I''ve just recently setup a linux bridge that is doing some traffic
shaping/policing using HTB/SFQ for a small college network.  Everything
is working great!!! but I''ve recently discovered something that seems
to
break my filter/shaping scheme.
I have 4 classes one for unrestricted bandwidth usage (web/ssh/ftp/etc..),
slightly restricted (mail/internet games/etc...), a class for the NNTP,
and a class for "all the rest."  Most of the classifiers are based
on tcp/udp ports and/or on a specific machine or local subnet...
For some of my machines Kazaa or the GNUTELLA protocol is running itself
on port 80.  Is there any way to filter the GNUTELLA traffic into my bulk
traffic class ("all the rest") even if GNUTELLA is running on port 80?
From reading the archives... it seems there is a iptables type solution (I
built the iptables/nat+bridging patch into the kernel) but I haven''t
had
any luck in finding it let alone another solution using tc/match filters.
-- 
David DeLauro
Computer Systems Analyst
Saint Joseph''s College
Rensselaer, IN 47978
Education is the progressive realization of our ignorance. - Dot, Animaniacs
When secrecy becomes a certain protection in whose shadow embryonic ideas are
born and nurtured then it becomes indeed a sacred silence. For every form of
life, from flower to very man himself, requires this fostering period of
protected germination. - Rollin Malbone Pease
There is no greater tyranny, than that which is perpetrated under the shield of
law and in the name of justice. - Montesquieu
_______________________________________________
LARTC mailing list / LARTC@mailman.ds9a.nl
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Saturday 25 January 2003 00:23, David DeLauro wrote:> For some of my machines Kazaa or the GNUTELLA protocol is running itself > on port 80. Is there any way to filter the GNUTELLA traffic into my bulk > traffic class ("all the rest") even if GNUTELLA is running on port 80?may the TOS field is different between an http and a gnutella connection, just use tcpdump to find that out, if so filter according it. ps: is gnutella tcp, I thought most of that networks use udp. - -- Regards, Robert - ---------------- Robert Penz robert.penz AT outertech.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE+MdCA8tTsQqJDUBMRAlMSAJ44mIfa0En4aSuD3IbGR5Bz8awYmgCeIsdC 6a+IqHdgLYOvFU251nqIIjQ=WxpR -----END PGP SIGNATURE----- _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
David DeLauro wrote: [Filtering Gnutella/Kazaa on port 80]>From reading the archives... it seems there is a iptables type solution (I > built the iptables/nat+bridging patch into the kernel) but I haven''t had > any luck in finding it let alone another solution using tc/match filters.You need a rule matching packet content. Do a packet dump of kazaa/gnutella traffic and see if there is anything unique in the packets that you can filter on (the hard part is not to get any false positives/negatives). One option could perhaps be to set up a transparent squid proxy and see if it is possible for squid to do bandwidth limiting on requests containing certain headers. -- LarsG Fight the EUCD! Find your local organization at http://eucd.info/who.fr.php _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/