Encryption

Post Reply
Elahrairah
Member
Member
Posts: 20
Joined: Sat Dec 29, 2007 1:36 pm

Encryption

Post by Elahrairah »

Hi deluge team/users

Just wonder if there will be any further developments with regards to trying to bypass some traffic shaping measures employed by ISP's.. The current setup on the new deluge isnt managing to help me avoid traffic shaping one bit right now which is a real shame.

Regards
El-ahrairah
User avatar
Ux64
Seeder
Seeder
Posts: 140
Joined: Wed Nov 14, 2007 5:02 am
Location: System Specialist

Traffic shaping, how to get rid of it

Post by Ux64 »

There is nothing much that can be made. It depends so much what kind of traffic shaping they're using. I'm network administrator and if I see something on network that I don't like it's quite sure that I'll block it pretty soon.

If you force full encryption and use non default port. That's quite much it.

Of course there could be some random port hoping, random routing, udp protocol. But it's not bit torrent anymore.

GNUnet might be something what you're looking for. Although it doesn't utilize port hopping. I don't know if there are any port hopping protocols out there? Anyone?

My old tip with this issue is: Vote with your money. Get rid of sucker ISP. If they don't deserve your money, why you're still paying?

I'll pay about $ 90 / month for my net connection and I expect it to be unfiltered and full bandwidth without stupid restrictions.

If no full port hopping udp / encryption stuff can't be used. I would masquerade traffic as HTTPS traffic and restricting number of connections to reasonable number could do the trick. And naturally if you're using HTTPS "bridge" then you also should set all clients to use port 443 or you're toasted in no time.

Also I could make list of popular torrent trackers. And if I see any traffic toward those services, I'll cap your bandwidth. So, I would prefer to use trackerless version if I want to be stealthy.
Post Reply