Forban a simple link-local opportunistic p2p free software



Similar documents
Content Distribution Networks (CDN)

SSL Tunnels. Introduction

Introduction to Computer Security Benoit Donnet Academic Year

Proxies. Chapter 4. Network & Security Gildas Avoine

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

File Transfer Protocol - FTP

Preventing credit card numbers from escaping your network

DDoS Vulnerability Analysis of Bittorrent Protocol

1 Introduction: Network Applications

FTP Service Reference

A Research Study on Packet Sniffing Tool TCPDUMP

RSA SecurID Ready Implementation Guide

Indexing Full Packet Capture Data With Flow

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates

Debugging GlusterFS with Wireshark

Network Probe User Guide

CLARIION PERFORMANCE MONITORING SCRIPTING GUEST HOME PDF

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Linux Network Security

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS

COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS

Network Traffic Analysis

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

A Tool for Evaluation and Optimization of Web Application Performance

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

What Does Tequila Have to Do with Managing Macs? Using Open Source Tools to Manage Mac OS in the Enterprise!

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

REQUIREMENTS LIVEBOX.

Application Layer. CMPT Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux

Introduction to Git. Markus Kötter Notes. Leinelab Workshop July 28, 2015

Lightweight DNS for Multipurpose and Multifunctional Devices

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

SECURE Web Gateway. HTTPS/SSL Technical FAQ. Version 1.1. Date 04/10/12

Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL

DATA COMMUNICATOIN NETWORKING

AppLoader7. Windows Server 2008 Injector Optimization. Protocol Independent Load Testing

Computer Networks - CS132/EECS148 - Spring

Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February Version 1.

Aspera Connect User Guide

Websense Content Gateway v7.x: Troubleshooting

[ X OR DDoS T h r e a t A d v i sory] akamai.com

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

User Service and Directory Agent: Configuration Best Practices and Troubleshooting

SOFTWARE INSTALLATION INSTRUCTIONS

Configuring Snort as a Firewall on Windows 7 Environment

Web-Based Data Backup Solutions

Network and Services Discovery

Version control with GIT

File Transfer Examples. Running commands on other computers and transferring files between computers

Bit Chat: A Peer-to-Peer Instant Messenger

GregSowell.com. Mikrotik Basics

Pre Sales Communications

Configuring Snort as a Firewall on Windows 7 Environment

Start the HTTP Administration Server. Sign On to the Administration Server

CS 360 Internet Programming

Running the Tor client on Mac OS X

Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Configuring MailArchiva with Insight Server

Project 2: Firewall Design (Phase I)

Computer Networks. Secure Systems

What is Web Security? Motivation

Chapter 7. Address Translation

Internet Content Distribution

Network Security: Workshop

Protocols. Packets. What's in an IP packet

FREE DOWNLOAD BOOKS SMU MBA IT STUDY MATERIAL PDF

Release Notes: J-Web Application Package Release 15.1A1 for Juniper Networks EX Series Ethernet Switches

8 steps to protect your Cisco router

Creating an Intranet Website for Library & Information Services in an Organization

TCP for Wireless Networks

Penetration Testing with Kali Linux

CS 557- Project 1 A P2P File Sharing Network

Pre-configured AS2 Host Quick-Start Guide

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Week Overview. Running Live Linux Sending from command line scp and sftp utilities

Classic Grid Architecture

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

ERserver. iseries. Secure Sockets Layer (SSL)

Aspera Connect User Guide

Filtering remote users with Websense remote filtering software v7.6

P2P File Sharing: BitTorrent in Detail

A perspective to incident response or another set of recommendations for malware authors

Evolutionism of Intrusion Detection

Installing and Using WinSCP Client

Introduction to Computer Networks

Transcription:

Forban a simple link-local opportunistic p2p free software or sharing your bookshelf everywhere and even at the Breizh Entropy Congress a@foobe April 14, 2010 a@foobe

Introduction Introduction The legal framework is hindering you to share with your neighbors or friends The editors are trying to kill the conviviality of our societies and (worst) the Internet is starting to be controlled a@foobe

Introduction Books In Our Societies Books are part of any free society Books spread ideas and concepts Books are part of any critical process that could improve our societies Books that you cannot share are useless (eg DRM) Is the role of the librarian shifting to the reader with the introduction of digital books? Can everyone transport a library and play the role of the librarian? The universe (which others call the Library) Jorge Luis Borges, La biblioteca de Babel a@foobe

History Everything Started With a Discussion (November 2009) Can we do file sharing without the Internet? Why is more easy to share with strangers than with your friends? Time of acceptance and protocol complexity? Security? Proximity and sharing? how to make it simple? How is Forban different from centralized p2p or distributed hash table (DHT)? a@foobe

Basic Objectives The protocol must be able to use HTTP and keep Web browser happy We don t care too much about bandwidth use or optimization People must be free of the files, formats or file structure to share Wireless, ad hoc or personal network are unstable by nature Any programmer could reimplement or remix the protocol We discarded in the objectives, a too much academic approach to the problem We are implementing, testing, discarding, reimplementing, testing trial and error in other words a@foobe

Modus Operandi 1/3 2 Forban are in the same wireless network F1 is only sharing F2 is an opportunist (sharing and also copying) F2 got all the available files a@foobe

Modus Operandi 2/3 3 Forban are in the same wireless network F1 is only sharing F2 is an opportunist (sharing and also copying) F3 is also opportunist (sharing and also copying) F3 come with no files to share F3 discovers F1 and F2 and is fetching the indexes a@foobe

Modus Operandi 3/3 3 Forban are in the same wireless network F1 is only sharing F2 is an opportunist (sharing and also copying) F3 is also opportunist (sharing and also copying) F3 got all files from F1 and F2 a@foobe

Modus Operandi 3 Forban are in the same wireless network 1 passive web client F4 can use his web browser to get F1,F2 or F3 files a@foobe

The Forban Protocol (version 10-pre) The Forban protocol in 5 lines Each Forban has an UUID (RFC 4122) Each Forban is flooding the network with an announce (UDP announce) Each Forban maintains a list on how to access the other Forban Each Forban is providing an index of the files available (HTTP) Each Forban has an interface to get a file from his index (HTTP) a@foobe

The Forban Protocol (version 10-pre) The announce message <s o u r c e i n t e r f a c e v 4 > > 2 5 5 2 5 5 2 5 5 2 5 5 : 1 2 5 5 5 <s o u r c e i n t e r f a c e v 6 > > f f 0 2 : : 1 1 2 5 5 5 f o r b a n ; name ; adulau s h a r e d f o r b a n ; uuid ; cb001bf2 1497 443c 9675 74 de7027ecf9 tcpdump -iany -t -p -n -l -A -s0 udp and port 12555 and udp[8:2]==0x666f a@foobe

The Forban Protocol (version 10-pre) Getting the index GET http ://< s o u r c e i n t e r f a c e v 4 >:12555/ s /?g=forban / i n d e x I n f o V i s / A p p l i e d S e c u r i t y V i s u a l i z a t i o n pdf,22121928 I n f o V i s / O R e i l l y S l i d e o l o g y pdf,9252536 F i c t i o n / S c i F i /4931 h a c k e r s h e r o e s o f t h e pdf,2761072 The index includes recursively all the files available in the shared directory The index is composed of the filename including a path along with the total size of each file Everything available in the index can be fetched The index is a text file without limitation a@foobe

The Forban Protocol (version 10-pre) Getting a file GET http ://< s o u r c e i n t e r f a c e v 4 >:12555/ / s /?g=b a s e 6 4 u r l s a f e (< f i l e n a m e f r o m i n d e x >)&f=b64e This is a traditional HTTP download with Content-Disposition header a@foobe

The Forban Protocol (version 10-pre) The opportunistic mode f o r e a c h i n d e x i n f o r b a n d i s c o v e r e d : compare the i n d e x with remote i n d e x : f e t c h m i s s i n g f i l e s The opportunistic algorithm is quite simple and somehow follows a brute-force approach Filters on a name can be used to limit the kind of copied files a@foobe

What s next? Limiting replication of duplicate files Improve caching of indexes using the announces Fixing Forban protocol as version 10 Create easy to install binaries of Forban for various platforms Help others to remix, reuse or abuse Forban Forban in a device, in a tshirt, to ease local sharing Defense of conviviality is possible only if undertaken by the people with tools they control Ivan Illich (1973) a@foobe

Q and A Thank you a@foobe http://wwwfoobe/forban/ http://wwwgitoriousorg/forban/ a@foobe

Quick Install git clone git://gitoriousorg/forban/forbangit cd forban cp /cfg/forbancfg-sample /cfg/forbancfg edit /cfg/forbancfg and set global path and forban share path cd bin /forbanctl start a@foobe