Security Basics mailing list archives

Re: Encrypted torrent traffic shaping


From: cwright () bdosyd com au
Date: 6 Mar 2007 23:34:34 -0000

Tricky. This will depend on the p2p network and protocols used. 

Can you supply further details?

Is your network open (eg like an ISP)?
Do you have any other filters?
Allowable v Blocked traffic currently?

There are some distinct differences between torrents v UseNet v others, so allowing all could be difficult. It may be 
possible in any of these - whether it is feasible economically ?

Regards,
Craig


Current thread: