User User name Password  
   
Saturday 1.2.2025 / 04:23
Search AfterDawn Forums:        In English   Suomeksi   Pć svenska
afterdawn.com > forums > software, operating systems and more > windows - p2p software > p2p blocklists - and security
Show topics
 
Forums
Forums
P2P Blocklists - and security
  Jump to:
 
Posted Message
revgord
Newbie
_
11. January 2010 @ 11:15 _ Link to this message    Send private message to this user   
Hello.
I have been noticing a high level of traffic from locations in my P2P block list. After searching out the cause I have discovered a few things that might be of interest.

Details:
P2P downloads handled by ”torrent (utorrent.com)
Blocklists handed by peerguardian2 (phoenixlabs.org)
Browser is usually Opera (opera.com)
AdBlocking by hosts file done with MVP (mvps.org)hosts.htm
OS is Win XP
Firewall is Jetico (jetico.com)

PG2 reported a number of contact attempts any time ”torrent was running. This even happened when there were no uploads or downloads.

All these attempted connections were stopped by making configuration changes in ”torrent.

Specifically . . .
Disable DHT (distributed hash table)
Disable local peer discovery
Disable peer exchange
Disable "ask tracker for scrape information"

This stopped blocklist IPs while ”torrent was idle.

After starting a download that was unlikely to be monitored by the RIAA (National geographic free backgrounds) there were no attempts to contact my machine from any in my blocklists.
(NOTE all the features disabled above)

When I asked ”torrent to "Copy Peer List" from the fastest seeder I began to see a number of connection attempts from IPs in my blocklist.

My conclusions include . . .
1. Anti P2P agencies are actively seeding their own content.

2. Their level of access to your IP can be greatly reduced using PeerGuardian, ProtoWall or some other blocklist based protection.

3. Their level of access to MY IP can be greatly reduced if all of us use blocklist based protection.

4. Turning off "peer exchange" and DHT options in your torrent client may reduce our exposure to snooping by MPAA or RIAA or their pawns.

5. We need to have a number of different layers of protection to help us block Ads, spam, anti P2P and other unwanted traffic.

I would love to have your observation & opinions.

BTW, I am in Canada where the laws are currently more friendly than in the US.

Pastor Gordon
Advertisement
_
__
Mez
AfterDawn Addict
_
18. January 2010 @ 14:27 _ Link to this message    Send private message to this user   
Why did you disable "ask tracker for scrape information"?

I think it does not matter where you are. The media mafia has started 'black ops'. I think they are funding hackers by some back door method so their funding will not be traced. They may be seeding tainted apps and/or infected goods with special malware. What I think they are funding would be illegal anywhere. I suspect they are putting robots in your computer. One can only guess what they are using them for.
revgord
Newbie
_
18. January 2010 @ 14:37 _ Link to this message    Send private message to this user   
Originally posted by Mez:
Why did you disable "ask tracker for scrape information"?
Ask tracker for scrape information tells ”Torrent to scrape the tracker (ask for peer and seed counts). By default, the tracker is scraped only when the torrent job is started, but this can be changed.

I wanted to disable all peer info exchange.
I did not understand scrape info so I disabled it.

You are right that it probably makes no difference.


You also said "I think it does not matter where you are."

Legally, Canada is far more friendly than the USA so I am less worried about legal prosecution.

You mentioned "I suspect they are putting robots in your computer."

It is easily done by having the "anti P2P organizations" download the torrent, and then their IP gets added to the torrent by peer exchange.
not "bots", but just being a part of the torrent network with peer exchange enabled.


Pastor Gordon
Mez
AfterDawn Addict
_
18. January 2010 @ 15:14 _ Link to this message    Send private message to this user   
There is a recent post about someone caught his computer contacting addresses on his block list. 2-3 weeks ago my Foxfire was infected with something VERY nasty. I started thinking why Foxfire. Because it can communicate through the firewall. I did not catch my computer sending messages back but I didn't look. I was too busy killing it. I am here just to take inventory as to what else has hit the fan.

Today my blocker was disabled. I pulled the plug on my computer and started up in safe mode and reinstalled a virus scanner and ran a scan. Hopefully, I acted in time. I was at the computer when it happened. I discovered my peerguardian url had been changed to something that looked like peergurdian but was not. I found that out today because I suspected it had been tampered with. I did this all in safe mode and the site was not the same site that I saw a few days earlier. That site said that they were not supporting pg2 anymore but had a new product you could instal. I need to look into that further. I am doubting my sanity on that one.
Advertisement
_
__
 
_
revgord
Newbie
_
19. January 2010 @ 07:53 _ Link to this message    Send private message to this user   
Originally posted by Mez:
2-3 weeks ago my Foxfire was infected with something VERY nasty. I started thinking why Foxfire. Because it can communicate through the firewall.
the "Why Firefox" question is more detailed.

Most browsers have a method for allowing "helper applications" and "tool bars" this makes them vulnerable. When ever you allow someone else to choose what code you run you open a Pandora's box of possible trouble.

Your firewall should allow the following ports open to your browser:
20/TCP FTP – data Official
21/TCP FTP—control (command)
80/TCP,UDP Hypertext Transfer Protocol (HTTP)

the problem comes when you allow scripts or helper applications to run code rather than simply display web pages or download files.


My favourite way to remove viruses is to boot from another device that allows for a web based virus scan. I usually boot from Knoppix (linux boot CD) when I have to get rid of windows viruses.

My other option is to remove the infected hard drive and attach it to a USB/IDE adapter (ebay item 27ae97c7b6)
then I scan from a known healthy computer.

http://cgi.ebay.ca/3-in-1-USB-2-0-To-SAT...=item27ae97c7b6



Pastor Gordon
Related links
Donwload the latest version of DC++ from here.
Download eMule from here.
 
Related forum topics Posts Last post Forum room
Court tells woman to remove BitTorrent, P2P software 4 5. June 2015 News comments
need a special P2P just for sending a file to a friend. 2 22. September 2013 Windows - P2P software
Germany limits P2P piracy fines 1 1. July 2013 News comments
Unauthorized P2P music sharing falls by 26 percent 10 28. February 2013 News comments
Japan sneaks anti-piracy messages into P2P networks 2 11. February 2013 News comments
Is this the end of French anti-P2P agency Hadopi? 1 5. August 2012 News comments
using web proxys in p2p 2 19. May 2012 Windows - P2P software
Headweb offers DRM-less movie downloads using P2P 22 19. April 2012 News comments
Man faces maximum of 210 years for P2P child porn trading 79 11. January 2012 News comments
Internet entrepeneur sues CNET for distributing P2P software 7 20. November 2011 News comments

 
afterdawn.com > forums > software, operating systems and more > windows - p2p software > p2p blocklists - and security
 

Digital video: AfterDawn.com | AfterDawn Forums
Music: MP3Lizard.com
Gaming: Blasteroids.com | Blasteroids Forums | Compare game prices
Software: Software downloads
Blogs: User profile pages
RSS feeds: AfterDawn.com News | Software updates | AfterDawn Forums
International: AfterDawn in Finnish | AfterDawn in Swedish | AfterDawn in Norwegian | download.fi
Navigate: Search | Site map
About us: About AfterDawn Ltd | Advertise on our sites | Rules, Restrictions, Legal disclaimer & Privacy policy
Contact us: Send feedback | Contact our media sales team
 
  © 1999-2025 by AfterDawn Ltd.

  IDG TechNetwork