Eric,
After
initial testing I am not too worried, I can't get it to work through my
firewall. Doing a trace indicates that it uses http to get the initial
interface, but when attempting to search for files it constantly tries to
connect to port 1214. As long as that is blocked it does not look like it can
connect.
You
don't need to block the server IP, just that port. It is a good idea to block
everything except that which is required, even on outgoing
traffic.
JP
-----Original Message-----
From: Eric Appelboom [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 18, 2001 11:08 PM
To: [EMAIL PROTECTED]
Subject: [FW1] How to block morpheus? (the new napster)Does anyone have a solution to block morpheus from www.musiccity.comI have found this thread.Newsgroups: comp.security.firewallsDate: 2001-05-15 03:37:38 PSTI have just found that the new Morpehus file sharing system cannot be blocked. You try to block the main login server, the program gets around it. I have experimented with this, and have found that Morpheus will be the network administrator's WORST NIGHTMARE. Since I want to be a network admin someday, I am teaching myself some of the things about content filtering you do NOT learn in college. And my experimentation with trying to block Morpheus is that they designers of MusicCity's new file sharing system have made their network unblockable. On the other hand, while Napster cannot completely be blocked, it is possible to block out artists by keywork, such artists with offensive lyrics, such as Madonna, Prince, or 2 Live Crew can be block by keyword such that if someone tries a search, the query will return nothing, as the queries will be blocked by the filter. But I can say that MusicCity has developed a file sharing system that cannot be blocked. You try blocking any server address, the software will route itself around it to reach the server, the system is that un-blockable.have a hard time believing it _can't_ be blocked, but don't know enough about what it does to say what would be the best way. The website doesn't give much in the way of details about how it works. Maybe if someone could post a technical description of its operation (ports, protocols, etc.) more info could be given. I really doubt it would be able to get through a firewall if I didn't want it to, but I am open to hearing more details! Eric Appelboom
