Beating Comcast's Sandvine On Linux With Iptables 361
HiroDeckard writes "Multiple sites reported a while ago that Comcast was using Sandvine to do TCP packet resets to throttle BitTorrent connections of their users. This practice may be a thing of the past as it's been found a simple rule in the Linux firewall, iptables, can simply just block their reset packets, returning your BitTorrent back to normal speeds and allowing you to once again connect to all your seeds and peer. If blocking the TCP packet resets becomes a common practice, on and off of Linux, it'll be interesting to see the next move in the cat-and-mouse game between customers and service providers, and who controls that bandwidth."
Good, but shouldn't be necessary (Score:5, Interesting)
While it is good that it is easy to ignore reset packets that were created by the ISP, the question still remains:
Why should we have to block forged packets made by the ISP? If the MAFIAA suits are banking on IP == identity, and the ISP is forging packets with an IP that doesn't belong to any computer they own, isn't that a fairly serious form of forgery?
And, wow that site went down fast.
It doesn't matter. (Score:2, Interesting)
It doesn't matter what it is, it'll be worse, more draconian, and will still be subverted quickly.
ISPs (and many other certain groups) need to realize that they have already lost, and will lose, ad infinitum. The fight will only cause hemorrhaging of even more customers.
Port 25 (Score:2, Interesting)
IPFW version or macosx (Score:1, Interesting)
Is there a version of this what works for IPFW or other way to do it on mac osx
encryption (Score:5, Interesting)
Comcast is evil and I want them to DIAF, but my torrents, which are legal, haven't been that impacted.
When I want fast, I use the Comcast sponsored newsgroups through Giganews.
Re:Exactly. (Score:2, Interesting)
I implemented similar firewall rules on my mac and the instability was cut in half.
Maybe you should ignore RST only on specific port ranges...
Just a thought.
Re:First it was email and spam, then it was conten (Score:4, Interesting)
By the way - While onto it - if they are to ratelimit live sports events and do on, they MUST prioritize the version for hearing impaired which have a square with a commentator speaking in sign language in the corner ABOVE the one for the rest. This simply because it is illegal to discriminate against hearing impaired and everyone is able to see the screen even though a part of it might not be of such interest to most of us. Of course - if the hearing impaired could set these option themselves, then we don't need to degrade the performance for those not hearing impaired neither.
Re:Tag: !news (Score:5, Interesting)
'Sandvine also sends RSTs to the other end of the connection. That means it isn't enough for you to be running this iptables rule - all the peers you connect to have to be running it too.'
Isn't that your ISP committing fraud? Altering a private communication with the intent of disrupting it, or the very least it's the 'ISP' impersonating you and also the other party.
What about Windows AVG suite? (Score:3, Interesting)
It appears I have control over ICMP packets with my AVG firewall. What exactly should I be doing, ie which packets need to be blocked as they have numbers and no description? Thanks
Comcast has moved on; now they're delaying packets (Score:5, Interesting)
They recently bumped up service to a full megabit upload speed, mostly because of Verizon FiOS service (which still isn't available anywhere in MA except the rich white suburbs- Boston's completely "dark", yet surrounded by towns and cities which have it.) However, if you use it past the old limit (384kbit), after a few minutes, latency skyrockets.
It takes anywhere from a minute to several minutes to kick in, but when it does, ping times to google jumped from 20-30ms to over 300ms. Sometimes I found ping times would be *seconds* long, and ssh became almost completely unresponsive. Curiously, none of the packets would actually be dropped- they'd just very, very badly delayed.
Seems very clearly designed to a)look the same as Verizon "on paper", 2)Satisfy people who want to email photos of the kids to grandma and grandpa (I will admit, it's insanely nice to be able to upload at four times the speed, when it works).
Re:Tag: !news (Score:2, Interesting)
I think it shouldn't be hard to only drop RST packets forget by comcast. It's not hard to identify a fingerprint of the packet, either by the TTL, sequence, or something, on the RST packets that's uniq to comcast forged packets.
They are doing it because they are crooks...... (Score:5, Interesting)
They can't block the packets, they sold their users "unlimited" internet. If certain packets are just blocked that's not really unlimited, is it?
They sure didn't tell anyone they were secretly installing Sandvine boxes that nobody had heard of specifically to screw up certain kinds of traffic. They did it in secret. It was subterfuge. A dirty trick. Mischief.
Now that they are found out their story is they are just "managing bandwidth".
But what they are really doing is trying to stop 2% of their customers from using 98% of the bandwidth, bandwidth they have to pay for. Remember, though they are selling "unlimited" internet access at some level *all* bandwidth is measured. Theirs is certainly measured by their upstream provider. There is really no "unlimited" bandwidth.
Re:This is why you select a specific port.... (Score:5, Interesting)
It's a response to a violation of the TCP protocol to begin with, so it's not surprising that it has some negative side effects.
Probably the best thing to do would be to build a filter that registers the presence of the RST packet and waits to see if you get more data from the site that supposedly sent it.
* If the site that the RST packet supposedly came from continues to act like it's got an open session, then you can ignore the RST as a forgery.
* If you have no more non-closure packets after the RST, then you can apply an aggressive timeout and then deliver the RST after 2-3 seconds of silence.
Re:It's a trace buster buster buster (Score:5, Interesting)
Last time this came up for discussion, some people suggested that RST-injection was computationally easier than packet blocking, because it works on the connection level rather than the packet level.
It still seems to me like you'd have to do quite a bit of DPI to determine which connections are being used for Bittorrent, but maybe you can identify a connection, send a forged RST packet, and then ignore the packets in that connection for a while (saving you load on the DPI box) for a while, maybe just until it closes.
I'm not entirely clear how these Sandvine boxes work, but it seems like it would be easier to identify "okay, this connection is being used for x," "this connection is being used for Y," and then not have to pay more attention to them, than it would be to examine every single packet. That's where you get your cost reduction, I suspect.
Sandvine has a few patents out there that probably describe in greater detail how their QoS tool works (and which I haven't read yet); apparently the QoS RST-forging are part of their "Stateful Policy Management" product.
Re:This is why you select a specific port.... (Score:5, Interesting)
Although, I've never had this issue and am not a Comcast customer...
I'd assume that the RST coming from Comcast would probably have a different TTL than a legitimate RST.. As a matter of fact, all the RST coming from Comcast would probably have the same TTL.
Anyone looked into this?
Time to stop trusting TCP (Score:5, Interesting)
I expect we'll see development of protocols more robust than TCP to a MITM attack (this is ultimately a MITM denial of service).
Re:This is why you select a specific port.... (Score:2, Interesting)
why a specialized device? (Score:3, Interesting)
why a device for just this?
when you buy a wireless router, just make sure its a router that will run a decent linux distribution. the linksys wrt54g started the ball rolling, and there is now a rather impressive list of routers [openwrt.org] supported by just one embedded linux distro; OpenWRT. dd-wrt has a similarly lengthy list [dd-wrt.com]. some allow you to attach hard drives via IDE or USB and do file serving as well. most run around 200mhz, have 4mb flash and 16/32mb ram, although better and worse configurations are available. these also have wireless built in, and usually two separate hardware vlans. you can pick up routers for under $50.
802.11n hardware seems to have very poor linux support, and not many routers have gigabit unfortunately. i havent really followed closely as neither of these features is on my "must have" list. the one i've seen moving recently is the wrt350n, which is making pretty good headway and has both features but its still not ready for primetime and is a pretty old router.
in general, i dont see why you'd get specific hardware for this when you could just have a small 5 watt linux router that handles your wan/lan/wifi/simple daemons.
Re:This is why you select a specific port.... (Score:3, Interesting)
Just some idle thoughts...
Re:This is why you select a specific port.... (Score:4, Interesting)
Re:A Fitness center analogy.. (Score:2, Interesting)
Well, there's also a reduced number of a certain type of equipment, which you would be depriving others of. If enough people were to do this, they could sufficiently occupy said type of equipment to the point where others will either wait in line or do something else. If you want, you can expand that to multiple types of machines. The net result is the same. Limited resources being consumed excessively by a few serve to detriment everyone else unfairly when those limited resources become scarce.
Realistically, an internet connection has a hard cap on how much you can upload in any given second. The total bandwidth going to your area is probably higher than that, so your impact isn't total, but if a few people do that then there isn't enough of that bandwidth left for everyone else. You get the same situation.
Sorry, I just don't see how your disagreement is valid. As far as I can see, the analogy is accurate enough.