via P2P?

I hope I could continue to use μTorrent in the future.

Thank you.

PS - Pardon my english.

Link to comment
Share on other sites

> stronger encryption protocol

they are not breaking the encryption, hence "stronger encryption" won't change anything at all. To determine what they're doing extensive tests on a client affected by the traffic shaping would be required and since you rarely find users who are willing to grant you full remote access to their machines, the effort involved in such testing is not small etc. etc. it's not simple to make progress in that area.

Switching ISPs is often a far easier option.

Link to comment
Share on other sites

I understand :(

But my ISP is the only one giving a decent conncetivity to play online. I couldn't change ...

Anyway, what about looking for a collaboration with the authors of eMule. Maybe they know more about how to pass the traffic shaping (i think they are masking eMule traffic as Firefox packets). They could help uTorrent to pass it too.

For the testing wouldn't be an idea to include some kind of statistics/tests in the uTorrent release, asking the user if he accept to show them, so there would be something to work on?

However I know my ISP's router model. It should be a Cisco SCE 2000, if it could be useful (it analyzes the Layer 7 of the packets).

I hope something could change b/c i use mainly μTorrent rather than eMule... :(

Link to comment
Share on other sites

  • 2 months later...

I also do not think, that they break the encryptions, because this would take far too much power. Maybe the problem is how to get the encryption. The provider can see every packet you send and receive so maybe he filters all packets before the encryption is initialized. If they know the Bittorrent protocol, this should not be very hard. If you have identified a connection as Bittorrent protocal, then you can reduce the speed no matter what data you send.

Link to comment
Share on other sites

The traffic shaping used by Comcast sends forged TCP RST packets to both ends. It's triggered when there's lots of connections to a single port. No encryption is broken. There's no need. There's three ways of defeating it. Change the port on each announce, which will hurt DHT; limit the number of incoming peers, which will need tracker help; or just ignore RST packets for the port, which will need low level OS work. This all assumes the RST packets are perfectly formatted. If not, they should be blocked or ignored by any sane OS.

Link to comment
Share on other sites

teredo is transparent... they can see the TCP/IPv6 inside teredo and thus inject "TCP-RST over IPv6 over Teredo over UDP over IPv4"-Packets just as they can inject TCP-RST over IPv4 packets... it'll just increase the complexity of the required parsers. So i give that a measure a few months. teredo is more interesting when it comes to circumventing NAT.

And about blocking RST packets, that does not work since they're sent to both ends.

Link to comment
Share on other sites

nah, that's just software... a new parser that can see TCP inside teredo (from there on they can use their old parsers) and the inverse path for injection. Think of firmware for a router... just that it has a throughput in the multi-gigabit range and firmware updates are contractually guaranteed as part of a maintenance agreement.

They'd only need new hardware if the current ones would be at its limit and the new parser/injector's complexity would push it beyond that.

So it's more a matter of how much ISPs want it throttled, how much time it will take to come up with a parser and then the time to deployment.

Link to comment
Share on other sites

  • 3 weeks later...

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...