Hi,

Just to add...

I've seen on the Cisco PIX that it seems Napster traffic likes to hit port
8888 on the outbound, no matter what port I set on the Napster client.
However, the article below

http://www.securityportal.com/closet/closet20000419.html

states that Napster uses 4444,5555,6666,6699, and 7777 as well.  I just set
the outbound to 

deny tcp any any eq <1 of the 6 ports>

and do this for all 6 ports.  I figure, unless the Napster developers change
the code, this will block current and future Napster servers.  If some legit
application in the future uses those ports, I guess I'll have to be more
specific on what outbound traffic will be allowed on those ports.

Hope this helps.

--Matt

> -----Original Message-----
> From: Daniel Hammer [mailto:[EMAIL PROTECTED]]
> Sent: Friday, February 09, 2001 2:22 AM
> To: Michael T. Babcock
> Cc: Ryan, Kennedy; [EMAIL PROTECTED]
> Subject: Re: napster
> 
> 
> BS"D
> 
> Hi,
> 
> Michael wrote the magic words:
> > Most Napster clones (use Napster servers, not Napster 
> client) allow the user
> > to pick other servers not run by Napster.  There are 
> directories of such
> > servers online that are easily accessible.  File transfers 
> do not happen
> > between users and Napster's servers, but between users 
> themselves so blocking
> > Napster's C class does little in the long run.
> 
> absolutely right, I agree. The "normal way" is to query via 
> port 8888 a napster-bot
> cluster and you get the IP's of available napster servers; 
> usually 16 servers each block.
> For example, you get  this list of servers:
> 64.124.41.159:8888
> 64.124.41.160:8888
> 64.124.41.161:8888
> 64.124.41.162:8888
> 64.124.41.167:8888
> 64.124.41.168:8888
> 64.124.41.204:8888
> 64.124.41.239:8888
> --- cut ---
> 208.184.216.15:8888
> 208.184.216.16:8888
> 208.184.216.18:8888
> 208.184.216.23:8888
> 208.184.216.24:8888
> 208.184.216.44:8888
> 208.184.216.47:8888
> 208.184.216.60:8888
> 208.184.216.61:8888
> --- cut ---
> These servers do not transfer the mp3-files they give you an 
> IP of someone who has
> the type of mp3 you've requested and a port the donator 
> served for a contact in order to
> transfer files. Your client then does contact the donators 
> machine via its IP and the
> port he saved for you. These ports are dynamic and not fixed 
> so that there is no standard
> port for all these transfers.
> IMHO the best way to block napster is therefore to block the 
> queries to the napster 
> bot servers so that no "deal" between 2 clients could be established.
> 
> > "Ryan, Kennedy" wrote:
> > 
> > > We block their class c network address of 61.124.41.0 and 
> effectively shut
> > > down mp3 downloads from Napster..
> 
> Best,
> 
> 
>         /\
> Daniel /  \___
>       /      /
>      /o o o  \
>     /  \|/    \
>    /   (")__#  \  Linux is like a wigwam...
>   /    /v\      \  No windows, no gates,
>  /   /(   )\     \  and Apache inside
> /     (m_m)       \
> -------------------
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to