PDA

View Full Version : Extra updates for PeerGuardian



MackDaddy
03-09-2009, 08:47 AM
Here are some extra block lists that you can use with PeerGuardian, download the zip files, then extract them and copy the text files to a folder, then with PeerGuardian select 'List Manager' then 'Add' then browse for the folder with the extracted text files, and add each one, select each one as 'Block' except for 'Exclusions' for that one select 'Allow'

When you add these extra blocked IPs make sure to check that the IP Address of the proxy server that you are using is not being blocked by PeerGuardian by running firefox through the proxy and go to a IP Address site to get the IP Address for the proxy server and then look to see if it is being blocked by PeerGuardian, if it is then right click on the IP Address in PeerGuardian and select 'Allow (the IP Address for Proxy) permanently'. Also if your own ISP is being blocked by PeerGuardian then select 'Allow (the IP Address for Proxy) permanently'.

http://blocklistpro.com/download-center/blocklist-pro-blocklists-mirror/

This link works but if it doesn't then try again in a few minutes

MackDaddy
03-10-2009, 04:03 PM
This link is working again

4x4
03-10-2009, 09:42 PM
work fine:]

MackDaddy
03-23-2009, 02:26 AM
In addition to using Peerguardian, if you use a proxy server then I think that it's best to disable the DHT Network settings in the BT client

If I understand correctly, while using a Socks and SSH protocol proxy server in your BT client, the DHT Network will not go through the proxy, but instead the BT client will make a direct connection to the DHT Network, which would give away your real IP Address through the DHT Network, although your BT client will be connecting to the tracker through the proxy, but because it is making a direct connection to the DHT Network your real IP Address will be revealed on the DHT Network

The DHT Network is closely monitored by anti-p2p

To test whether the DHT Network is leaking your real IP Address while using a proxy server in your BT client

The following is done with uTorrent

First, open a web browser and go to a find your IP Address type site, and with your web browser making a direct connection see what your own IP Address is, and then run your web browser through the proxy server and go to the find your IP Address type site to get the IP Address of the proxy server

Then while using the 'same' proxy server in uTorrent

BTW

After you select to enable and disable the DHT Network you have to close and then open the BT client in order for the change to take effect, also for any changes to the proxy settings and network settings in general you have to close the BT client and then open it for the changes to take effect


With the DHT Network 'Enabled', with only one torrent in the BT client, it would be best if it is one that is not on their hit list, on the lower part select the 'Peers' tab, then right click where you see the IP Addresses and select 'Copy Peer List', then open notepad and select paste

Then in notepad select 'Edit' and 'Find', then scroll to the top of notepad and have the cursor on the very top of the list of IP Addresses in the notepad, and then type a few numbers of your own IP Address, for example if it was 127.221.35.2131 then just type in to the 'Find' '221' then if you see your IP Address appear in the list on the notepad then you will know that your real IP Address is being leaked AKA at the very least a portion of your BT client connection is making a direct connection to the internet

You will probably see 'your' own IP Address in the list and also the proxy server IP Address as well in the list

Then remove the torrent + data, after you remove the torrent + data then disable the DHT settings, apply, and then exit uTorrent


Then open uTorrent, and then open the same torrent in uTorrent

And then with the DHT Network 'Disabled' to the same step by step

Also when checking the IP Addresses in the notepad check to see if your own IP Address in included in the list and also check to see if the proxy servers IP Address is included, now you 'shouldn't' see your own IP Address in the list but you 'should' see the proxy server IP Address in the list


Also make sure to 'Not' check:

'Local Peer Discovery'
'E Peer Exchange'
'Limit Local Peer Bandwidth'


And for Protocol Encryption select

'Forced'

And do 'Not' check the box 'Allow Incoming Legacy Connections'

It is very important to use Protocol Encryption while using the Socks protocol, even while using a proxy server with SSH protocol the above settings for Protocol Encryption do fine and I believe it is a good idea to always have it with the settings (listed above) for 'Protocol Encryption'

Because of the importance of internet security if I am wrong about any of these things and if anyone thinks that there are better settings then feel free to make any corrections and also suggestions

MackDaddy
03-23-2009, 09:18 PM
More updates for Peerguardian

http://blocklistpro.com/download-center/view-details/p2p-ip-filters/1542-psplist.zip.html

http://blocklistpro.com/download-center/view-details/p2p-ip-filters/1544-splist.zip.html

Frankthetank1
03-24-2009, 01:04 AM
can i just add these to utorrent? PG doesnt work with vista 64

MackDaddy
03-24-2009, 01:13 AM
can i just add these to utorrent? PG doesnt work with vista 64

I don't have Vista 64 but I found this about the instructions to make Peerguardian for Vista 64 to get around the problem with Vista 64

If this doesn't fix the problem then reply back


Peerguardian 2 download for Windows Vista x64 Edition

http://coblitz.codeen.org:3125/phrosty.phoenixlabs.org/pg2-rc1/pg2-rc1-test2-2.exe


Vista x64 users will need to perform the following steps

http://phrosty.phoenixlabs.org/pg2-rc1/#vista64

Sonnentier
03-24-2009, 01:29 AM
@Frankthetank1

Bluetack offers ipfilter.dat files, which µTorrent supports

http://blocklistpro.com/download-center/ip-filters/

Just extract one of them to C:\Users\NAME\AppData\Roaming\uTorrent


Also make sure to 'Not' check:

'E Peer Exchange'From what I understand, this disables asking peers about their known contacts.

However, other peers that know you might still report you to other clients, no?

So, if you contact A and B, of which both have connection with SPYBOT, SPYBOT can receive my address from either A or B, if they have PX enabled.

MackDaddy
03-24-2009, 01:44 AM
@Frankthetank1

Bluetack offers ipfilter.dat files, which µTorrent supports

http://blocklistpro.com/download-center/ip-filters/

Just extract one of them to C:\Users\NAME\AppData\Roaming\uTorrent


Also make sure to 'Not' check:

'E Peer Exchange'From what I understand, this disables asking peers about their known contacts.

However, other peers that know you might still report you to other clients, no?

So, if you contact A and B, of which both have connection with SPYBOT, SPYBOT can receive my address from either A or B, if they have PX enabled.

Thanks for the more in depth about the Peer Exchange function

With the settings that I use I can't find my own IP Address in the peer list in the BT client, and I think that because of that that I'm not making a direct connection anywhere from the BT client, I suppose that a IP would probably find it's self on the tracker's results for the torrent if other peers were receiving it and as they upload the IP info, but I haven't found it yet

Of course this is also while using a good proxy

And this is while using SSH or Socks5 proxy protocol

And the main two that I would recommend are Socks and SSH although between those two I recommend Socks a lot more then SSH, but if you use a socks proxy server then make extra sure to have the Protocol Encryption set

Sonnentier
03-24-2009, 01:49 AM
Yeah, if you use a proxy, there shouldn't be a problem.

But if I only block spybots, then I still fear that by this way or the other, my IP might be leaked.

I don't know if a sole IP is already enough evidence... you could blacken someone.

MackDaddy
03-24-2009, 02:38 AM
Yeah, if you use a proxy, there shouldn't be a problem.

But if I only block spybots, then I still fear that by this way or the other, my IP might be leaked.

I don't know if a sole IP is already enough evidence... you could blacken someone.

Even with using a Socks or SSH proxy server the DHT Network will still be a problem if the DHT Network is enabled, so you want to disable it, other wise as far as I understand the traffic from and to the tracker will go through the proxy but the traffic from and to the DHT Network will not go through the proxy but the DHT Network will make a direct connection, (which would leak someone's own IP Address to the DHT Network) even while using a proxy, so if you are using a proxy server then make sure to:

"Disable" the each of the following:

The DHT Network
Local Peer Discovery
E Peer Exchange
Limit Local Peer Bandwidth

And also always for Protocol Encryption select:

'Forced'

And do 'Not' check the box 'Allow Incoming Legacy Connections'

The Socks protocol does not include it's own encryption, so it is vital to have the Protocol Encryption set to the settings above

I even keep the Protocol Encryption Settings this way when using a proxy with SSH Protocol instead of a Socks proxy, and it does not create any problems with the SSH connection to leave the Protocol Encryption settings that way

All and all my favorite proxy protocol for a BT client is Socks5, SSH is sometimes alright for a BT client but the connection will sometimes drop, with SSH you have to use a second party app like Putty, although the SSH protocol is my favorite by far for anonymizing the web browser

I know that PPTP proxy server protocol and Open PPTP proxy server protocol anonymize all of the internet traffic of the computer but I don't really like PPTP and Open PPTP

I know that internet security is very important to get right, and that is why I mention certain things more then once, and if I am wrong with any of this then anyone should go ahead and reply with corrections and also suggestions

Sonnentier
03-24-2009, 04:19 PM
Yes, DHT can't be proxified, it's the same for eMule and others.
Looks like wrapping those UDP packets through socks isn't that easy.

I don't use a proxy, maybe I could find one to do the scraping, but not for the whole transfer.

Getting an address from DHT or Peer Exchange is a weak evidence, I could insert fake addresses into DHT and nothing hinders me from transmitting random addresses to the spybot via PX. The timestamp is also inaccurate, I don't know how often they poll the swarm, but it always has some delay. So is this sufficient to file a claim?

I guess I can't get around PX, because no matter what I set, the other peers might always exchange my address with other clients.

MackDaddy
03-28-2009, 06:31 PM
There are three absolutely crucial blocklists required (in regards to P2P safety). They are:

1. The P2P.php list within the PG 2 program (installed automatically).
2. The Bluetack P2P Level 1 list.
3. The Bluetack BOGON list.

NOTE that both P2P blocklists (1. and 2.) are very similar, and certainly contain redundancy in entries. The general consensus is that the Bluetack blocklists are superior to PG 2 (in terms of updates and content) thus we recommend using both concurrently. But besides these two blocklists, perhaps the most important blocklist of all is the Bluetack BOGON list:

BOGON IP addresses, or Bogon Space, are known as unassigned IP addresses and are not publicly used. Hence, anyone using them is very hard to trace and little information can be garnered about the users from these IP ranges. Since anti-piracy groups (and their cohorts) do not wish to be on any blocklist, current data suggest these are likely the most common ranges used nowadays by the more ‘aggressive’ pirate-seekers to gather evidence for lawsuits and prosecution. So it is imperative that these IP ranges are blocked, and that this list be incorporated into PG 2.

MackDaddy
03-30-2009, 09:13 AM
SG TCP Optimizer

http://www.speedguide.net/downloads.php

If I remember right the default in Windows (at least for XP 32bit) for packets is 1500 and if you wanted to use PPTP or Open PPTP then it is good to set the MTU setting to 1400 or less otherwise the packets will be to big to run smoothly in the PPTP and Open PPTP protocols and they will choke the PPTP and Open PPTP network, I set it to 1000 when ever I use those two protocols, although it is seldom that I ever use those protocols, using SG TCP Optimizer to change the MTU settings will change it in the registry

PPTP and Open PPTP are not my favorite and I recommend using Socks5 or SSH instead

After you set the MTU settings with SG TCP Optimizer then you have to restart the computer for it to take effect

Frankthetank1
04-02-2009, 10:54 PM
wow thanks what a big difference in size from the last one i had in that folder. I had a file in there from midnight torrent that gives away there blocklist to everyone. The one from that site you gave me what 4 times as big.



can i just add these to utorrent? PG doesnt work with vista 64

I don't have Vista 64 but I found this about the instructions to make Peerguardian for Vista 64 to get around the problem with Vista 64

If this doesn't fix the problem then reply back


Peerguardian 2 download for Windows Vista x64 Edition

http://coblitz.codeen.org:3125/phrosty.phoenixlabs.org/pg2-rc1/pg2-rc1-test2-2.exe


Vista x64 users will need to perform the following steps

http://phrosty.phoenixlabs.org/pg2-rc1/#vista64

MackDaddy
04-11-2009, 02:17 AM
wow thanks what a big difference in size from the last one i had in that folder. I had a file in there from midnight torrent that gives away there blocklist to everyone. The one from that site you gave me what 4 times as big.




I don't have Vista 64 but I found this about the instructions to make Peerguardian for Vista 64 to get around the problem with Vista 64

If this doesn't fix the problem then reply back


Peerguardian 2 download for Windows Vista x64 Edition

http://coblitz.codeen.org:3125/phrosty.phoenixlabs.org/pg2-rc1/pg2-rc1-test2-2.exe


Vista x64 users will need to perform the following steps

http://phrosty.phoenixlabs.org/pg2-rc1/#vista64

Thank you very much for the reply, these are the things that I work with a lot, stay anonymous

Peace

MackDaddy
04-14-2009, 06:56 AM
Here are some more IP Blocklist updates for 19 Mar 2009

You want to have a extra folder that is not the installation directory folder for extra Peerguardian updates, if you already have a extra folder for peerguardian updates then make another folder within that folder for these 8 extra udates, then follow the instructions for 'PeerGuardian' 'list manager' ect that I mentioned earlier in this thread

http://blocklistpro.com/download-center/blockpost/outpost-firewall-blocklists/

http://blocklistpro.com/download-center/ip-filters/

With these updates for March 19 2009, 6 of the updates are in txt format already and two are dat files, nipfilter.dat and pipfilter.dat

The dat files can be used as directly but if you want you can use the dat files with notepad, by opening notepad and select 'files of type' 'all files' then browse for the extracted nipfilter.dat and pipfilter.dat files

Once they are opened in notepad then 'select all' then copy and paste the contents to another notepad and save that other notepad, make sure to rename the new notepad to 'nipfilter' and 'pipfilter', you have to copy and paste the text from the notepad that opened the dat file to another notepad otherwise it will save it as a dat file instead of a txt file

MackDaddy
04-20-2009, 01:24 AM
Here are two more Blocklist updates

for these two updates follow the instruction in the post above this one to change these to txt format and to use these with Peerguardian

http://blocklistpro.com/download-center/special-requests/

While using all of the Blocklist updates and also the regular Peerguardian updates, you should be now blocking around 3 billion different bad IP addresses

Here are all of the links again to the Blocklist updates mentioned in this thread

http://blocklistpro.com/download-center/blocklist-pro-blocklists-mirror/

http://blocklistpro.com/download-center/view-details/p2p-ip-filters/1544-splist.zip.html

http://blocklistpro.com/download-center/view-details/p2p-ip-filters/1542-psplist.zip.html

http://blocklistpro.com/download-center/blockpost/outpost-firewall-blocklists/

http://blocklistpro.com/download-center/ip-filters/

http://blocklistpro.com/download-center/special-requests/