TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

I think students that want to use Napaster can easily get around this by 
running a proxy server thru someone off campus that has a cable modem.
Thus I think it really is somewhat pointless.

Daniel

On Thu, 17 Feb 2000, David
Brumley wrote:

> 
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
> [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
> ----------------------------------------------------------------------------
> 
> I don't know about blocking napster.  Some good points have been brought
> up in the past about this.  I'm focusing on finding out which students (at
> our university) are distributing *illegal* mp3's.  Can you connect to a
> napster client and get a list of the mp3's it's offering?
> 
> I noticed there was something about connecting and a command like:
> /xm/search?q=&f=artist\n\n
> but I never got it to work.
> 
> I've looked at david weekly's documents, as well as the opennapster
> project, and haven't seen anything there.  anyone have any additional
> resources?
> 
> If so, I'd integrate napster file list scanning into rid (my tool) and
> maybe iss could in theres.. (ISS - a lot of people would buy your product
> just for this :)
> 
> -david
> 
> On Sun, 16 Jan 2000, Nicholas de Jong wrote:
> 
> > 
> > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
> > [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
> > ----------------------------------------------------------------------------
> > 
> > I take it you mean Napster, the MP3 search and grab tool by the people at 
>www.napster.com
> > I don't have an up front solution but I was looking at the napster thing a while 
>ago and I realized that the whole thing is really IRC with a pretty GUI on top of it, 
>thus you end up with a bit of a problem.....  How do you stop IRC?
> > 
> > I'm imagining you are combating clever students with more time on their hands than 
>is good for them thus you can't readily block all the napster servers as they will 
>invariably end up finding a socket redirector to regain access to the servers 
>(effectively these are the IRC servers)  .... While they can find ways to gain access 
>to the Napster servers they will always be able to discover the hosts that have the 
>MP3s on them....
> > 
> > The way to tackle this problem is not block your users from the Napster servers, 
>but to prevent users starting a file transfer from some random host...  Thus I would 
>suggest setting up your RealSecure machine to look for a signature that is indicative 
>of a client starting a file TX by this method.  Remember this signature is going to 
>look similar to the signature that an IRC client has when it initiates a file 
>transfer.
> > 
> > Ahh well hope it helps, I don't have a RealSecure box in fact I've never seen one 
>I've used competing products.... 
> > 
> > Two cents worth...
> > 
> > Nick
> > 
> > 
> > 
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> > Chris Mlodnicki
> > Sent: Wednesday, February 16, 2000 11:01 AM
> > To: [EMAIL PROTECTED]
> > Subject: Napter Traffic Recognition
> > 
> > 
> > 
> > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
> > [EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
> > ----------------------------------------------------------------------------
> > 
> > Will RealSecure get a Xpress update for Napter similar to the one for
> > ICQ?
> > 
> > Napster can be a real bandwidth hog for corporate and educational
> > networks, and even shutting off ports won't keep the better users from
> > accessing outside proxies and still eating up precious bandwidth. It
> > only take a few users to have that big T1 narrow down to an isdn.
> > 
> > Basically, I need a way to recognize Napter traffic and kill it, no
> > matter what port and coming from which server. Yes, a policy exists that
> > should keep people from doing that, but active countermeasures so far
> > have been most effective, if time-consuming. An automated method would
> > be so much easier on the admins.
> > 
> > Any ideas out there?
> > 
> > Chris Mlodnicki
> > NetStrategies and Mangement, Inc.
> > 
> > 
> > 
> > 
> > 
> > 
> 
> -- 
> #+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#
> David Brumley - Stanford Computer Security - [EMAIL PROTECTED]
> Phone: +1-650-723-2445    WWW: http://www.stanford.edu/~dbrumley
> Fax:   +1-650-725-9121    PGP: finger [EMAIL PROTECTED]
> #+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#
> c:\winnt> secure_nt.exe
>   Securing NT.  Insert Linux boot disk to continue......
>           "I have opinions, my employer does not."
> 
> 
> 

Daniel B. Garrie
3411 Stearn Hill Rd.
Waltham, MA 02453
Phone: 781.788.8103
Cell: 781.405.4228
Business Ph.: 781.529.5564
Email:[EMAIL PROTECTED]


Reply via email to