p2p, anonymity and security
Greg Rundlett
greg at freephile.com
Thu Mar 11 00:04:57 EST 2004
I have several goals in the area of peer-to-peer technologies (or
distributed client-server, whatever you want to call it.) I figured
this would be a great topic of discussion, and although I certainly have
more questions than answers at this point, I'd bet it would make a great
topic at an upcoming LUG meeting.
I would like to get bittorrent working, to be able to download ISO's and
free software more quickly than perhaps I've been able to in the past,
and at the same time donate my spare bandwidth to those around me who
are looking for the same files.
I also want to get a general purpose p2p tool similar to Napster, for
sharing ogg, mp3 or other multimedia files. The number one prerequisite
here is which tool/protocol offers the best anonymity.
Last, but not least, I am finally taking steps to secure my little
lan-behind-a-linksys. I have not had the time to understand iptable
incantations, but it looks to me that a good script for setting up
access to these various networks is found at the link below. It
includes a succinct rundown of the various ports to open in your
firewall, with descriptions of the networks:
http://mldonkey.berlios.de/modules.php?name=Wiki&pagename=WhatFirewallPortsToOpen
I downloaded KMLDonkey, plus MLDonkey and am pleasantly surprised that
MLDonkey can support various networks, including bittorrent. The web
client interface for mldonkey is quite impressive, so you really don't
need KMLDonkey. (Note that MLDonkey would not install without doing the
local install of objectCAML and LablGTK)
I poked a few holes in my Linksys to forward packets to my Linux server.
So, my first question...Is a Linksys Router doing 'firewall' duty and
NAT easy to get past? If the answer is yes, then what should I do? Use
a firewall-specific distro to convert my old P133MHz box into a Linux
firewall? Maybe someone wants $100 to come over and show me how it's
done? (location Newburyport, MA or E. Kingston, NH)
Secondly, for true anonymity, I'm guessing you would have to add a layer
somewhere along the lines, because even in a decentralized system, you
still have a source PC 'A' (potentially) logging transactions and
destination IPs, which then can be correlated to a netblock, to an ISP
'B', to a customer 'C'. So if PC 'A' is confiscated, or monitored, and
ISP 'B' is served with a John Doe suit, then wham-o 'C' is out $2,500 to
the RIAA because teenagers like to download music. Anyone using this
anonymizer layer?
Lastly, I can't tell yet if I still need to go through the setup of my
.torrent files and download them etc. as described in the BitTorrent
site (http://bitconjurer.org/BitTorrent/guide.html). If anyone knows
whether mldonkey will do this automagically for me, I'd like to know.
Thanks,
Greg
More information about the Discuss
mailing list