They exist and for certain applications are pretty effective.

On Oct 21, 2009, at 6:47 PM, Alex Balashov wrote:

I was not aware that tools or techniques to do this are widespread or highly functional in a way that would get them adopted in an Internet access control application of a national scope.

Tell me more?

--
Sent from mobile device

On Oct 21, 2009, at 9:27 PM, Adrian Chadd <adr...@creative.net.au> wrote:

On Wed, Oct 21, 2009, Alex Balashov wrote:

oh my goodness. You're behind on your reading...

I didn't mean DPI.  I meant in a way that can be inferred from the
headers themselves, and aside from the port number.

You don't think that statistical analysis of traffic patterns
of your UDP traffic wouldn't identify it as a likely tunnel? :)



Adrian



Reply via email to