Bill Pringlemeir wrote:
> > Bill Pringlemeir wrote:
> >> I have a number of CLOSE_WAITs from a node.

> >>> netstat -tn | grep CLOSE_WAIT | grep 69.120.111.63 | wc
> >> 15      90    1215
 
> On 5 Feb 2006, [EMAIL PROTECTED] wrote:
 
> > That's Cablevision. They don't provide Internet access only
> > something remotely similar. I suggest to read this thread:
 
> > http://groups.yahoo.com/group/the_gdf/message/22192

> > I guess it would be a good idea to enforce TLS for ranges known to
> > be broken. Of course, nobody else supports it.
 
> I see.  I didn't compile with TLS because I have OpenSSL and I didn't
> want to install another SSL library.

I think it's legal to provide an ability to compile GTKG against
OpenSSL but offering pre-compiled binaries is not possible due to
license incompatibilities. OpenSSL does not the usual BSD-License but
something more restrictive. Of course OpenSSL and GNU TLS are not
drop-in replacements for each other but they offer more or less the
same facilities in different ways. This would only help people that
compile gtk-gnutella themselves. For source-based package
distributions like pkgsrc or Gentoo this doesn't really matter since
they will install dependencies automagically anyway. Such packages
would only be marked source-only. However, if both is supported
there's little reason to pick OpenSSL then.

> Also, I thought it was paranoid
> to run this and I didn't want to allocate the CPU to encipher/decipher
> traffic.

It doesn't seem to be so heavy on resources but I haven't run any
benchmarks.

> However, even if I compile with TLS, the lime wire client probably
> won't have this feature.  So I will have the same result.  Can I ban
> the the cable vision subnet?  I guess I just add this to hostiles.txt.

If you do this it's best to add it to the ~/.gtk-gnutella/hostiles.txt
and not the system-wide one. Otherwise, you might lose these ranges by
an update. Of course the other one can be made system-wide too using a
(sym-)link.

On the other hand, you're doing Cablevision a favour if you ban their
range. So far, it does not seem as if all customers are affected.
Maybe these filters are only active for certain sub-nets, customers or
require certain router models etc. As far as I know, these filters
don't apply to outgoing connections. So you'd even block these
incoming connections.
 
> That does seem rather dramatic.  But it would work for now...  Or I
> can live with these dropped connections.  I wonder if other clients
> could use stunnel to tunnel out of these networks to GTKG nodes?

I don't know whether stunnel supports the ciphers used by
gtk-gnutella.  If it does, it should work but it would require that
someone installs and configures it first. So it's pretty unlikely that
anyone uses this and you could still only contact peers that support
this which is a very low number for now.

-- 
Christian

Attachment: pgpKbKMyejoQq.pgp
Description: PGP signature

Reply via email to