Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Privacy The Internet Your Rights Online

An Education In Deep Packet Inspection 126

Deep Packet Inspection, or DPI, is at the heart of the debate over Network Neutrality — this relatively new technology threatens to upset the balance of power among consumers, ISPs, and information suppliers. An anonymous reader notes that the Canadian Privacy Commissioner has published a Web site, for Canadians and others, to educate about DPI technology. Online are a number of essays from different interested parties, ranging from DPI company officers to Internet law specialists to security professionals. The articles are open for comments. Here is the CBC's report on the launch.
This discussion has been archived. No new comments can be posted.

An Education In Deep Packet Inspection

Comments Filter:
  • by b0ttle ( 1332811 ) on Tuesday April 07, 2009 @04:28PM (#27496083)
    How would the authorities like to be deep inspected?
    • Re: (Score:3, Funny)

      by Anonymous Coward

      How would the authorities like to be deep inspected?

      If there's a Slashdot achievement for getting a +5 on a Goatse link, you just missed your chance at it.

      • Re: (Score:2, Informative)

        It wouldn't be the first time [slashdot.org] somebody got +5 for linking to goatse [goatse.cz]m im just waiting for the editors to let it slip into a summary.

        • Re: (Score:3, Insightful)

          by severoon ( 536737 )
          Is it time for strong encryption of packet payloads yet? ssh? Ostiary [homeunix.net]? However it goes, I'm good...just need to know the new standard for basic web browsing...
          • Well, I already run an OpenVPN tunnel to a ...ehem... unrelated server of mine, registered in some offshore island, by some company that is... ehem... not mine...
            Not that expensive, and that server keeps no logs of my activity at all, and runs everything you can imagine. SElinux, IDN, DPI-firewall, honeypot, remote security audits and so on. Of course bribing the government keeps foreign inquirers off my back. They have a vivid business down there, based on being able to trust that they don't give foreign q

            • Oh, and, yeah. My e-mail address and everything else go trough that pipe too. Everything's fake. So in case you thought you are a wise crack for pointing out that I did not post anonymously: I simply don't need to. :)

        • by HTH NE1 ( 675604 )

          It wouldn't be the first time somebody got +5 for linking to goatsem im just waiting for the editors to let it slip into a summary.

          If the AP believes so strongly that aggregation steals their content instead of drives more visitors to them, they may yet resort to using Referrer headers to make off-site links to their stories redirect to goatse.

    • by causality ( 777677 ) on Tuesday April 07, 2009 @04:39PM (#27496187)

      How would the authorities like to be deep inspected?

      That's a good question.

      This summary mentions education about deep packet inspection. To me that's a very simple thing that boils down to a few questions:

      Do you want your ISP and potential unknown/unaccountable parties to be able to easily monitor, intercept, and record some or all of your Internet traffic? Do you want profiles built on this information that will compromise your privacy and could be used to serve advertisements or to micromanage your Internet usage? Do you feel like QoS, which will be the given reason/excuse, is such a good and desirable thing that it's worth all of these disadvantages?

      Like so many things that are not the result of overwhelming customer demand, this is a bad idea that is open to all sorts of abuse.

      • by Anonymous Coward on Tuesday April 07, 2009 @05:03PM (#27496497)
        it's just going to push more and more protocols to use TLS wrappers and to use random "legit looking" ports (like 20, 21, 80, 443, 110), a la Skype and most IM clients nowadays

        Good luck deep inspecting that crap
        • by causality ( 777677 ) on Tuesday April 07, 2009 @05:08PM (#27496569)

          it's just going to push more and more protocols to use TLS wrappers and to use random "legit looking" ports (like 20, 21, 80, 443, 110), a la Skype and most IM clients nowadays Good luck deep inspecting that crap

          That's true. You'd think that "spam vs anti-spam measures" alone or "windows viruses vs windows virus scanners" alone would have taught us, by now, how to recognize an arms race when we're about to start one. This is what I mean when I say that our culture does not value foresight.

          • Re: (Score:3, Funny)

            by sexconker ( 1179573 )

            Our culture doesn't value foreskin either (aside from grinding it up for use in cosmetics).

            Such a thought is sure to put any intact man in your position, causality.

          • Actually lots of DPI product can detect all that, we inspect Application Layer stuff, down to the signature. Yes Skype can be a little tricky detecting but its getting better at narrowing it down. Specially when you have ISPs like telstra not allowing skype on their network. Is a scary world out there.
        • by Hatta ( 162192 )

          Apparently it's going to push more people to use fixed width fonts too.

      • by HTH NE1 ( 675604 ) on Tuesday April 07, 2009 @05:31PM (#27496799)

        Do you want your ISP and potential unknown/unaccountable parties to be able to easily monitor, intercept, and record some or all of your Internet traffic? Do you want profiles built on this information that will compromise your privacy and could be used to serve advertisements or to micromanage your Internet usage? Do you feel like QoS, which will be the given reason/excuse, is such a good and desirable thing that it's worth all of these disadvantages?

        The Internet will become more like an airport: all your packetages will be subject to inspection without need for a warrant or probable cause and denied travel accordingly.

    • by memorycardfull ( 1187485 ) on Tuesday April 07, 2009 @04:43PM (#27496251)
      When Larry Craig taps his foot that means he is up for a deep inspection if you are...
      • Re: (Score:2, Redundant)

        I got "Troll" for this? I'm honestly sorry if I offended someone, just trying to make a joke...
        • Re: (Score:2, Offtopic)

          I got "Redundant" for this? I wasn't repeating myself, just trying to be polite...;)
          • by spazdor ( 902907 )

            And I am in this thread too!

          • Re: (Score:2, Funny)

            by Anonymous Coward
            That's why the rest of us, knowing we're posting off-topic to complain about moderation of our posts will do so anonymously, and make the criticism of the moderation sound like it's coming from an impartial third party. :p
    • Re: (Score:2, Insightful)

      by davidsyes ( 765062 )

      HAHA... this reminds me of the circa 1997/98 near-bust (or was it an actual bust?) of a famous sports player who got caught up in a Mountain View Police raid on a "massage parlor". His plea to the cops to not be cited or charged was that he wasn't there having sex; he was getting "deep tissue therapy"....

      In hind site, umm, hind SIGHT, ummm, hell, RETROspect, this may have been a form of "deep PACK IT" inspection. If things were non-condomnable, it might have ended up as a 32-bit insemination, vice inscripti

  • by davecb ( 6526 ) * <davecb@spamcop.net> on Tuesday April 07, 2009 @04:30PM (#27496099) Homepage Journal

    It's a hacky technology to implement QOS because folks don't like setting the QOS bits and protocol in the headers. Usually because some Microsoft firewall only allows http on port 80 (;-))

    It's the use of it by the famous "men of good will but little understanding" that is bad, plus of course the use of it by men of ill will.

    --dave

    • by causality ( 777677 ) on Tuesday April 07, 2009 @04:46PM (#27496285)

      It's the use of it by the famous "men of good will but little understanding" that is bad, plus of course the use of it by men of ill will.

      The former category is much more dangerous. At least most people recognize ill-will when they see it. By far people with good intentions and no comprehension of the "law of unintended consequences" do more damage to the world than do people with openly evil intentions.

      No politician ever increased state power by saying "I'd like to see this nation become a totalitarian state and you should support me because this law will bring it closer to that goal." They do it by saying "this is for your safety" or "this is to stop terrorism" and the people who mean well and don't understand the damage they can do will eagerly eat that shit up. That's true whether or not the politician himself believes anything he is saying.

      • Re: (Score:3, Interesting)

        by Red Flayer ( 890720 )

        No politician ever increased state power by saying "I'd like to see this nation become a totalitarian state and you should support me because this law will bring it closer to that goal." They do it by saying "this is for your safety" or "this is to stop terrorism" and the people who mean well and don't understand the damage they can do will eagerly eat that shit up. That's true whether or not the politician himself believes anything he is saying.

        Well, that brings up an interesting philosophical question --

        • Re: (Score:2, Insightful)

          by Anonymous Coward

          Meaning well does not remove you from the causation of harm.

          Example:
          Just because I don't understand that shooting someone with a gun can kill them doesn't mean I didn't cause that person to die. It just means I am an ignorant fool who killed someone.

          Then again if you follow the train back far enough we can just blame *insert how you think the world came about here* for all evil.

          • by causality ( 777677 ) on Tuesday April 07, 2009 @07:04PM (#27497689)

            Then again if you follow the train back far enough we can just blame *insert how you think the world came about here* for all evil.

            That's why it makes more sense to look at it in terms of enablers who could have chosen differently. The people could study statecraft and propaganda techniques. They could study dictatorships like the Third Reich or Italy under Mussolini to learn how these leaders came to power by preying on the desperation and the weaknesses of the people. They can familiarize themselves with the sorts of excuses and justifications that are given for the expansion of state power. They can learn argumentation and research so that they are equipped to investigate things on their own instead of requiring that premade conclusions be spoonfed to them. In short, they can shed the naivete and the ignorance that must be present before such horrors can arise.

            Any literate adult with Internet access can do all of these things. The only obstacle they could encounter would be their own laziness or unwillingness. I would say that we have a responsibility to do these things because everything that is good about the way of life that we presently enjoy depends on an informed citizenry. Our civilization is on the decline because people think this does not apply to them, or they think that someone else will take care of it, or they think that the latest celebrity-worship is more important.

            The evil politicians are like organisms in an environment. The environment in which they thrive consists of ignorant people who are far too naive and trusting and do not guard themselves against being deceived. If you set up this sort of environment, those organisms will appear in it and will prosper. Thus, I believe it is the people and their ignorance and lack of priorities that are far more to blame, for they provide fertile soil without which this organism could never succeed. It should be assumed that evil men will come along who will try to take advantage of our way of life to suit their selfish purposes. We should be prepared for this and well-able to deal with it by never rewarding it with the power it seeks to have. We are not. We think our enemies are our friends because they know how to tell us what we want to hear. That is the problem.

            • Re: (Score:1, Insightful)

              by Anonymous Coward

              You, my friend, do not understand human nature.

    • by Ungrounded Lightning ( 62228 ) on Tuesday April 07, 2009 @05:18PM (#27496659) Journal

      As I understand it:

      ISPs don't implement the QoS (Type of Service) field because (back before THEY needed it for services) Microsoft deployed an IP stack in Windows that "improved" their own file transfers and other IP traffic by demanding high QoS for everything.

      Because of that (and the threat of bad guys cheating) the ISPs don't trust the field when coming from a customer. So there wasn't a strong driver for implementing QoS in the ISPs and backbone

      IMHO the right solution is for ISPs to:
        - Write service level agreements that guarantee a certain bandwidth of high QoS traffic - for the whole feed to the customer, not per flow.
        - Start honoring the ToS field and policing the data rate at the edge router, and
        - When a packet would be dropped for exceeding the data rate for the enhanced service, instead REWRITE THE ToS FIELD for best-effort delivery (or whatever lower service level seems appropriate) and try to forward it under those terms.

      That way:
        - The ISP doesn't have to classify the flow according to traffic type to give the user high QoS for his critical services.
        - The ISP doesn't have to do a packet-recombine if the packet is fragmented to identify the flow for the trailing fragments (which don't carry the TCP/UDP port number).
        - The user / application can specify what special handling he / it wants.
        - Applications that try to "cheat" can only do so up to the bandwidth cap for the special handling. (But the user paid for that. So he can use his bandwidth for whatever he wants. It's not "cheating" any more.)
        - Excess traffic will still go through as well as it does now.
        - A "cheating" application WILL hurt the user's own really-needs-high-QoS service, giving users and applications providers an incentive not to request excessive QoS. (But it won't hurt ANYBODY ELSE's traffic.)
        - Authors of applications that need high QoS will have an incentive to specify it, since doing so will work.

      • Easy Fix (Score:4, Interesting)

        by bobbuck ( 675253 ) on Tuesday April 07, 2009 @05:46PM (#27496957)
        Charge more for higher QoS. Give a discount for lower QoS.
        • Re: (Score:3, Interesting)

          Charge more for higher QoS. Give a discount for lower QoS.

          That's a given.

          I'd expect plans to include some small amount of VoIP quality 2-way high-QoS as standard (about a couple phone calls' worth plus whatever is needed for the plan's special services). Higher amounts could be obtained by subscribing to a higher-priced plan or dynamically-configured as needed - perhaps for a fee (like dialing a toll phone call or subscribing to a pay-per-view).

          Want your packets to get reserved bandwidth and better treatme

        • by Kozz ( 7764 )
          I think you've got the first part right, anyhow. What business have you ever known to reduce price in such a manner? Any "low" QoS traffic will continue to be billed at pre-QoS billing rates.
      • Brilliant! Just Brilliant.... Anybody poke a hole or two in this yet? JR
      • Let me get this straight.

        You propose that ISP's should count packets tied to a subscriber account in such a real-time fashion as to put this logic to use in rewriting the packet headers in-transit?

        Once you're done actually building a system even capable of that, how do you keep such a bad-ass future network from becoming Skynet?

        Real-time accounting is hard enough--having the networking devices actually make decisions about header mangling based on that accounting on a packet-by-packet basis is not something

      • Wouldn't this still destroy network neutrality? All the customers that have "nothing to hide" and have their packets deep inspected so they can be "more efficiently routed"(true is most cases to be sure, but opens the door to:"you meant to go to the that search engine? Sorry, but all our packets redirect to this search engine because it provides better QoS") and all the "free" customers would be stuck with the bandwidth leftovers.
      • Sorry, it ain't gonna work. You're still trusting the end-user to set the QoS properly. That's just not going to happen. Even someone with good intentions who wouldn't otherwise try to subvert the system is going to get suckered into using a "web accelerator" that munges the QoS. And then he's going to complain about crappy VoIP quality, because he doesn't know he used up all his high-quality allocation downloading a torrent of the Star Wars Holiday Special.

        Any system which relies on the cooperation of th

  • by mrbene ( 1380531 ) on Tuesday April 07, 2009 @04:36PM (#27496151)

    Taking a quick look through the content at the government site, I must say I'm surprised. CC licensed content, links to external resources, a collection of international points of view. I'd be truly impressed if they'd managed to get all these folks in a room together.

    Regardless, kudos to Canada for hitting the 21st century.

    And I was doubly impressed to notice the absence of web beacons / analytics scripts.

  • obligatory (Score:5, Funny)

    by Dan667 ( 564390 ) on Tuesday April 07, 2009 @04:46PM (#27496283)
    inspect this! ... askjdkasjdlajsldkjaskl djaksjdklasjdklajsldaskljdaljdaslkdjalkdjalsdj ... \
  • by rob_benson ( 698038 ) on Tuesday April 07, 2009 @04:52PM (#27496369) Homepage
    D.I. is neither good or bad, it is the illegal or immoral application of the technology that is the problem. I really am amazed that no-one on a technology site noted that the heart of the debate on net neutrality is free speech, not deep inspection.
    • by causality ( 777677 ) on Tuesday April 07, 2009 @04:55PM (#27496405)

      D.I. is neither good or bad, it is the illegal or immoral application of the technology that is the problem.

      It's a technology that almost no one wants except for those who are in a position to abuse it. That makes it difficult or impossible to view it as a "neutral" thing.

      • by 99BottlesOfBeerInMyF ( 813746 ) on Tuesday April 07, 2009 @05:09PM (#27496583)

        It's a technology that almost no one wants except for those who are in a position to abuse it. That makes it difficult or impossible to view it as a "neutral" thing.

        I've seen quite a few "good" uses of DPI, from filtering out content trying to contact worm control channels to gathering statistics on Web site usage for academia. You can use DPI to slow down traffic going to any video hosting site not paying you a kickback or you can use it to filter out a DDoS attack on one of your network's clients. The technology is useful today, but we do need legislation to keep it from being abused.

      • D.I. is neither good or bad, it is the illegal or immoral application of the technology that is the problem.

        It's a technology that almost no one wants except for those who are in a position to abuse it. That makes it difficult or impossible to view it as a "neutral" thing.

        What about this? http://dpi.priv.gc.ca/index.php/what-is-deep-packet-inspection/ [priv.gc.ca]

        DPI has been used for several years to maintain the integrity and security of networks, searching for signs of protocol non-compliance, viruses, malicious code, SPAM and other threats.

        Are you suggesting people don't want a less SPAMy, more secure internet? There's more to it than "oh noes, the isp's are spying my internets!"

        I'm not saying I want them to, there's just more to it than some people realize.

        • D.I. is neither good or bad, it is the illegal or immoral application of the technology that is the problem.

          It's a technology that almost no one wants except for those who are in a position to abuse it. That makes it difficult or impossible to view it as a "neutral" thing.

          What about this? http://dpi.priv.gc.ca/index.php/what-is-deep-packet-inspection/ [priv.gc.ca]

          DPI has been used for several years to maintain the integrity and security of networks, searching for signs of protocol non-compliance, viruses, malicious code, SPAM and other threats.

          Are you suggesting people don't want a less SPAMy, more secure internet? There's more to it than "oh noes, the isp's are spying my internets!" I'm not saying I want them to, there's just more to it than some people realize.

          You and another person suggested using it to thwart spam or worm attacks. I am replying to you since the other person was more reasonable. That is, he did not say "are you suggesting people don't want a less spamy [sic], more secure internet" as though that's the same thing as criticising another wrong solution that cannot solve our problems. The way you did that reminds me of people who say "you mean you don't want to be safe from terrorists?" when you point out that it's wrong to infringe on civil libe

      • by AK Marc ( 707885 )
        It's a technology that almost no one wants except for those who are in a position to abuse it.

        It's a technology that everyone except abusers should love, if used well. Think of it this way, when congestion happens, something must be dropped. So, what do you drop? Do you drop random packets? Or do you identify someting that's drop-tolerant and delay-tolerant and drop those first (up to some point where you'll be dropping more)? Personally, I'd think that people would be happy that their VoIP is priori
        • Re: (Score:1, Insightful)

          by Anonymous Coward

          "Do you drop random packets? Or do you identify someting that's drop-tolerant and delay-tolerant and drop those first?"

          There's no need to look into the packet to tell what the priority should be. Check the header, and see what priority the user gave it, but limit the amount of "high priority" traffic per user if there is congestion. The user doesn't gain anything by "cheating" and labeling their bittorrent or FTP as high priority - all they'll do is hurt their VoIP or streaming video.

          The TCP headers alrea

          • by smash ( 1351 )

            Why would you want to implement a CPU intensive, privacy-violating scheme like DPI to get around that?

            So you'll happily let my malware through at high priority, simply because it puts a high priority in its TCP header?

            Cheers dude.

        • by Hatta ( 162192 )

          It's a technology that everyone except abusers should love, if used well.

          Of course. If you don't have anything to hide, you have nothing to fear.

      • Re: (Score:2, Insightful)

        by rob_benson ( 698038 )
        I use it for worm control and attack detection on a corporate network: nothing wrong with that at all. It is completely untrue that the only application of DI is for spying or nefarious activity. Its like blaming bit torrent protocol for piracy. Again, it is use of the tool that is the problem.
    • by Anonymous Coward

      The post office reading every letter mailed is the modern day equivalent to DPI.

      How in the bloody fuck can you say the post office reading every delivered letter on any terms is good at ANY time for ANY reason?

      DPI is the same, there is no legit usage for this tech NONE AT ALL.

  • by SirBitBucket ( 1292924 ) on Tuesday April 07, 2009 @04:54PM (#27496389)
    Oh, must be in the wrong thread...
  • by koan ( 80826 ) on Tuesday April 07, 2009 @04:56PM (#27496409)

    Doesn't a good encryption system stop DPI from giving any useful information?

    • by gsgleason ( 1241794 ) on Tuesday April 07, 2009 @05:00PM (#27496457)
      Yes. If using ssl to secure whatever application is in question, they cannot see past the transport layer.
      • by green1 ( 322787 ) on Tuesday April 07, 2009 @05:10PM (#27496599)

        They can however arbitrarily assume all encrypted data to be hostile and filter accordingly...

        • Not really - there's always going to be a legitimate consumer need for encrypted traffic eg anything involving money (banking, purchasing goods). If you have to allow some encrypted traffic and there's no way to tell the difference between legitimate and "illegitimate" encrypted traffic then you can't arbitrarily assume all encrypted data to be hostile and filter accordingly...
    • by BitterOak ( 537666 ) on Tuesday April 07, 2009 @05:07PM (#27496559)

      Doesn't a good encryption system stop DPI from giving any useful information?

      Any useful information? Sure! There is lots of useful information that can be gleaned even when encryption is used. Who are you communicating with? What protocol are you using? By looking at packet timing and packet sizes, much more information can be obtained than you might think, such as: are you web surfing vs. interactive keyboard login? Are you tranferring large files or reading short web pages? And if the structure of the web pages of the target site is known, the size of the packets transferred might even reveal which pages you were visiting. Some have even reported the ability to make educated guesses about keystrokes in interactive sessions based on timing of packets. Admittedly some of these features will have to wait for the next generation of DPI technology, but even today, a great deal of information can be collected.

      • by Chabo ( 880571 )

        Some have even reported the ability to make educated guesses about keystrokes in interactive sessions based on timing of packets.

        So that's how the Comcast employee was able to beat me at CS -- he knew my bunny-hopping pattern!

      • Re: (Score:1, Insightful)

        by Anonymous Coward

        Yes, analyzing packet sizes and frequencies can work in theory... until it is put into practice, because then it would be trivial for the encryption users to rewrite their servers and clients to send random-sized encrypted packets at random intervals and mess up any information you may have gained.

        • Why would that mess anything up? The whole point, usually, is to throttle people using P2P software like BitTorrent. All your suggestion would do would be to put a big neon arrow over their heads.

    • Re: (Score:2, Insightful)

      Slightly off the point from this, but related: QoS mechanisms will probably just default encrypted traffic to a lower service class. That's the quick and easy way to handle it.
    • by gweeks ( 91403 ) on Tuesday April 07, 2009 @05:31PM (#27496805) Homepage

      Take a look at:

      SSLIA [netronome.com]

      Deep packet inspection inside SSL sessions. It's not the only one either.

    • Re: (Score:1, Interesting)

      by Anonymous Coward

      Uh, no, not with some of the new devices comeing along for firewalls. I know my company is preparing to upgrade their firewalling (global presence, 100K+ employees) with such technology explicitly for 2 "big" problem areas as they see it: 1. Intellectual property theft; 2. "Inappropriate" site access (porn, etc.).

      As I read the proposal (as part of a wide list of reviewers as potential stakeholders due to my 2-bit role in web administation) I was appalled to realize that this is commercial off-the-shelf te

    • by AK Marc ( 707885 ) on Tuesday April 07, 2009 @06:22PM (#27497285)
      Doesn't a good encryption system stop DPI from giving any useful information?

      Mostly. However, many DPI boxes are now including heuristics as well. Encrypted stream of 20k in and out to a single IP? Sounds like VoIP to me, toss it in that bucket. Encrypted 10k out and 1M in to a single IP? Sounds like a file download, toss it in that bucket. Encrypted 10k in from 20 hosts and 5k out to 15 hosts? Sounds like P2P, toss it in that bucket. If I can make such guesses easily, someone smarter than me has already coded those in and knows what your encrypted data is. Not what it contains, as that's never the goal of DPI, but what you are using it for. So encrypt it all you want. They'll know what you are up to anyway. Unless you do someting like Tor downloads and then it'll look more like P2P and you'll get even worse performance. Or, as someone else mentioned, if it isn't easily identifiable encryption, then they treat it like the least desired traffic. Hide all you want and they can still get you for it.
  • by Nom du Keyboard ( 633989 ) on Tuesday April 07, 2009 @05:05PM (#27496523)
    You go for DPI.
    I go for encryption, SSL, and HTTPS. Even my slowest home system can easily handle this.
    • If my DPI reveals encrypted data, I give you the lowest QoS. What's your reaction now ?
      • Arms race of course as various and ever changing schemes are used to make the encryption appear to be something else.

    • And luring you into accepting a man-in-the-middle SSL key is.... how difficult? Or stealing your target website's keys, aor getting them with a warrant-free patriot act request?
    • I go for encryption, SSL, and HTTPS.

      Then how do you log in on slashdot?

      It takes two paranoid people to use encryption. We really need everyone to be paranoid, which is a hard sell.

      Even my slowest home system can easily handle this.

      Can the server you're slashdotting handle one thousand (or million) times what your home PC can handle?

      Sometimes, when I'm transferring stuff around at home, ssh (sshfs) or kcryptd is the bottleneck, not the disk/wire.

      Damn, that makes me sad :(

  • If an ISP decides to inspect all traffic, doesn't this make them responsible for the traffic? As in... you are not a common carrier, you do not have the "I didnt know" defense and now anything (virus's, copyright,child porn, etc..) that goes through you is your responsibility? I assume there is a money solution to this that will make this problem disappear, like buying a few laws or stacking some judicial BB's somewhere.. but I thought you either let it all go or you buy the responsibility..
  • by SoupIsGood Food ( 1179 ) on Tuesday April 07, 2009 @09:38PM (#27498889)

    Unencrypted data will always get you in trouble. There is no reason in the year two thousand and nine to send or receive anything over the internet without encapsulating it in a SSH or SSL tunnel. Whine all you like about performance hits, but if the technology has reached the point where your residential ISP can look inside every packet you send to see what's there - in real time - then the point has come to spend some processing power on protecting your data in mid-flight, or invest in some encryption hardware.

    I'm more than half convinced that this is how everything =inside= a LAN should communicate with each other, too. The firewall should allow port 22, port 443, and drop the rest.

    While we're at it, everything should be firewalled right at the VLAN, on the switch.

    • Re: (Score:3, Funny)

      by Derleth ( 197102 )

      The obvious solution is to block or severely slow down all encrypted traffic (that is, all traffic the ISP can’t interpret). This would have the obvious effect on online banking, which could be solved by the ISP’s computers handling it: The SSL tunnel stops at your ISP, which inspects the decrypted packets before handing them to you. You know the ISP isn’t going to do anything bad with the information because they told you so (in specific, there’s both a contract and fraud laws stopp

      • Actually it should work like this

        1) Measure the bandwidth usage of encrypted data per month.
        2) If it is over some limit, throttle the speed.

        That way torrents will work for a while and then slow down. Even a throttled connection should be able to handle online banking. This is only on the cheap service.

        I'd also sell a more expensive service with higher limits, static IP addresses and less contention. In fact I'd have a load of options, at the top of which you'd basically be able to max out the connection 24x

        • Here in the UK on Virgin's (possibly Phorm [phorm.com]-laced offering we have that on a daily basis.

          There are currently two "prime time" zones in the day and if you use too much bandwidth during those times you get your service cut in half until midnight.

          Sure, they are giving us a free upgrade in speed, but it's totally asynchronous and potentially Phorm riddled.

          On the upside, they are reliable (once you have it working), cheap (enough), let you have any port you want all the time and don't throttle BitTorrent.
  • As the DPI box has access to, and holds records of, an extroardinary stream of data that mnust make it an incredibly tempting target for hackers. What have they put in place to prevent it being compromised?
  • vpn? pgp? why is this news?
  • The uneducated .. (Score:2, Insightful)

    by tsreyb ( 396650 )

    .. boggle my mind.

    Here's what I say to all you paranoid conspiracy freaks ..

    go ahead and encrypt your dang traffic. The Internet companies don't really care about the CONTENT of your traffic.

    Rather, they want to know what TYPE of traffic you're using - file transfer, web browsing, voice, video.

    You think I'm wrong that they don't care about your content. I'm sure you think I'm wrong - because every one of you posting on this thread is f*cking paranoid.

    But I can tell you first hand - they don't give a damn.

    Yo

If all else fails, lower your standards.

Working...