Tom Eastep wrote:>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Wahid Belhaouane wrote:
> | how to block edonkey traffic with shorewall ?
>
> I believe that you mentioned that you had previously used ftwall for
> that purpose -- Shorewall interfaces with ftwall. Go to the Shorewall
> site and search for ''ftwall''.
For the moment it seems that eDonkey uses tcp 4661, 4662 (server) and
udp 4665 (client):
REJECT loc net tcp 4661,4662
REJECT loc net udp 4665
As always, not 100% reliable since future updated versions of the
software will most likely alter specific ports, but 100% client
irritated with delays, guaranteed. :)
Cisco has some info on blocking specific p2p ports with the PIX, note
that some versions of these programs are not up to date.
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a00801e419a.shtml
--
Patrick Benson
Stockholm, Sweden