Hot Downloads

Welcome, Guest
Username: Password: Remember me

TOPIC: Blocking Ares Galaxy

Blocking Ares Galaxy 10 years 3 months ago #15213

  • logikal
  • logikal's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
Does anyone know what would be the most efficient way of blocking Ares connections on my firewall appliance? Seems like it's connecting to random hosts on many random ports and newer versions does "nat-punching". I am not too familiar with this P2P client, can anyone give me some insight? Thanks
The administrator has disabled public write access.

Re: Blocking Ares Galaxy 10 years 3 months ago #15215

  • nske
  • nske's Avatar
  • Offline
  • Expert Member
  • Posts: 613
  • Karma: 0
You do not mention what is your firewall appliance, however if that's not an issue, IPP2P extension for IPtables works for blocking.
The administrator has disabled public write access.

Re: Blocking Ares Galaxy 10 years 3 months ago #15228

  • logikal
  • logikal's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
thanks for the reply I will check it out but I doubt I will be able to implement it on my current firewalls. the applianced I was referring to is a proventia m30 and a sofaware appliance using checkpoint fw.
The administrator has disabled public write access.

Re: Blocking Ares Galaxy 10 years 3 months ago #15239

  • nske
  • nske's Avatar
  • Offline
  • Expert Member
  • Posts: 613
  • Karma: 0
Unfortunatelly it's very difficult to detect any p2p traffic judging only from Network/Transport protocol headers -so it's not possible to configure conventional layer 3 - 4 firewalls for that purpose. Perhaps it's easier to match and allow everything you want, and use a default deny policy;

An other thing that could work, is to use traffic shaping on connections initiated at the default ports of Ares (most likely there are some default ports that initially attempts to use) limiting the available bandwidth for these to a pathetic 0.5 K/S or so, so that ARES (or any p2p) manages to connect, but not much else.
The administrator has disabled public write access.
Time to create page: 0.077 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup