Securing Ip Addresses In Emule Tech discussion
#1
Posted 16 April 2007 - 02:32 PM
Can anyone see a problem with the following idea.
Emule logs into a server ( 1 of many )
Server assigns the client a number ( a realy big maybe 64 bit or 128 bit number ) and stores the IP address against that number.
From this point any transactions taking place are done with a ServerID number which maps to an IP address for that server and then the number for the client which the server turns into an IP address through a simple lookup table.
thus if we had 3 servers called 1, 2, and 3
and client 202.68.42.32 connected to server 1 it would be assigned number 100
the client then requests to look for a file foo.bar and thus this request would be sent to servers 1, 2 and 3
1:100:Seek foo.bar
the server 2 then discovers that client 1023 IP(205.22.44.55) has the file foo.bar and responds
2:1023:Found foo.bar to server 1
Server 1 then starts a transfer in much the same manor - note that NO IP address has been sent to the client.
and thus no one can hit you over the head with a hammer.
Input welcom
#2
Posted 16 April 2007 - 02:37 PM
Trouble connecting to a server? Use kad and /or refresh your server list
Strange search results? Check for fake servers! Or download morph, enable obfuscated server required, and far less fake server seen.
Looking for morphXT translators. If you want to translate the morph strings please come here (you only need to be able to write, no coding required. ) Covered now: cn,pt(br),it,es_t,fr.,pl Update needed:de,nl
-Morph FAQ [English wiki]--Het grote emule topic deel 13 [Nederlands]
if you want to send a message i will tell you to open op a topic in the forum. Other forum lurkers might be helped as well.
#3
Posted 16 April 2007 - 02:37 PM
Seven for the Dwarf-lords in their halls of stone,
Nine for Mortal Men doomed to die,
One for the Dark Lord on his dark throne
In the Land of Mordor where the Shadows lie.
One Ring to rule them all, One Ring to find them,
One Ring to bring them all and in the darkness bind them
In the Land of Mordor where the Shadows lie.
Dark Lord of the Forum
Morph your Mule
Need a little help with your MorphXT? Click here
#4
Posted 16 April 2007 - 02:44 PM
Andu, on Apr 17 2007, 02:37 AM, said:
Hang on I'm a little confused here, I was reading that if a client logged onto a server it is possible for that client to then get a list via ip addresses ( and possibly other detail ) of who was downloading foo.bar
But if the returned value is just a number that was assigned to that client for that session then all they would see is a number as opposed to an IP address I.E it would be anonymous, admitidly not point to point as its now point-> server -> point but IP address could not be logged.
That was the idea .
#5
Posted 16 April 2007 - 03:24 PM
The server keeps the IDs. It only gives the source IPs once you've added it to your download list. You cannot to peer to peer without IPs.
Seven for the Dwarf-lords in their halls of stone,
Nine for Mortal Men doomed to die,
One for the Dark Lord on his dark throne
In the Land of Mordor where the Shadows lie.
One Ring to rule them all, One Ring to find them,
One Ring to bring them all and in the darkness bind them
In the Land of Mordor where the Shadows lie.
Dark Lord of the Forum
Morph your Mule
Need a little help with your MorphXT? Click here
#6
Posted 20 April 2007 - 09:04 AM
For example, to download file1, you first have to download a little protected key-file, file0, from the uploader, created and protected by the uploader as his intellectual property. To unlock it, you have to upload a little bit of file1 to the uploader, forcing you to upload file1 too. If you crack file0 without uploading some of file1 to the uploader, you're breaking the law for breaking content protection on file0. Of course it is up to the uploader (who is the copyright owner of file0) to pursue you, or not, which he will do if you later come and harass him for uploading file1 to you.
That protocol could be an option which releasers can disable in their client so they can upload the first few kb to anyone who wants it (someone has to supply some kbs freely).
Result: Non-releasers (99% of the community) are protected from harassment. Releasers are taking a risk anyway, and they seem to enjoy it. But supplying a few kb's freely is perhaps not that much of a big deal.
It's silly, I know... But hey, others (i.e. the harassment specialists) are using much bolder ideas everyday, and getting away with them.
This post has been edited by xylo9: 20 April 2007 - 09:49 AM
#7
Posted 20 April 2007 - 07:12 PM
xylo9, on Apr 20 2007, 12:04 PM, said:
For example, to download file1, you first have to download a little protected key-file, file0, from the uploader, created and protected by the uploader as his intellectual property. To unlock it, you have to upload a little bit of file1 to the uploader, forcing you to upload file1 too. If you crack file0 without uploading some of file1 to the uploader, you're breaking the law for breaking content protection on file0. Of course it is up to the uploader (who is the copyright owner of file0) to pursue you, or not, which he will do if you later come and harass him for uploading file1 to you.
That protocol could be an option which releasers can disable in their client so they can upload the first few kb to anyone who wants it (someone has to supply some kbs freely).
Result: Non-releasers (99% of the community) are protected from harassment. Releasers are taking a risk anyway, and they seem to enjoy it. But supplying a few kb's freely is perhaps not that much of a big deal.
It's silly, I know... But hey, others (i.e. the harassment specialists) are using much bolder ideas everyday, and getting away with them.
Four words for you: "Free Open Source Software"
In other words - you can't force anything. And laws are different in every country, network is global.
Not that this already isn't said countless times before - some people just don't seem to get the concept of global network and free software.
#8
Posted 21 April 2007 - 11:44 PM
#9
Posted 22 April 2007 - 08:36 AM
xylo9, on Apr 20 2007, 02:04 AM, said:
For example, to download file1, you first have to download a little protected key-file, file0, from the uploader, created and protected by the uploader as his intellectual property [...]
Math is delicious!
MmMm! Mauna Loa Milk Chocolate Toffee Macadamias are little drops of Heaven ^_^
Si vis pacem, para bellum DIE SPAMMERS DIE!
#10
Posted 22 April 2007 - 10:36 AM
xylo9, on Apr 22 2007, 02:44 AM, said:
Wrong again.
You can not force anyone to use your program for downloading (unless you start brainwashing people). So if people don't like it (and they won't, I guarantee this), they will use modified clients and they won't download from you.
If you try to implement this on the network protocol level, you'll find yourself sitting alone in that network, waiting for someone to download from you.
And again - discussed many times before, absolutely nothing new here.
#11
Posted 22 April 2007 - 11:56 AM
As an example, here in france, police services don't waste ressources trying to pry or know what you UL/DL, if they want to get you for some reason they just get a judge to smack a suspicion of child porn on you, stream in and seize your HD, then they take their measly time finding an unhappily copywrighted mp3 file you used for your brother in law's marriage and smack a civil suit on you.
Just to say that it may make absolutely no difference whatever you implement, hiding under the covers is ok for kiddies and austriches
This post has been edited by cplif: 22 April 2007 - 11:58 AM