Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Networking Your Rights Online

Network Measurement Tool Detects Reset Packets 118

kickassweb writes "If you think your ISP is sniffing packets, or worse yet, sending reset packets to stop torrents, there's now a beta Network Measurement Tool to detect them, courtesy of Lauren Weinstein of the Net Neutrality Squad. It's released under the LGPL, and runs under Win2K, XP, and Vista. Quoting: 'While the reset packet detection system included in this release is of interest, NNSquad views this package as more important in the long run as a development base for a broad range of network measurement functionalities and associated communications and analysis efforts.'"
This discussion has been archived. No new comments can be posted.

Network Measurement Tool Detects Reset Packets

Comments Filter:
  • by elrous0 ( 869638 ) * on Friday May 30, 2008 @08:43AM (#23598745)
    Without a Linux version, it's obviously the work of Satan.
    • Re: (Score:2, Insightful)

      Uh...it's LGPL. They give you the source. You wanna Linux version? Port it.
      • by nmg196 ( 184961 ) * on Friday May 30, 2008 @09:53AM (#23599723)
        I hate it when people say "just port it" just because something is open source - Like every single computer user is capable of writing low level network code for any platform. I suspect that more than 99.9% of people of people who read slashdot would not stand a hope in hell of "porting it".
        • I hate it when people say "just port it" just because something is open source - Like every single computer user is capable of writing low level network code for any platform. I suspect that more than 99.9% of people of people who read slashdot would not stand a hope in hell of "porting it".
          And, yet, at least 50-75% of those (probably much, much more) 99.9% are capable of learning how to do the work. The Linux TCP/IP stack, NIC drivers, etc., are fully open source. There are published specifications, docs, the whole nine yards. Read your RFCs. They're all online.

          Programming C is just not that difficult, especially for anyone who already knows how to code in at least one other language.

          Don't know how to code? There are tons of tutorials, books, and more on the Web, at your library, at your local bookstore and from e-commerce vendors everywhere.

          If you have a brain, and an IQ of at least, say 115 or so, you have no excuse.

          • by Bill_the_Engineer ( 772575 ) on Friday May 30, 2008 @10:25AM (#23600207)

            I would like to give the benefit of the doubt to the original poster and interpret his comments this way:

            If there was a ready made package for me to use, I would gladly help the monitoring effort. However, I find the mantra "just port it" not only a reactionary response, but also totally unrealistic.

            Don't know how to code? There are tons of tutorials, books, and more on the Web, at your library, at your local bookstore and from e-commerce vendors everywhere.

            If you have a brain, and an IQ of at least, say 115 or so, you have no excuse.

            I find this totally hilarious and would have modded you funny if I had the points to give. You are a comic genius using the absurd to humorously make a point...

            I mean it's like saying "If you are capable of reading all the books available on construction and building codes, then there is no excuse for you not being able to build your own house."

            Of course I could be wrong and misinterpreted both of your responses, in that case nevermind...

            • Re: (Score:2, Funny)

              by ATMD ( 986401 )
              I'm sorry, but who modded this insightful? Because it isn't.

              It's just plain common sense. The grandparent is just such an idiot that next to him, the frothings of a half-blind raccoon in the later stages of rabies would appear insightful, let alone someone who can string a sentence together.

              (And do I get Insightful, Troll, or Funny? Or just ignored? I'll be interested to see...)
          • by Inner_Child ( 946194 ) on Friday May 30, 2008 @10:34AM (#23600333)

            If you have a brain, and an IQ of at least, say 115 or so, you have no excuse.
            Maybe your time is worthless, but I actually have things that I have to do. Learning to code requires time that I (and I'm sure many others) just don't have.
            • Maybe your time is worthless, but I actually have things that I have to do. Learning to code requires time that I (and I'm sure many others) just don't have.
              Changing my own oil requires time that I (and I'm sure many others) just don't have. When I want my oil changed, I hire a mechanic.
              • Re: (Score:3, Insightful)

                by Rycross ( 836649 )
                Yeah pretty much. My time is worth something to me, and I will pay to have someone save me time, if I deem the amount of time saved worthy of the price. Whats wrong with that?
                • Nothing. When I say 'port it', this includes paying someone else to port it if it's really that important to you.
                  • by Rycross ( 836649 )
                    Ah I see. I thought you were implying that there was something wrong with not wanting to bother with, say, changing my oil. :)
            • A quote from the UNIX haters book:

              http://www.art.net/~hopkins/Don/unix-haters/whinux/your-time.html [art.net]

              Linux is Only Free If Your Time is Worthless

              • A quote from my OS agnostic book:

                "Windows is only $199 if your time is worthless."

                So what's your point?
              • When people say (GNU/)Linux is Free, they mean Free as in Freedom, not Free as in price didn't Linus torwalds tell you that? Probably Richard forgot to tell Linux about it.
          • And, yet, at least 50-75% of those (probably much, much more) 99.9% are capable of learning how to do the work.

            I weep for the future if 25-50% of people are incapable of learning.
          • by Perf ( 14203 )

            It's an issue of symantics...

            If Slashdotters took time to learn C,
            then they wouldn't have time to monitor Slashdot.

            Therefore, they wouldn't be Slashdotters.

          • by blhack ( 921171 ) on Friday May 30, 2008 @11:58AM (#23601561)

            If you have a brain, and an IQ of at least, say 115 or so, you have no excuse.
            Thank you for completely trivializing a skill that some of us spend our entire lives perfecting.

            Seriously, it is this sort of mentality that is killing tech. You DO have to be extremely smart/dedicated to do really low level CS work. You DO have to have a pretty heavy mathematics background to do any really serious code work and it is NOT something that you can "Learn in 7 days" no matter what the books you bought at borders are telling you.
            • You DO have to have a pretty heavy mathematics background to do any really serious code work and it is NOT something that you can "Learn in 7 days" no matter what the books you bought at borders are telling you.
              Really? You need advanced math degrees to understand TCP/IP, NIC drivers and such? Whoah! I gotta parse out this packet header! Better break out the calculus book! (Not.)
              • by Mr Z ( 6791 )
                For a packet filter/pattern matcher like this, probably not. To understand the differences between all the load balancing, window resizing and congestion avoidance algorithms, as well as why and how they work, probably so.
                • Re: (Score:2, Insightful)

                  For a packet filter/pattern matcher like this, probably not.

                  Exactly.

                  To understand the differences between all the load balancing, window resizing and congestion avoidance algorithms, as well as why and how they work, probably so

                  But we weren't talking about that, and understanding those algorithms isn't necessary to port this tool.

                  If no one else is gonna do it, either do it yourself or a hire a programmer to do it for you.

                  I swear to the gods, non-programmers are some of the whiniest users of open source.

          • It takes a long time to learn how to port code. You are totally understating the amount of work it takes to get from user to programmer.
          • And, yet, at least 50-75% of those (probably much, much more) 99.9% are capable of learning how to do the work.


            When? Most of us have jobs, schoolwork or other things that take up most of our time. Do you expect us to spend several months worth of our Copious Free Time learning all the programming skills needed for this one job, especially when most Slashdotters will never need those skills again? I don't know what world you live in, but it's certainly not mine!

          • by nmg196 ( 184961 ) *
            I think you're missing the point. 99.9% of people on here would not WANT to port it even if they really WANT or NEED the resulting ported solution. Why the hell would I spend weeks learning a different branch of programming just to get some network card driver? I have a life and other things I need to do. It's easier just to switch platforms, dual boot, find an alternative etc. Pretty much ANY alternative solution is probably better for me than trying to learn how to write that code and port it myself. The
        • If you want convenient software packages that are ready to go with absolutely no work on your end, I would suggest using Windows or OS X. If you know absolutely zero about programming, why chose a programmer's operating system? I mean really, this IS Slashdot where Open Source is the Greatest Thing Ever(TM) and can save the entire world from any ills...
        • by hazah ( 807503 )
          You don't need 99.9% of people to create a port. You just need at least 1 capable person willing to do it.
        • by sjames ( 1099 )

          Then they can HIRE someone to port it. Perhaps a few people in the same boat can chip in together to pay for it to be ported.

          The tool is probably written for Windows because Linux already has decent network analysis tools as part of most distros.

      • by axeme ( 818895 )
        If you look in websys.h, you'll see a short block of definitions for making some portion of this compile under Linux. So maybe they were thinking of some portability.

        Then there is also this on line 65: /* Hard to believe the Linux bozos tried to rename stricmp() */

        tcpdump is much easier.

      • While I am pissed off at Netgear for violating the GPL, I think it is time for me to mention that for mere money you can purchase a Netgear 8-port ProSafe VPM Firewall with 10/100 Mbps switch FVS318. This router detects spurious RST packets and will email you reports about them with details. For less trouble than porting Windows code to another platform (a Mac in my case) you can spend less than two hundred dollars for a hardware solution that provides email records to be used as proof later. My only prob
    • As usually, Linux already has tools like this for ages, one just has to know how to use them:

      tcpdump 'tcp[13] & 4 != 0'
      • by g-san ( 93038 )
        here is a linux, windows and mac version:

        netstat -sp tcp

        since these packets are spoofed anyways, I don't think seeing the packet will do much good, but a count helps.
      • by caluml ( 551744 )
        Don't run that! I ran it, and it deleted my po.. documents and media, and installed a backdoor!
    • by maxume ( 22995 )
      What about the Microsoft shills and Apple fanboys?

      Also, I think one guy uses BSD.
    • > Without a Linux version, it's obviously the work of Satan.

      Not really. It's just the work of somebody who doesn't hold portability as an important requirement.

      Sometimes this happens because they don't have the means to test on other platforms. Sometimes it's because they're so narrowly focussed that they're not even aware that there's more to computing than their own platform. Some people are simply too lazy, or lacking in computing skills, to write portable applications. And quite frequently it's t
      • Or it is simply a matter of numbers. Windows = 85%+ marketshare so therefore writing a package for Windows = millions and millions of potential more users than writing a package for Linux. It's a simple explanation, especially if you apply Heinlein's Razor.
        • Not when you consider the percentage of linux users who would have a use for such software compared to windows users.

          Consider:
          -- 5% of windows users use it.
          -- 75% of linux users use it.

          Assuming that the linux version could easily be converted to BSD, Unix, MacOS, etc. that means that:
          Total computer users using windows + application would be 4.25%
          Total computer users using *nix, etc + application would be 11.25%

          That is 2.6 times as many people.

          My math is good, however my original numbers
    • I wrote this, and yes, I was channeling Satan when I put it on Windows. I've ported a previous version to an embedded Linux platform, so I'm confident the NN Squad version could be ported to Linux, embedded or otherwise, in a few days. If there's enough interest I'll try it on Fedora 7 this weekend.
      -JB-
    • Without a Linux version, it's obviously the work of Satan.

      http://en.wikipedia.org/wiki/SATAN">SATAN ran just fine on Linux. But it didn't sniff for forged RST packets.
  • First the Chinese firewall, and now ISPs closer to home.
    Of course the ISPs shouldn't be allowed to spoof any packets, but what would be the consequence of ignoring all reset packets on a home network?
  • RST blocking? (Score:5, Interesting)

    by Applekid ( 993327 ) on Friday May 30, 2008 @08:45AM (#23598781)
    IANANG (I Am Not A Network Guru) but, what harm could happen if, say, all reset packets were just ignored and dropped by the network stack? All the hubbub about figuring out if your ISP is sabotaging you seems less useful than just blocking the shanangans and moving on with your life.
    • Re:RST blocking? (Score:5, Interesting)

      by cduffy ( 652 ) <charles+slashdot@dyfis.net> on Friday May 30, 2008 @08:51AM (#23598843)
      Without RST packets, how are you supposed to know if the remote host is legitimately closing the connection?
      • Re: (Score:1, Informative)

        by Anonymous Coward
        You waste some bandwidth sending more packets to them, and some time waiting for the connection to timeout.

        Neither of which really matter - after all packets get dropped often enough anyway, the internet doesn't come to a screeching halt when an RST packet happens to be dropped somewhere...
        • Re: (Score:2, Informative)

          by Hal_Porter ( 817932 )

          the internet doesn't come to a screeching halt when an RST packet happens to be dropped somewhere...

          No, because there's a timeout in the TIME_WAIT state. As far as I can tell RST packets are a way to break the connection and allow the TCP/IP stack to know that the socket is no longer in use.

          I think if you ignored RST packets you'd end up with more sockets stuck in TIME_WAIT rather than being closed. Of course you could just increase the size of the socket table to compensate for entries getting stuck in TIME_WAIT or decrease the timeout or both.

          But actually I found another problem. The forged RST packets

      • Re: (Score:2, Informative)

        by Ed Avis ( 5917 )

        Without RST packets, how are you supposed to know if the remote host is legitimately closing the connection?
        Um, IPsec?

        Point is, if your ISP spoofs RST packets, you cannot know when the remote host is legitimately closing the connection. If you get such a packet it could be genuine or it could be a fake. So it doesn't tell you much. You need some means for the remote host to sign every packet it sends out so they can't be spoofed, or else stop trusting them.
        • by cduffy ( 652 )
          Just so. It's almost a shame opportunistic IPsec came out years too early for most folks to see the need; I imagine it'd get much more attention if it were something big, new and shiny today.
          • Re: (Score:2, Interesting)

            by Anonymous Coward
            Opportunistic IPSec runs into the problem that you need a pre-shared secret ("PSK") or a public key infrastructure ("PKI"), otherwise malicious persons will simply do man-in-the-middle attacks on the key exchange, so they can do deep inspection of the encrypted traffic anyway (they just have to add decryption to the inspection process).

            The net result of IPSec (or TLS) without strong authentication of both parties is that each packet consumes considerably more energy on the transmit and receive end systems,
      • IAANANG but what if, and I'm just spitballing here, an alternate network stack is written. It allows user-designated programs to tap into the "sample everything" trough, and does standard network stack stuff for every other program. When you install AltNS it asks for some 2000 byte random string and you have to provide that on a case-by-case basis whenever you want to allow a new progie to snoop everything. Ok, I worded that like crap but I think my drift has been cast, to the four sheets.
      • Re: (Score:3, Informative)

        by tatsu69 ( 59184 )
        They send you a FIN packet. RST is only for exceptional situations.
      • Wait for the FIN packet? ...But apparently Linux uses RSTs anyway...

        Oh, I know, wait for the second RST. When you get one, ignore and respond with an ACK or keepalive. IIRC, if the other side did close the connection, any extra packet is answered with another RST (Not sure about an empty ACK though).

        If you receive a packet with a higher sequence number, the original RST was fake. If you get a second RST you acknowledge and close.

        I'm not sure if you could do this at the firewall level or if you'd need to mod
      • Maybe with the FIN flag?
    • Re:RST blocking? (Score:5, Interesting)

      by Zocalo ( 252965 ) on Friday May 30, 2008 @08:53AM (#23598891) Homepage
      Assuming that you have a device capable of doing so, which I doubt many SoHo router/firewalls are, then there are not too many issues with dropping RST packets, and none of the them are show stoppers. It'll take a little longer before your web browser or whatever can determine that the remote site is genuinely down or otherwise refusing connections but that's about it from the "end-user" point of view. If you have a Linux proxy box however, then IPTables is perfectly capable of doing this for you, and can even do so in a sensible way - ie. just for BitTorrent traffic, just to pick a protocol at random.
      • Re:RST blocking? (Score:4, Insightful)

        by yabos ( 719499 ) on Friday May 30, 2008 @09:25AM (#23599309)
        If you can do that with iptables then you could do it with a home router and a 3rd party firmware on it. DD-WRT has iptables and I believe Tomato does as well.
      • by hawg2k ( 628081 )
        If they're sending RST packets, won't they be sending it to both parties? Just because you ignore them, doesn't mean the other end will. At best you'll have a half open socket, which is basically the same (or maybe worse) than a completely closed socket, no?
    • by Alioth ( 221270 )
      I'm surprised a UDP based filesharing protocol hasn't emerged because of this, allied with an automatic system that signs each UDP packet. That way, if the ISP got "smart" and injected fake UDP packets containing the command to end the transfer, it could easily be determined as fake since its signature would be incorrect.
    • The biggest problem with just dropping RSTs is that you can't stop the RSTs going to the other end of the connection--your torrent client may still think the session is open, but your peer will think that it is closed. RST is typically only used for abnormal termination, FIN (and the corresponding FIN/ACK) are used for 'normal' session closing. There is some additional risk to dropping RSTs in that over time all sessions that were supposed to be terminated 'abnormally' will linger, possibly forever, but i
  • tcpdump? (Score:1, Interesting)

    by FudRucker ( 866063 )
    i wonder if this job could be done with tcpdump in Linux?

    http://www.tcpdump.org/ [tcpdump.org]
  • by utnapistim ( 931738 ) <dan.barbusNO@SPAMgmail.com> on Friday May 30, 2008 @08:48AM (#23598813) Homepage
    This just highlights the evolving nature of open ... protocols? (it's more than the software).
    I believe new software will appear that works around the next attempt to block torrents, and new software to go arround the one after that ...
    If there is a big-enough interest in code/protocol changes, and the code / protocol is open, you can't "put a stop" to it.

    Well ... not for long.
    • by Moraelin ( 679338 ) on Friday May 30, 2008 @09:18AM (#23599193) Journal
      I'm not entirely sure what your point is, and if it's supposed to be a good or a bad thing.

      What would happen on a closed proprietary protocol? (E.g., let's imagine that MS had pursued their initial idea of makingt a MS net instead of the Internet, or that AOL/Compuserve/whatever had never gone TCP/IP and managed to win on their own, or that we all were on the French minitel. Or, heck, that each ISP had their own protocol and proprietary browser, and just converted to and from it. At least one did try to convert the graphics like that, and at least one is currently re-encoding movies, so it's not a huge stretch of imagination.)

      Well, then you'd be pretty much in the hands of whoever owns the protocol, i.e., most likely the ISP. If you were on, say, a proprietary AOL network, which works only with proprietary AOL software, and uses AOL's own proprietary protocols, then you're completely at their mercy. If they want to reset your connections, or whatever else, what are you going to do about it?

      Of course, you could reverse-engineer their protocols and patch their programs, which is a hell of a lot more expense and effort than with the open protocols. Except then they could:

      1. Just change the protocol from one version to another, to break your changes. (AOL actually did this for a while to keep breaking MS's attempts of making their Windows Messenger interoperable with AIM.)

      2. Sue you under DMCA for hacking into their network and bypassing their checks. (Seriously, much smaller attempts at reverse-engineering a protocol resulted in DMCA lawsuits.)

      So basically at best you'd have to bet a _lot_ on, well, how sympathetic a judge would be to your view that you have a right to bypass the usage or access restrictions on privately owned servers, to download more than you've bought, and to hack their software to that end. I wouldn't take it as a given.

      So basically open software at least gives you a fighting chance at all. Yes, they can keep modifying their implementation, but so can you. In the closed version, they own the software and the protocol, they can change it, but _you_ can't.

      Open standards even put a limit on how far they can take technique #1 above, because at the end of the day, they still have to remain compatible with a metric buttload of software and hardware that they don't control. In the all proprietary version, if they want to change the protocol and software _completely_, and leave the old channel open just for downloading the new software, they can.
      • I'm not entirely sure what your point is, and if it's supposed to be a good or a bad thing.

        It's a good thing: due to the open nature of the torrent protocol, I think we will see changes in the torrent clients, that will make the current sabotage attempts obsolete.
  • Grammar? (Score:2, Insightful)

    by Thornburg ( 264444 )
    Um, sorry, but "Network Measurement Tool Detect Reset Packets" is not a proper grammatical structure. It could be "Network Measurement Tool Detects Reset Packets" or "Network Measurement Tool to Detect Reset Packets" or several other things, but right now it has a problem.

    Aside from that, it's great the people develop tools like this, but very surprising to see this be Windows-only.
    • Re:Grammar? (Score:4, Interesting)

      by Vectronic ( 1221470 ) on Friday May 30, 2008 @09:02AM (#23599001)
      From The Site:

      Please let us know if you're interested in coordinating on ports to other platforms, such as Linux, BSD, and Mac, or embedded hardware (e.g. WRT54G router).

      Special thanks to John Bartas for all of his diligent and continuing work on this software for NNSquad.
      So, I would assume that its just the one guy working on it (at the moment) which would explain why its Windows Only, its probably his chosen platform.
  • by itsybitsy ( 149808 ) on Friday May 30, 2008 @08:54AM (#23598895)
    How about setting up a firewall with our own deep packet inspection and reporting system? That way we can collectively scan, identify, analyze, report to a central site, aggregate the results, perform large scale analysis, and report the full results on all kinds of attacks on these firewalls around the world.

    A distributed Get Your Hands Off My Network. This information can be used to provide Objective Evidence for Court Cases Against Aggressive ISP and Those Who Pretend To Be The Governments And Homeland Security Departments of The ~192 Imagined Countries Around The World. It's about time that these pretenders, who do real harm to other people in the world to, know that they are not the only ones with some power. We tech geeks say hands off our Internets and we are watching and reporting on YOU BIG BROTHER!

    Power the the Geeks.
  • by HPUXCowboy ( 735911 ) on Friday May 30, 2008 @08:56AM (#23598939)
    I would point out that a tool has existed for years that possessed this capability AND has been available on BOTH Linux (*NIX) and M$ platforms. It's called Wireshark (formerly Ethereal). I will offer the caveat that you had to know a bit about TCP/IP protocol to use this tools but, there it is.
  • The race is on (Score:4, Insightful)

    by bytesex ( 112972 ) on Friday May 30, 2008 @08:57AM (#23598953) Homepage
    Because, of course, ISPs could also forge legitimate looking TCP RST packets.
    • Re: (Score:3, Interesting)

      by Vectronic ( 1221470 )
      Yeah, and when that fails just cut the internet off... "just doing some routine maintenance"

      Im becomming suspicious of my ISP for that reason, aside from obvious traffic shaping (which I usually dont mind too much), they also just drop the internet entirely but leave the network intact, so any computers still think there is internet but it goes no further than the ISP, upon which I start fucking with their servers until I get internet back. (you know, 'boredom')
    • Because, of course, ISPs could also forge legitimate looking TCP RST packets.

      If you read the methodology [nnsquad.org] page, you'll learn that:

      It's much harder to fake the timing of a spoofed reset.

      This round trip time (RTT) is tracked internally by TCP protocol layers, however it can also be measured by external monitoring devices or software at the endpoints.

      When sending bulk data during a TCP connection, the RTT between two TCP endpoints usually settles into a narrow, predictable range. Spoofed resets which are injected into the stream will usually have an RTT well below the measured average.

      Reset packet spoofers could attempt to evade this detection technique and improve their "stealthiness" by first measuring the RTT of a connection that they are planning to disrupt, then delaying the transmission of their spoofed reset until timing falls within the "expected" RTT. The problem with this approach is the significant risk that the spoofed reset will arrive too late from the standpoint of the receiving endpoint.

      In short, spoofed resets have only a relatively narrow time window in which they can be both effective at disrupting connections and simultaneously be resistant to detection as potentially anomalous events.

      So yeah, in theory the ISP could, but anomalies are detected in a way that's hard to get around and still work.

  • Now I can help prove they are spoofing packets not only my torrents but my browsers and games and normal effin' downloads from websites. (Took me two days to legally download a 400MB file from a legitimate website because the transfer would stop halfway through and I'd have to start from scratch all over again. Did this 8 times over the two days for the same damn file.) At least I'm hoping it will help. I have not RTFA. This is slashdot afterall...
    • Re:Cool (Score:4, Informative)

      by Culture20 ( 968837 ) on Friday May 30, 2008 @09:28AM (#23599363)
      I always use
      wget -c <URL>
      to download large files. Even when your ISP is on the up and up, you'll get a RST occasionally if the remote computer sends it. Using wget to continue an almost completed download of an iso or XPSP3 is really handy.
  • by redelm ( 54142 ) on Friday May 30, 2008 @10:07AM (#23599923) Homepage
    Not that [ISP] managment have ever been known for great intelligence, but throttling connections via RESET is just plain dumb. The client will just retry and extra data transferred.


    The correct (and difficult to detect) way of throttling is by delaying ACK packets a few ms. Then normal TCP congestion control does all the nice throttling for you.


    The ethics of throttling are a different matter: one side says they've been promised unlimited, and the other wants to be fair to all customers.

    • "The ethics of throttling are a different matter: one side says they've been promised unlimited, and the other wants to totally forgo any network improvments and buildout that would allow tolerable connection speeds, and block any possible competition of their movie download business." There, fixed that for you.
  • do something like 5.8Ghz phones and spread spectrum - use LOTS of "random" ports, initiate them from behind the firewall to make sure they'll get back through and boom comcast has more fun to work against!
  • by Anonymous Coward
    A good friend of mine works for Shaw Cable in their bandwidth monitoring department and has told me that they do not do any kind of traffic shaping.

    He says it's just three guys (only one on at a time afaik) and when they see someone using to much bandwidth, they phone them up and tell them to settle down with the downloads.
    • Re: (Score:3, Interesting)

      by Jabrwock ( 985861 )

      A good friend of mine works for Shaw Cable... He says it's just three guys (only one on at a time afaik) and when they see someone using to much bandwidth, they phone them up and tell them to settle down with the downloads.

      I got one of those calls, and the guy I spoke with couldn't tell me what "grey zone" I'd wandered into, or why my unlimited account... wasn't. I asked him what I should cap my d/l rate to, so I wouldn't get these calls, and he said there wasn't a limit "per se". So I asked him why he was calling me with a vague request to stop using so much of a service he couldn't define for me. No answer.

      I've since switched to Sasktel. While it's a lower max bandwidth, I don't have to share, and I don't get a phone ca

  • Comment removed based on user account deletion
    • How are you going to tell a fake RST from a real one (and no, I haven't RTFA)?
      Just a guess, but if the server on the other side still is sending data after the RST hits you, it's a sign that it didn't send the RST.
  • Is it a coincidence that this is downloading incredibly slowly for me?!
  • Or it may as well be. On the bright side, I did just learn a great lesson about the importance of download mirrors.
  • funny, I can't get to the site from my comcast connection. Getting there just fine from work, so likely not the /. effect...
  • This link [nnsquad.org] describes the manner by which problematic reset packets are detected. Apparently, an RST packet would be flagged as generated by the ISP based on the time at which it arrives, namely, if it arrives too early, or too late:

    spoofed resets have only a relatively narrow time window in which they can be both effective at disrupting connections and simultaneously be resistant to detection as potentially anomalous events.

    The question is what prevents the ISP from sending the packet within the said "narrow time window" and thereby avoid detection?

  • I have been using Azureus for torrents.

    After about 5GB of initial downloads, my download rate went from approx. 100kB/s to about 15-20kB/s while maintaining about 100kB/s upload at all times during seeding. These speeds have been my usual speed for weeks now. NOTHING I did restored my initial 100kB/s download speed.

    Perusing Slashdot, I read this article and decided to try it out and see if I could glean some useful information from it. Nothing in particular caught my attention. I let a download cruise along
  • The site design sure looks retro with big fonts ;)

C makes it easy for you to shoot yourself in the foot. C++ makes that harder, but when you do, it blows away your whole leg. -- Bjarne Stroustrup

Working...