Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Internet

Comcast Admits Delaying, Not Blocking, P2P Traffic 287

haibijon writes "The executive declined to talk in detail about the technology, citing spammers or other miscreants who might exploit that knowledge. But he insisted the company was not stopping file transfers from happening, only postponing them in certain cases. He compared it to making a phone call and getting a busy signal, then trying again and getting through."
This discussion has been archived. No new comments can be posted.

Comcast Admits Delaying, Not Blocking, P2P Traffic

Comments Filter:
  • Re:Sure, Comcast. (Score:3, Interesting)

    by Mille Mots ( 865955 ) on Tuesday October 23, 2007 @09:01AM (#21083703)
    I think a more apt analogy would be something like, "I'm not refusing to pay my bill. Think of it as having the check returned for NSF and then having to resubmit it and it goes through." I'm sure that they wouldn't have a problem with that, considering all the Nigerian scammers out there trying to get your routing information.
  • Re:"Postponing..." (Score:1, Interesting)

    by badenglishihave ( 944178 ) on Tuesday October 23, 2007 @09:10AM (#21083773) Homepage
    Interesting, seeing as I haven't heard of a case where someone was unable to use BT on a Comcast line so they tried again and it worked.
  • False advertising? (Score:5, Interesting)

    by DoofusOfDeath ( 636671 ) on Tuesday October 23, 2007 @09:15AM (#21083851)
    Does Comcast advertise very high transfer speeds? Because if they advertise that, knowing that they intentionally force lower speeds for some kinds of traffic, that sounds like fraud.
  • by Lumpy ( 12016 ) on Tuesday October 23, 2007 @09:25AM (#21083943) Homepage
    Last friday they had a large layoff in their Ad sales division. I know of several people that lost their job there and many said they did this country wide, gutting lots of jobs.

    Funny though, they did not trim the fat. Lots of middle management still there that really are not needed.

    Me thinks Comcast is circling the toilet bowl. still on the outer edge but we all know the spiral is a logarithmic one.

    I'm waiting for the next round on the CableTV side (oh yea it's coming!). I have a bunch of friends there as well and they give the heads up after the axe starts swinging.

    cool part is my company can hire some incredibly talented people that comcast cast aside in their ignorance.
  • Re:Makes me wonder (Score:5, Interesting)

    by walt-sjc ( 145127 ) on Tuesday October 23, 2007 @09:28AM (#21083979)
    From what I understand, they are forging packets that make your BT client think that peers have hung up on you. Since they (comcast) are the man-in-the-middle, they can easily perform these types of attacks.

    And that's what this is. An attack. QOS would just slow things down, this kills. I don't mind QOS. I do mind active damage.

    It's time to take p2p to the next level - implementing some of the concepts of the old freenet (the encryption part) and make the traffic unidentifiable. Maybe move it to UDP and make it look like DNS. Or Skype.
  • by whydotheydothat ( 1178245 ) on Tuesday October 23, 2007 @09:29AM (#21083999)
    Rogers does that in Canada on a regular basis. When I called them up, they admitted they block bit torrent. I asked them why don't they do this AFTER i use all my "unlimited" 60GB/month ($50)? No answer. Go figure.
  • Re:Makes me wonder (Score:5, Interesting)

    by norton_I ( 64015 ) <hobbes@utrek.dhs.org> on Tuesday October 23, 2007 @09:37AM (#21084081)
    Technically that is certainly true. You could make the legal argument that presenting a certificate as belonging to another organization if fraud.

    Not that it matters for the moment. Comcast can't currently afford to intercept all SSL connections, inspect the certificate to see if they can forge it, and proxy the connection just to do packet inspection.

    Furthermore, I think you can prevent that. Essentially, create a new "CA" key whenever you create a .torrent file, and include the public key in the .torrent. Then, on-the-fly build a chain of authority stemming from that key. Then, whenever you get directed to a new peer, the message includes a public key for that peer, signed by your current peer, and so forth. Even if comcast tries to join the network to disrupt it, they can't disrupt communication between nodes when the chain-of-authority does not use their keys, and if tampering is detected, their keys can be revoked, un-authenticating any bogus keys they have generated and signed.

    Sounds like a fun project, actually, assuming it doesn't already exist.
  • by Arrogant-Bastard ( 141720 ) on Tuesday October 23, 2007 @09:51AM (#21084253)
    It's possible to track FIOS rollouts merely by noting spam sources whose rDNS matches it, e.g., "*.fios.verizon.net". To date, this has been a 100.00% indicator of spam. For example, in the last few minutes, one of my mail servers has observed the following:

    pool-70-104-193-136.nrflva.fios.verizon.net
    pool-71-170-157-58.dllstx.fios.verizon.net
    pool-71-178-175-162.washdc.fios.verizon.net
    pool-71-180-67-156.tampfl.fios.verizon.net
    pool-71-187-176-23.nwrknj.fios.verizon.net
    pool-71-245-227-130.bstnma.fios.verizon.net
    pool-71-245-247-31.nycmny.fios.verizon.net
    pool-71-245-74-238.prvdri.fios.verizon.net
    pool-71-251-69-183.tampfl.fios.verizon.net
    pool-72-64-87-227.dllstx.fios.verizon.net
    pool-72-66-1-223.washdc.fios.verizon.net
    pool-72-75-227-248.bflony.fios.verizon.net
    pool-72-90-121-2.ptldor.fios.verizon.net
    pool-72-94-19-223.phlapa.fios.verizon.net
    pool-72-95-136-185.pitbpa.fios.verizon.net
    pool-96-229-80-50.lsanca.fios.verizon.net

    That's a mail server with one user. Production mail servers with tens of thousands of users typically note 5000-10000 such systems every day.

    So from here, it appears that new FIOS rollouts are being 0wned nearly as quickly as they're connected, and that they're staying 0wned. I'm sure the spammers are quite pleased with the quality service provided by Verizon et.al.
  • by Agripa ( 139780 ) on Tuesday October 23, 2007 @10:54AM (#21085235)
    I am not blocking forged RST packets from Comcast IP addresses. I am just placing them into a very long delay queue in my traffic shaper.
  • Re:Sure, Comcast. (Score:3, Interesting)

    by Merk ( 25521 ) on Tuesday October 23, 2007 @12:34PM (#21086807) Homepage

    Speaking of canceling your service, it sounds like a good time to talk alternatives. I, like many people here I'm sure, want a service that gives me the following:

    • A static IP (or multiple static IPs)
    • Honest usage caps, if it's unlimited, it's unlimited and maybe I pay a bit more. If it's limited, I want to know the limits
    • High bandwidth, low latency
    • No packet filtering or port blocking
    • The option to run servers (web, mail, game, etc.)
    • Something not too expensive (i.e. I don't want to pay for "business" service if I can avoid it, because business rates are much higher than home rates, probably because of the expectation of higher support costs)

    Does anybody have suggestions for services which meet these goals? I am not currently a comcast user, I use speakeasy. They give you static IPs and let you run servers, but these days they're not exactly high bandwidth or cheap, so I'm looking at alternatives, especially after they were bought by best buy. I know some options are only available in some areas, but I'm sure there are a lot of people who want the same thing, so if you know of a good option even if it is only local, speak up.

Always draw your curves, then plot your reading.

Working...