TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------
I think students that want to use Napaster can easily get around this by
running a proxy server thru someone off campus that has a cable modem.
Thus I think it really is somewhat pointless.
Daniel
On Thu, 17 Feb 2000, David
Brumley wrote:
>
> TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
> [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
> ----------------------------------------------------------------------------
>
> I don't know about blocking napster. Some good points have been brought
> up in the past about this. I'm focusing on finding out which students (at
> our university) are distributing *illegal* mp3's. Can you connect to a
> napster client and get a list of the mp3's it's offering?
>
> I noticed there was something about connecting and a command like:
> /xm/search?q=&f=artist\n\n
> but I never got it to work.
>
> I've looked at david weekly's documents, as well as the opennapster
> project, and haven't seen anything there. anyone have any additional
> resources?
>
> If so, I'd integrate napster file list scanning into rid (my tool) and
> maybe iss could in theres.. (ISS - a lot of people would buy your product
> just for this :)
>
> -david
>
> On Sun, 16 Jan 2000, Nicholas de Jong wrote:
>
> >
> > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
> > [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
> > ----------------------------------------------------------------------------
> >
> > I take it you mean Napster, the MP3 search and grab tool by the people at
>www.napster.com
> > I don't have an up front solution but I was looking at the napster thing a while
>ago and I realized that the whole thing is really IRC with a pretty GUI on top of it,
>thus you end up with a bit of a problem..... How do you stop IRC?
> >
> > I'm imagining you are combating clever students with more time on their hands than
>is good for them thus you can't readily block all the napster servers as they will
>invariably end up finding a socket redirector to regain access to the servers
>(effectively these are the IRC servers) .... While they can find ways to gain access
>to the Napster servers they will always be able to discover the hosts that have the
>MP3s on them....
> >
> > The way to tackle this problem is not block your users from the Napster servers,
>but to prevent users starting a file transfer from some random host... Thus I would
>suggest setting up your RealSecure machine to look for a signature that is indicative
>of a client starting a file TX by this method. Remember this signature is going to
>look similar to the signature that an IRC client has when it initiates a file
>transfer.
> >
> > Ahh well hope it helps, I don't have a RealSecure box in fact I've never seen one
>I've used competing products....
> >
> > Two cents worth...
> >
> > Nick
> >
> >
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> > Chris Mlodnicki
> > Sent: Wednesday, February 16, 2000 11:01 AM
> > To: [EMAIL PROTECTED]
> > Subject: Napter Traffic Recognition
> >
> >
> >
> > TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
> > [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems!
> > ----------------------------------------------------------------------------
> >
> > Will RealSecure get a Xpress update for Napter similar to the one for
> > ICQ?
> >
> > Napster can be a real bandwidth hog for corporate and educational
> > networks, and even shutting off ports won't keep the better users from
> > accessing outside proxies and still eating up precious bandwidth. It
> > only take a few users to have that big T1 narrow down to an isdn.
> >
> > Basically, I need a way to recognize Napter traffic and kill it, no
> > matter what port and coming from which server. Yes, a policy exists that
> > should keep people from doing that, but active countermeasures so far
> > have been most effective, if time-consuming. An automated method would
> > be so much easier on the admins.
> >
> > Any ideas out there?
> >
> > Chris Mlodnicki
> > NetStrategies and Mangement, Inc.
> >
> >
> >
> >
> >
> >
>
> --
> #+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#
> David Brumley - Stanford Computer Security - [EMAIL PROTECTED]
> Phone: +1-650-723-2445 WWW: http://www.stanford.edu/~dbrumley
> Fax: +1-650-725-9121 PGP: finger [EMAIL PROTECTED]
> #+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#+--+#
> c:\winnt> secure_nt.exe
> Securing NT. Insert Linux boot disk to continue......
> "I have opinions, my employer does not."
>
>
>
Daniel B. Garrie
3411 Stearn Hill Rd.
Waltham, MA 02453
Phone: 781.788.8103
Cell: 781.405.4228
Business Ph.: 781.529.5564
Email:[EMAIL PROTECTED]