![]() |
Re: Application Throttling/Management
Quote:
|
Re: Application Throttling/Management
Thousands of customers would just up and leave not go to some company vm has connections too.
Really bad show and the final nail in vm's casket if this dpi stuff goes ahead said it a long time ago when this stuff was first mentioned this is no different to what the advertising malarkey were upto, isp's could filter anything (affecting traffic now and creeping to whatever surfaces as the next p2p) they want out with the kit leading in the end to a distrust of the isp using the kit and a 2 tier system and a more encrypted internet. This could also be used covertly for isp discrimination to certain services or products that the isp's see fit for use (they WILL say they wont but will they?) |
Re: Application Throttling/Management
I am stuck with them well unless I quit and move house
|
Re: Application Throttling/Management
Quote:
Quote:
You as the owner and maker of that data can remove any of the rights you may have given them at any time with a simple "official notice" in writing to the data controller of the company involved removing that right. (as the phorm/NebuAd cases are showing and educating the worlds Broadband masses today). ---------- Post added at 18:25 ---------- Previous post was at 18:05 ---------- Quote:
if only someone would provide this simple free basic service ASAP (google Uk infrastructure perhaps?) for your average users that dont know how to get or setup their own SSL tunneled Co-location Virtual web servers and related apps for personal remote use. that way you tunnel from your VM/BT master home machine pluged into your desk BB modem directly to the free 3rd party virtual web server, and run your real datatreams end point from that 3rd party location,and hence VM/BT etc cant easly see these unencypted data end point requests, lets see VM/BT justify STMing that single SSL data pipe to a 3rd party in court. OC as time moves on, its looking far more viable to look into direct WiMax and wireless gigE to the Co-Location sites around the country and bypass the ISPs invasive snooping all together. as the Wimax/GigE hardware prices fall through the floor for this old/new wireless kit, all it takes today is a few mates or a small village to club together and run their own cheap Meshed wifi and a single server housed somewere handy to all of them with this wireless WiMax/GigE connection pointing to your friendy Co-Location site and you can do that today, never mind the url story below that will make it even easyer and cheaper later. http://www.dailywireless.org/2008/09/04/gigabit-wi-fi/ http://www.dailywireless.org/2008/08...most-as-cheap/ |
Re: Application Throttling/Management
The problem is though that it just ends up with any traffic being throttled unless it can be identified as being a 'wanted' protocol, and while that may not be liked it's a perfectly legitimate thing for VM to do. :(
And yes it's not hard to shape things, you don't have to shape based on protocol, you can shape based on destination, number of TCP connections, source, TCP port, whatever you want. Not sure if the quote was aimed at me or if you were just pointing out the things I mentioned above regarding behavioural shaping and SSL CA chains / self signing / SSL proxying and putting them in a somewhat better way :) |
Re: Application Throttling/Management
Quote:
"One thing not mentioned is throttling. For example, an ISP could give an accurate speed estimate then deliver a lower speed due to contention or deliberate speed throttling in response to file sharing. The fact that your DSL2 connection can do 7Mbps doesn't mean you're going to get that speed all day every day" it just fills you with real confidence that Ofcom are really looking after your legal consumer rights doesnt it :rolleyes: http://blogs.guardian.co.uk/technolo...tish_isps.html getting yourself a few D1 forms and fact sheets an passing them around your friends will be far more effective in the long term OC. |
Re: Application Throttling/Management
Quote:
this is a so called "Man In The Middle attack" built directly into industrial ISP grade hardware that business and well funded criminal oufits can purchase off the shelf today and pay an ISP tech to plug in for instance. Ohh, it seems that later in the thread you concentrate on full decyption of the tunnel, wereas for the purposes of this thread and the reality of why VM and the DPI vendors are doing this is to get just enough information from your encypted datastream to use it in whatever mannor they chose to increase their profit margins at the end users expense...and without regard to the legal or political implications that might bring in the future from their actions. and by "to close the security loophole that SSL creates" they obviously mean that without this kit they couldnt see much if any of your unique datastream property to profit from its processing... http://www.intelcommsalliance.com/ks...04daf53086f015 " Netronome SSL Inspector Transparent SSL Proxy [img]Download Failed (1)[/img][img]Download Failed (1)[/img][img]Download Failed (1)[/img][img]Download Failed (1)[/img][img]Download Failed (1)[/img] No ratings yet Resources Product Web Page Datasheet Categories Application Software Other The Netronome SSL Inspector, the industry's highest-performance transparent SSL proxy, enables network security applications to access the clear text in SSL-encrypted connections and has been designed for security and network appliance manufacturers, enterprise IT organizations and system integrators. Without compromising any aspect of enterprise- or government-regulated compliance, the SSL Inspector allows network appliances to be deployed with the highest levels of flow analysis while still maintaining multi-gigabit line-rate network performance. The SSL Inspector's unique combination of capabilities removes the risks arising from the lack of visibility into SSL traffic while simultaneously increasing the performance of security and network appliances. The SSL Inspector Appliance provides existing sniffing (IDS) and filtering (IPS) security appliances with access to the decrypted plaintext of SSL flows. This equips network appliance manufacturers with a mechanism to provide their security applications with visibility into both SSL and non-SSL network traffic, increase their application performance and avoid becoming the source of reduced network throughput. This also allows end-users to add SSL Inspection capabilities to their network security architecture immediately to close the security loophole that SSL creates. The SSL Inspector is also available in a standard development kit that provides the industry's only open application programming interface. ..." |
Re: Application Throttling/Management
Popper, those rely on having the proxy configured as a CA on the browsers so that they can create phony certificates to present to the browsers.
They can work on layer 2 however they terminate the SSL tunnel from client to server and server to client. To do this they require the browser to trust them to sign certificates. This can be done in an Enterprise environment where you have control over the security policies on browsers, however in an ISP environment it's not feasible. EDIT: The other alternative is to get certified as a CA properly so that you get installed into browsers, however use of CA in this manner is not valid and any company doing this will soon find their CA disappears. Remember how SSL works - in order to properly set up the session you need to have a certified, signed public/private key pair from the server. While it is possible to impersonate the client and decrypt the flow initially it is not possible to impersonate the server unless you have a signed public/private key pair the client trusts through appropriate certification. Having set up SSL offload appliances all, without exception, require the transferral of the key pair from the server to the appliance or generation of a new key pair which has been appropriately signed and certified on a per server basis. I would suggest the same goes for trying to SSL 'offload' within the ISP network as well. |
Re: Application Throttling/Management
Quote:
|
Re: Application Throttling/Management
See my post here: http://www.cableforum.co.uk/board/34632497-post274.html
Quote:
It isn't a break of SSL though, is easily detectable, and requires browsers to be set up specifically to accomodate it as in an enterprise environment, so no I'm not admitting anything :) ---------- Post added at 13:17 ---------- Previous post was at 13:14 ---------- Quote:
|
Re: Application Throttling/Management
So if I use Giganews with 256bit SSL - can they just take a peak and see what I'm leeching?
I was under the impression that they'd need DPI to do this. |
Re: Application Throttling/Management
Quote:
Ed. |
Re: Application Throttling/Management
If VM continues to do this there will be no point in having anything above 4mb.
Mind you having seen this: "I would note there is ALSO a seperate trial going on while controls ports speciifcally for games (Wow etc) which affect the pings for said games." Which is obviously a lie, it wouldn't surprise me if the rest was. |
Re: Application Throttling/Management
Quote:
It's been like this a few times over the last 2 or 3 weeks. I wouldn't be surprised if the *******s are up to something in this area. |
Re: Application Throttling/Management
There's many different factors you have to look at i.e congestion, wireless router, not just VM are throttling your speeds plus are your speeds from torrents,newsgroups,p2p?
|
| All times are GMT +1. The time now is 17:22. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum