Re: How to fight with encrypted p2p

Linux Advanced Routing and Traffic Control

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Klauss,

Could you
Might be you can sponsor the development ...

Regards

Sébastien


Klaus escribió:
> About ipp2p,
>
> Right now, the battle against p2p is lost with l7 detection from ipp2p,
> l7 filter and others.
>
> Why ?? It is a known fact that pattern matching does not work with full
> encrypted P2P handshakes based on DHT key exchange algorithms with byte
> padding. You have absolutely no byte pattern and no fixed packet lengths
> in the stream. So something like a flow history will fail or might have
> a very high false +ve rate.
>
> The thing is that there are proprietary solutions which can detect fully
> encrypted p2p streams based on a heuristic approach. (AFAIK ipoque is
> selling a proprietary library for this which is integrated in some
> firewall vendors). I have not seen any open source development into this
> direction.
>
> Klaus, (former) maintainer of ipp2p
>
>
> Marco Aurelio wrote:
>   
>> As you might have seen, these are words from ipp2p author:
>>
>> """
>>
>> I have seen some pieces of code from ipoque which can detect encypted bittorrent
>> and edonkey traffic. Unforunately, this code will not work with
>> iptables, because it needs
>> more information about the flow history and the history of an ip address.
>>
>> Right now, I do not have the time and the money to develop a filter
>> like this, but
>> if you are interested in a developement in this direction, please contact me.
>>
>> """
>>
>> I *think* that we need something like a "bittorrent helper" in the
>> kernel to keep this extra information about the flow history and then
>> an iptables plugin to match. What do you think? Maybe we could contact
>> him to know what kind of information is it?
>>
>>
>> On Nov 12, 2007 9:17 AM, sawar <sawar@xxxxxxxxxx> wrote:
>>     
>>> Rtorrent which I use sometimes have ability to completely disable plain text
>>> communication :
>>>
>>> man rtorrent
>>>               allow_incoming  (allow incoming encrypted connections),
>>> try_outgoing (use encryption for outgoing connections), require (disable
>>> unencrypted  handshakes),  require_RC4  (also  disable  plaintext
>>> transmission  after  the initial encrypted handshake), enable_retry (if the
>>> initial outgoing connection fails, retry with encryption turned on if it was
>>> off or off if it was on),  prefer_plain text  (choose  plaintext when peer
>>> offers a choice between plaintext transmission and RC4 encryption, otherwise
>>> RC4 will be used).
>>>
>>> and many other clients have similar abilities.
>>> I'm afraid that full encrypted and enabled by default communication is only a
>>> matter of time and we will lose this "fight" very soon.
>>>
>>>
>>>       
>>>> Some clients P2P clients are nice about there encryption and negotiate
>>>> encryption ahead of time using plain communication. I.E. Limewire,
>>>> Azureus.  However, some just start TLS and that is all you can see.
>>>>
>>>> Looking at ipp2ps signatures, I don't see anything that leads me to
>>>> believe they track that kind of info.
>>>>
>>>>
>>>>
>>>> David Bierce
>>>>
>>>> On Nov 11, 2007, at 9:48 PM, Mohan Sundaram wrote:
>>>>         
>>>>> sAwAr wrote:
>>>>>           
>>>>>> Hi
>>>>>> I believe that whole question is in topic. Is there any way to
>>>>>> recognize ( and then shape ) p2p traffic which is encrypted?
>>>>>> Modern p2p clients have this ability moreover some of them have
>>>>>> this enabled by default. Now I'm using ipp2p for iptables but as I
>>>>>> know this doesn't recognize encrypted traffic.
>>>>>> Thanks in advance.
>>>>>> Pozdrawiam
>>>>>> Szymon Turkiewicz
>>>>>>             
>>>>> Have not tried this. An idea. P2P initiations are not encrypted
>>>>> AFAIK. Thus connections can be marked and related traffic shaped. If
>>>>> initiation is also encrypted, then I think we have a serious problem.
>>>>>
>>>>> Mohan
>>>>> _______________________________________________
>>>>> LARTC mailing list
>>>>> LARTC@xxxxxxxxxxxxxxx
>>>>> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>>>>>           
>>>> _______________________________________________
>>>> LARTC mailing list
>>>> LARTC@xxxxxxxxxxxxxxx
>>>> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>>>>         
>>> _______________________________________________
>>> LARTC mailing list
>>> LARTC@xxxxxxxxxxxxxxx
>>> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>>>
>>>       
>>
>>     
> _______________________________________________
> LARTC mailing list
> LARTC@xxxxxxxxxxxxxxx
> http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
>
>
>   

_______________________________________________
LARTC mailing list
LARTC@xxxxxxxxxxxxxxx
http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc

[Index of Archives]     [LARTC Home Page]     [Netfilter]     [Netfilter Development]     [Network Development]     [Bugtraq]     [GCC Help]     [Yosemite News]     [Linux Kernel]     [Fedora Users]
  Powered by Linux