Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 39

Thread: What I Just Learned About BT Encryption

  1. #21
    madbeer's Avatar brewed locally BT Rep: +1
    Join Date
    Sep 2007
    Location
    on an irc near you! Beer:
    Posts
    151
    Quote Originally Posted by pro267 View Post
    I believe the security implemented in most clients uses RC4.
    I've never heard of a secure stream cipher, and RC4 is no exception.
    This is completely false.

    RC4 isn't broken -- its implementation in WEP was (if thats what you are referring to)

    TLS commonly uses RC4, and I haven't seen any recent attacks on it. If so, kiss your online banking goodbye.

    AES in CTR mode functions like a stream cipher, and (i think) is used in WPA

    Please tell me why you think stream ciphers are insecure.

    Quote Originally Posted by grimms View Post

    I worked at Comcast.

    (snip)

    Encrytion will not stop your isp from knowing that your hogging up bandwidth from BT downloads. they still know your downloading BT content they just don't know what your downloading. Use a proxy to be almost entirely safe. Even though you'll never be entirely safe. VPN tunnels are the most safe proof though.
    How can they tell my encrpyted traffic is BT? My only guess is that the Protocol Encryption used in bt clients has some estblishment messages sent in the clear, which the isp could 'grep'. Although I havent looked at the protocol so I cant say for sure.

    In any case, tunneling your traffic via any method sucks -- be it a vpn tunnel, socks proxy, etc. It doubles my bandwidth usage(now traffic has to go from my home network to the proxy network, and from the proxy network to my destination) and often requires me to pay MORE to get the speeds my ISP is advertising in the first place (no one uses public proxies for bt I hope, we have to PAY for a seedbox or proxy, or some dedicated hardaware or know someone who will let us use their box as a stepping stone).

    In other words, leave comcast.

  2. BitTorrent   -   #22
    DanielleD87's Avatar bunny
    Join Date
    Aug 2007
    Location
    north cali
    Posts
    723
    they 'grep' for an ip or url from such en such address. like oink.cd. then from there they see multiple IP addresses connect that are reported in the data from such en such url. i'm not 100% sure on every detail of the process of how they identify the protocol, but I am 100% sure that if you turn off tracker announces in your bt client settings and manually add the IP addresses for that torrent then you will not be throttled, so the throttling is highly dependent on the tracker announce host name.

  3. BitTorrent   -   #23
    madbeer's Avatar brewed locally BT Rep: +1
    Join Date
    Sep 2007
    Location
    on an irc near you! Beer:
    Posts
    151
    Quote Originally Posted by DanielleD87 View Post
    they 'grep' for an ip or url from such en such address. like oink.cd. then from there they see multiple IP addresses connect that are reported in the data from such en such url. i'm not 100% sure on every detail of the process of how they identify the protocol, but I am 100% sure that if you turn off tracker announces in your bt client settings and manually add the IP addresses for that torrent then you will not be throttled, so the throttling is highly dependent on the tracker announce host name.
    I like that idea.

    alas, even if we do that _and_ use protocol encryption the ISP's can still do fingerprinting on the protocol encryption negotiation our clients use, and throttle based on that.

  4. BitTorrent   -   #24
    DanielleD87's Avatar bunny
    Join Date
    Aug 2007
    Location
    north cali
    Posts
    723
    yep. that is why comcrap is being sued ^_^

  5. BitTorrent   -   #25
    arkiebrian's Avatar Capitalist Pig BT Rep: +22BT Rep +22BT Rep +22BT Rep +22BT Rep +22
    Join Date
    Aug 2007
    Posts
    362
    Good stuff in here...thanks to all.




  6. BitTorrent   -   #26
    jayz707's Avatar the human BT Rep: +1
    Join Date
    Jun 2007
    Location
    outside a cave
    Posts
    328
    i think comcast is using something more basic, than grepping for URLs and all that(which won't scale very well and will need more processor cycles => n/w lag + money). they can use some AI stuff(neural networks) to identify traffic patterns of BT users. although it should be possible to completely encrypt all the BT traffic in a secure way. you still exhibit traffic patterns to your ISP as you and the internet is connected through your ISP. so he can do traffic shaping on that traffic. i don't think that they need to snoop into your packets for this.... generally snoopping in and reading traffic is a big overhead and i don't think comcast need that. because that would roast there routers, and create huge lags. the easiest way for them to control traffic would be to track patters. and once these neural n/w's are trained well they should identify BT usage/traffic pretty easily....

    this also should be able to passed through, if your client can stimulate random patterns or something like that... but IMHO you should go to a ISP who lets you use BT... then your life and the programmer's life will be much easier...


    cheers!

  7. BitTorrent   -   #27
    Adebisi's Avatar Member BT Rep: +1
    Join Date
    Jul 2007
    Posts
    17
    Quote Originally Posted by arkiebrian View Post
    Good stuff in here...thanks to all.
    Yup.. very interesting, thanks.
    it's karma..

  8. BitTorrent   -   #28
    Giveaway's Avatar Senior Member BT Rep: +30BT Rep +30BT Rep +30BT Rep +30BT Rep +30BT Rep +30
    Join Date
    Aug 2006
    Posts
    1,482
    what are the cons of encryption? does it slow down pc?

  9. BitTorrent   -   #29
    wrongun92's Avatar Love Life BT Rep: +8BT Rep +8
    Join Date
    Sep 2007
    Location
    In Front of the PC
    Posts
    438
    it would use a liitle more of the cpu I suppose.

    Here's another thought:

    If a user (you) that has enabled the encryption initiates the connection into a client that has encryption disabled, then the transfer would be encrypted, irrespective of when I have enabled or disabled encryption but if my client with disabled encryption initiates the connection to the client with the enabled encryption then the transfer would not be encrypted and therefore would also be shaped.

    To see the world in a grain of sand and heaven in a wild flower, hold infinity in the palm of your hand and eternity in an hour.


  10. BitTorrent   -   #30
    madbeer's Avatar brewed locally BT Rep: +1
    Join Date
    Sep 2007
    Location
    on an irc near you! Beer:
    Posts
    151
    Quote Originally Posted by jayz707 View Post
    i think comcast is using something more basic, than grepping for URLs and all that(which won't scale very well and will need more processor cycles => n/w lag + money).

    packet inspection is actually not that expensive. Its when you need to modify the packet contents things get expensive (modifying the packet structure and calculating the checksums)

    Quote Originally Posted by jayz707 View Post
    they can use some AI stuff(neural networks) to identify traffic patterns of BT users.

    I don't know anything about neural networks or AI, but I doubt that ISP's would employ such mechanisms (please explain to me why/how they would utilize these academic oriented (research) technologies.

    Quote Originally Posted by jayz707 View Post
    although it should be possible to completely encrypt all the BT traffic in a secure way.
    There _must_ be some negotiation messages our clients send in the clear to establish encryption.

    Quote Originally Posted by jayz707 View Post
    you still exhibit traffic patterns to your ISP as you and the internet is connected through your ISP. so he can do traffic shaping on that traffic. i don't think that they need to snoop into your packets for this.... generally snoopping in and reading traffic is a big overhead and i don't think comcast need that. because that would roast there routers, and create huge lags.
    No way man, enterprise intrusion detection devices do this kind of work all day, without breaking a sweat (albeit a hefty price tag)

    Quote Originally Posted by jayz707 View Post
    the easiest way for them to control traffic would be to track patters. and once these neural n/w's are trained well they should identify BT usage/traffic pretty easily....
    THis would take a lot of training data, and I don't think I have seen an academic paper or commercial product out that can use 'neural networks' to identify usage patterns on a specific protocol given a set of users. Please prove me wrong here though, would be interesting.

    Quote Originally Posted by jayz707 View Post
    this also should be able to passed through, if your client can stimulate random patterns or something like that...
    hmmm

    Quote Originally Posted by jayz707 View Post
    but IMHO you should go to a ISP who lets you use BT... then your life and the programmer's life will be much easier...
    exactly

Page 3 of 4 FirstFirst 1234 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •