Differences between version 3 and previous revision of FirewallingPeerToPeer.
Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 3 | Last edited on Wednesday, May 25, 2005 7:32:33 pm | by ChrisLowth | Revert |
Older page: | version 2 | Last edited on Wednesday, May 25, 2005 7:28:33 pm | by ChrisLowth | Revert |
@@ -5,15 +5,18 @@
For a network administrator, PeerToPeer (P2P) traffic generates a number of challenges. For some, the bandwidth consumption needs controlling. Depending on local policies, it may be to limit the network usage or to prioritise it. For some, concerns about the legal ramifications of the downloading of copyright material may drive them towards logging or (in exteme cases) blocking the protocols altogether.
If a Linux firewall is to enforce these policies effectively, it must be able to identify the P2P traffic with a high degree of certainty. Sadly, the use of simple rules (such as port-number matching) will not work for many of the existing protocols, and more complex mechanisms have to be employed. One or two P2P applications are designed to be difficult to identify, or to make use of multiple (sometimes; encrypted) protocols in order to bye-pass firewalling restrictions.
-The P2PWall project is focused on providing information and open source software to enable P2P protocols to be identified using a Linux firewall and the Netfilter/Iptables infrastructure. The project currently provides mechanisms for identifying (and blocking) the following protocols..
+The [
P2PWall|http://www.lowth.com
project]
is focused on providing information and open source software to enable P2P protocols to be identified using a Linux firewall and the Netfilter/Iptables infrastructure. The project currently provides mechanisms for identifying (and blocking) the following protocols..
* Fast-track (used by Kazaa and it's clones).
* BitTorrent
+* WinMX
* Gnutella.
+* OpenNAP
There are three GPL software packages provided by P2PWall..
* [cutter | http://www.lowth.com/cutter] - a command-line tool for cutting TCP/IP connections running over the firewall.
* [ftwall | http://www.lowth.com/p2pwall/ftwall] - a user-space deamon that allows Iptables to identify the Fast track protocol (Kazaa et al)
+* [ftwall2 | http://www.lowth.com/p2pwall/ftwall2] - an enhanced version of ftwall that can also identify WinMX and OpenNAP.
* [rope | http://www.lowth.com/rope] - an Iptables match module that allows packet matching rules to be developed quickly using a simple scripting language. Supplied with this module are scripts for: [Blocking Bittorrent|http://www.lowth.com/rope/BlockingBittorrent], [Blocking Gnutella|http://www.lowth.com/rope/BlockingGnutella] and [Blocking large HTTP downloads|http://www.lowth.com/rope/HttpContentLength].