Berkeley CSUA MOTD:Entry 25660
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2002/8/23-24 [Computer/SW/P2P] UID:25660 Activity:very high
8/23    Will network performance suck again, now that the semester is
        starting?  Or has something been done about it?
        \_ it sucked before?
           \_ you didn't notice?
              \_ guess not :)
           \_ yes.
        \_ If you can't beat them, join 'em.  dl kazaa.
           \_ Make sure to get the fully spyware enabled trjoan horse version.
        \_ Some things have been done.  SETI@@@@@@@@Home now has its own ISP
           connection.  The cost of bandwidth has come down, so our
           bandwidth cap is now 90 megabits/sec instead of 70 megabits/sec.
           Within the next week or two, it will be raised to 100 megabits/sec
           once some new hardware is installed.
           My guess is that there will still be performance issues, if not
           at the beginning of the semester, then at least by the end of the
           calendar year.  I'm currently writing up a report requesting
           immediate emergency funding for bandwidth charges, with longer-
           term plans to do more with managing KaZaa, and managing or
           charging high-bandwidth users in general.  -tom
           \_ That's how it starts.  Next you'll be putting KaZaa users
              into camps.  And people using KaZaa _and_ SETI@Home will be
              put to death.  Heil Tom!
              \_ I don't know tom or his personality, but I think his
                 idea above is good.
                 \_ Sure, until someone decides *your* traffic isn't a priority
                    and you should be charge or 'managed'.
           \_ and just how do you plan to put a stop to Kazaa users when the
              Kazaa topology is dynamic?
                    \- you can because the "protocol isnt dynamic"
              \_ I don't think you can "put a stop" to peer-to-peer file
                 sharing; certainly not by technical means, on a campus like
                 Berkeley.  But the effects of KaZaa can be measured, and
                 the people using KaZaa can be managed.  (As in, "stop doing
                 that").  Remember, we're talking about on-campus machines,
                 not the dorms (which have their own separate cap).  Note
                 that the problem with KaZaa on campus is files being
                 downloaded by people from off-campus; campus people
                 using KaZaa to download files don't contribute to the
                 problem due to the current algorithm for bandwidth
                 charging.  -tom
                 \_ stopping p2p pirary on college campuses is VERY easy.
                    All you need to do is to adopt a new university policy
                    that sez if you're caught pirating stuff you'll be
                    expelled.  No appeals.  then you start the random search
                    in the dorms and start expelling some of the incoming
                    freshman.  You'll see the p2p traffic drop to NIL once
                    the pictures of expelled freshmen gets on Daily Cal.
                    Remember the naked guy?  After the law against nudity
                    at Berkeley and on campuses, and he got expelled, nobody
                    dared to show up naked.  Enforcement is the key.  Expell
                    the little fuckers without due process and you'll see
                    \_ Or as they say, "try and then execute them!"
                    everybody marching in line.
                 \- stopping kaza, gnutella, napster and a couple of other
                    p2p piracy programs is solved problem technically.
                    it is fairly strightforward to detect them in real time
                    and blast them with RST packets. it is an open question
                    what the policy should be and it is slightly involved
                    attempting to "whitelist" some users who are allegedly
                    using it for "real work". the "dynamic topology" and
                    configurable ports dont matter. of course there are
                    more involved ways to hide, but 99% of the users at
                    the moment dont do that ... although the number of
                    evaders may increase *some* if the "kazka obliterator"
                    code were deployed. ok tnx.
                         \- actually to do this 100% on a large scale isnt
                            that simple technically, but it is pretty simple
                            to deploy something that fucks up enough
                            p2p programs so that it is effectively unusable.
                            and this is a case where you dont need 100%
                            coverage to change behavior.
                            \_ The problem is, the more you fuck it up, the
                               more incentive you provide to find ways
                               around the blocks.  It will always be easier
                               to hide file sharing than to block it.
                                  \- thus far, untrue. or only true with
                                     very sophisticated users and very
                                     unsophisticated detectors ... but not
                                     inherently true. --psb
                               But certainly there are measures which could
                               be taken which would make an impact, if it's
                               decided that it's a good idea to take such
                               measures.  (The other problem is, once you
                               make people hide their P2P usage, you have
                               a harder time finding them to rap their
                               knuckles).   -tom
                               \-as i said above, most attempts to hide
                                 do not work against a good detection
                                 system. if you are doing something stupid
                                 like looking for a static port or a
                                 list of src/dst addresses like in the
                                 case of the napster "metaservers" it is
                                 easy to get around by just punching in a
                                 different number somewhere ... but at this
                                 point setting up a fancy proxy or encrypted
                                 tunnel is beyond the ken of most of the
                                 community ... perhaps something canned will
                                 emerge soon that gets around the current
                                 generation of our detectors, but at the moment
                                 this is not a technical but a political/
                                 resource allocation problem. this is based
                                 on many months of experience at a decent
                                 sized institution with a fair number of
                                 sophisticated users. --psb
                               \_ Is this the point where we start talking
                                  about The Tragedy Of The Commons?  I miss
                                  those threads....
2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2011/11/20-2012/2/6 [Computer/Companies/Apple, Computer/SW/Unix] UID:54237 Activity:nil
11/20   Are there tools that can justify a chunk of plain ASCII text by
        replacing words with words of similar meaning and inserting/removing
        commas into the text?  I received a 40-line plain text mail where
        all the lines are justified on left and right.  Every word and comma
        is followed by only one space, and every period is followed by two
        spaces.  The guy is my kid's karate instructor which I don't think is
	...
2009/10/27-11/3 [Computer/SW/Unix] UID:53475 Activity:nil
10/27   http://www.maxgames.com/play/flash-mind-reader.html
        how does this work?
        \_ sh -c 'for ((i=0;i<10;i++)); do for ((j=0;j<10;j++)); do echo "$i$j-(\
$i+$j)" | bc; done ; done' | uniq
        \_ bash -c 'for ((i=0;i<10;i++)); do for ((j=0;j<10;j++)); do echo "$i$j\
-($i+$j)" | bc; done ; done' | uniq
	...