[27716] in North American Network Operators' Group
Re: Napster and others...
daemon@ATHENA.MIT.EDU (Michael Shields)
Thu Mar 9 18:06:39 2000
To: "Erik E. Fair" <fair@clock.org>
Cc: nanog@merit.edu, "Michael Ridley" <michael@napster.com>
From: Michael Shields <shields@msrl.com>
Date: 09 Mar 2000 22:58:16 +0000
In-Reply-To: "Erik E. Fair"'s message of "Thu, 9 Mar 2000 10:30:56 -0800"
Message-ID: <877lfbzr7b.fsf@challah.msrl.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Errors-To: owner-nanog-outgoing@merit.edu
In article <v0422080ab4ed9bb6c397@[216.240.40.194]>,
"Erik E. Fair" <fair@clock.org> wrote:
> Precis: they (developers, users) can modify the application to use
> spread-spectrum style port numbers that constantly change throughout
> the life of a session, which makes it effectively impossible to
> filter using existing technology.
Filtering such traffic is within the state of the art -- proxy
firewalls are not new. But agreed that your Cisco routers cannot
stop it.
--
Shields.