November 29, 2009  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30


NOTICE: This channel is no longer actively logged.

[00:04:25] *** burris has joined #bittorrent
[00:11:50] *** bbelt16ag has quit IRC
[00:15:10] *** burris has quit IRC
[00:19:37] *** burris has joined #bittorrent
[00:23:46] *** h2ro has joined #bittorrent
[00:52:49] *** init0_ has joined #bittorrent
[00:59:13] <Switeck> HOSTILE ips - BAYTSP:  http://pastebin.com/f54c2cd55
[00:59:27] <Switeck> do note first 2 lines are to block bogons and multicast!
[01:00:13] <h2ro> baytsp?
[01:02:34] <Switeck> google/wiki them :P
[01:05:07] *** init0 has quit IRC
[01:11:15] <h2ro> i'm asking myself: do you guys really use these lists
[01:11:32] <h2ro> or is it only to silence the stupid paranoids?
[01:16:23] <chelz> the second
[01:16:52] <chelz> people develop superstitions around things they don't understand. it's a digital form of a talisman.
[01:19:10] <Switeck> I use that list
[01:19:25] <Switeck> Got a problem with it?
[01:19:34] <h2ro> I guess not much has changed since the dark ages
[01:19:38] <Andrius> burn heretics!
[01:19:53] <Switeck> Do you even know what BAYTSP is?
[01:20:10] <h2ro> I just looked it up as you commanded me to do
[01:20:27] <Switeck> good, then why would you want them connecting to you?
[01:20:41] <h2ro> Huh, I don't mind anyone connecting to me
[01:20:45] <h2ro> as long as they do it digitally
[01:20:49] <h2ro> and don't dos me
[01:20:54] <Switeck> they do DOS attacks
[01:21:03] <Switeck> DDOS to be specific
[01:21:22] <h2ro> well, I would not be happy about that
[01:21:27] <Switeck> I'm not
[01:21:31] <h2ro> but they haven't attacked me at all
[01:21:36] <h2ro> never
[01:21:55] <chelz> i'm pretty sure the point of a DDoS is that it can't be blocked
[01:21:56] <Switeck> but I had to do research to figure out what ranges are really theirs instead of trusting Peer Guardian's extremely huge list
[01:22:08] <Switeck> chelz, depends on the type
[01:23:05] <h2ro> why don't you guys just sue these fuckers
[01:23:48] <h2ro> you have their ip adress, you have the guys responsible for it, what is stopping you?
[01:23:51] <chelz> similar reasons to why really illegal stuff can be hosted offshore i think
[01:24:13] <h2ro> so how can you prove baytsp is behind all this
[01:25:45] <h2ro> you guys are probably just scaremongering, or even worse, perhaps you *are* Baytsp and try to dos us by putting the big seeder's adresses on these lists
[01:27:17] <Switeck> pinging someone isn't illegal
[01:27:19] <Switeck> it's just annoying
[01:27:35] <Switeck> h2ro, do the research...
[01:27:46] <Switeck> I'll give you a link or 2
[01:28:15] <Switeck> http://www.cidr-report.org/cgi-bin/as-report?as=14478&view=2.0&v=4
[01:28:30] <Switeck> http://www.dslreports.com/whois
[01:28:35] <Switeck> http://www.ripe.net/ripencc/pub-services/db/whois/whois.html
[01:28:40] <Switeck> http://www.apnic.net/apnic-bin/whois.pl
[01:28:57] <chelz> call me reckless but i'm not going to ban any IPs until i start getting DDoS'd. even then i'd just call up my ISP to get a new IP.
[01:28:59] <Switeck> If they say someone/something is registered to a certain AS or ip address, it is.
[01:29:35] <Switeck> I'm not saying you have to or even NEED to use that range
[01:29:42] <Switeck> for me, it's just an annoyance blocker
[01:30:05] <Switeck> If they're poisoning the torrents I'm on, I get the torrent a little faster this way
[01:30:17] <Switeck> otherwise, i have to wait till auto-banning occurs.
[01:30:28] <Switeck> (which is forgotten if I restart the program)
[01:31:22] <chelz> yeah that forgetting is unfortunate
[01:31:41] <chelz> would be nice if remembering was added in as an option into clients
[01:32:00] <Switeck> thus my short list
[01:34:28] <Switeck> I was surprised with changing of hands that many of the ips remained owned by the same guys, different name.
[01:34:37] <Switeck> http://torrentfreak.com/meet-dtecnet-riaas-new-anti-piracy-partners-090113/
[01:34:45] <Switeck> http://torrentfreak.com/riaa-anti-piracy-partner-clueless-about-bittorrent-091028/
[01:35:29] *** goussx has joined #bittorrent
[01:44:12] <Switeck> the list is not good for "hiding" from monitoring, only from reducing poisoners a little
[01:58:16] <anakh> baytsp has their own asn ?
[01:58:33] <Switeck> seems so :P
[01:58:50] <Switeck> they're contributing to IPv4 exhaustion.
[01:59:03] <anakh> should setup live monitoring of new prefixes they announce :p
[01:59:05] *** goussx has quit IRC
[01:59:25] <anakh> even worse they seem to be announcing a lot of /24's
[01:59:45] <anakh> which means that their fucking networks unneccessarily take up memory/resources in EVERY CORE ROUTER ON THE INTERNET
[02:00:30] <Switeck> It'd be worthwhile to "untangle" a few large ISPs that have 1000's of tiny ip ranges and give each an equal sized continuous space.
[02:00:38] <Switeck> But changing out all the ips would be immense :(
[02:01:16] <anakh> it'd be nice if everyone just refused to peer with them :PP
[02:01:34] <anakh> so they can sit there and waste forwarding table entries in their OWN routers
[02:01:44] <Switeck> what creeps me out is there's ASNs not associated with ip addresses
[02:01:55] <Switeck> Sony's got a few :P
[02:06:13] *** burris has quit IRC
[02:08:21] *** burris has joined #bittorrent
[02:09:15] <anakh> ..or they could just avoid having their asn in the aspaths :p
[02:11:09] <Switeck> Would those by their very nature be internal networks only?
[02:11:34] <Switeck> or could they still be outward-facing, complete with either their own ips (IPv4 or IPv6)?
[02:13:38] *** goussx has joined #bittorrent
[02:20:41] *** nGTHK has joined #bittorrent
[02:22:23] <The_8472> <h2ro> but they haven't attacked me at all <- i saw their ranges recently in a torrent
[02:22:41] <The_8472> the odd thing was that the torrent was already on its way towards the end of its lifecycle
[02:23:04] <The_8472> but they flooded it with many fake seeds
[02:23:25] <The_8472> when i saw it i banned that range and the torrent started to hum along as usual
[02:41:07] *** GTHK has quit IRC
[03:00:27] <The_8472> anakh, i can maded you forum section, but then i hided it
[03:01:04] <anakh> parse error
[03:01:21] <The_8472> ^^
[03:01:36] <The_8472> http://forum.bittorrent.org/viewtopic.php?id=136
[03:04:31] *** nGTHK is now known as GTHK
[03:06:30] <anakh> i wanna locate the MAFIAAs sabotage clients in DHT and perform certain offensive maneuvers :p
[03:07:56] <anakh> consider it network self defence
[03:08:10] <The_8472> to use one of my favorite ambigous phrases: we cannot sanction such behavior
[03:08:11] <The_8472> ^^
[03:10:48] <anakh> sure, dht is vulnerable, so lets do a good preemptive strike :)
[03:11:03] <Switeck> I don't want to teach them how to do more damage with DHT
[03:11:08] <Switeck> better to give them a silent treatment
[03:11:17] <Switeck> connect, but send nothing
[03:11:29] <Switeck> and toss out everything they send you
[03:11:35] <anakh> i think they would have to reconsider their operations if their clients well.. misbehaved :)
[03:11:57] <Switeck> no they don't
[03:12:12] <Switeck> they simply don't care until FBI comes to pay them an unfriendly visit
[03:12:32] <Switeck> "oh my bad, wasn't aware it was DDOSing that website for the last week")
[03:12:53] <anakh> wouldnt they if their antip2p bots started DoSing .. :)
[03:13:12] <anakh> exactly.. thats one of the more uhm violent strategies
[03:13:18] <Switeck> http://revision3.com/blog/2008/05/29/inside-the-attack-that-crippled-revision3/
[03:13:29] <Switeck> and DONE!
[03:13:42] <anakh> although it'd probably be better for everyone if they just attacked themselves :)
[03:15:09] <anakh> does anyone have any hard data on how my darlings behave on DHT ?
[03:15:21] <anakh> T mentioned incorrect versions, lots of id changes, etc
[03:16:45] *** bbelt16ag has joined #bittorrent
[03:17:28] <anakh> should do a bit of non-invasive monitoring and see what pop ups around torrents they might be after
[03:18:18] <TheSHAD0W> Regarding the Revision3 attack...
[03:18:21] <The_8472> well, i never looked into anti-p2p nodes, just misbebhaving nodes in general
[03:18:31] <TheSHAD0W> I can't see why shutting out torrents would result in a syn attack.
[03:18:57] <TheSHAD0W> Peers running on their tracker would be able to succeed in connecting, then get tossed.
[03:19:11] <Switeck> the SYN attack was used to shut the website down
[03:19:19] <Switeck> because it was hosting questionable torrents
[03:19:52] <Switeck> (both unwittingly and unknowingly!)
[03:20:10] <TheSHAD0W> What I'm saying is that it had to be an attack, rather than a flood of peers trying to get on the tracker.
[03:20:12] <anakh> without knowing the details i dont think that was a purposeful attack actually
[03:20:35] <TheSHAD0W> Even if the peers kept retrying, it would not have been a syn attack.
[03:20:37] <anakh> noone in their right state of mind would send 8000 non-spoofed SYNs/sec as a DoS attack
[03:20:40] <Switeck> anakh, being that the attack vector was not standard BitTorrent client behavior...it was an attack!
[03:20:57] <anakh> more like severely buggy software
[03:21:14] <The_8472> mediadefender wrote their own poisoning software
[03:21:19] <Switeck> can't that still be criminal negligence?
[03:21:21] <The_8472> so it's possible that they just wrote it badly
[03:21:36] <anakh> switeck: yes
[03:21:58] <anakh> i know from tpb that even a lot of normal clients behave like a fucking pain in the ass
[03:21:59] <Switeck> especially when hosted on >1 gbit/sec (combined) bandwidth access
[03:22:10] <Switeck> BitComet and clones are junk
[03:22:14] <TheSHAD0W> I can't see how that sort of behavior would occur assuming they used standard tcp libraries - and I can't see why they would've reimplemented it.
[03:22:17] <Switeck> retry times on ips is nuts
[03:22:23] <anakh> ya just a bit messed up retry/timeout logic and boom
[03:22:40] *** DHE has joined #bittorrent
[03:23:04] <anakh> ive screwed up in ways similar to that (none related to BT though :P)
[03:23:33] <anakh> mostly with udp or other connectionless protos though
[03:24:02] <anakh> but i _can_ see it happening if they have tons of servers doing async io with high fd limits etc
[03:24:57] <anakh> back when i was a ddos kid one of the attacks i implemented was a nonblocking connect() thing ... under win95
[03:25:01] <Switeck> even assuming it's tracker updates/scrapes...that's nuts
[03:25:08] <anakh> and it was very much effective
[03:25:22] <The_8472> btw... if anyone needs to be shoveled into the developers group on the bt.org forums, i can do tha
[03:25:24] <The_8472> t
[03:25:40] <anakh> just lemme get my user activated
[03:25:44] <anakh> username Choy Kloun
[03:25:53] <Switeck> How effective is a DHT based attack against someone also on the swarm that has DHT disabled?
[03:26:09] <Switeck> swarm = same torrent swarm
[03:45:01] <anakh> not directly unless you like cause the clients to crash / DoS / etc ..
[03:47:47] <Switeck> I was thinking more along the lines of giving them junk ips that don't exist or hostile ips
[03:55:46] *** bittwist has joined #bittorrent
[03:59:31] <anakh> aint getting any junk ip addrs via dht with dht disabled :>
[04:00:53] *** The_8472 has quit IRC
[04:01:14] *** wadim has joined #bittorrent
[04:01:16] *** wadim is now known as The_8472
[04:01:43] <The_8472> DHT as it is right now does more good than harm. i don't see why you would want to disable it
[04:02:21] <K`Tetch> because your torrents will leak onto it, and people will track your ass back using it and you can also be classes as a terrorist organisation ZOMG!
[04:02:47] <The_8472> yeah, as if that couldn't happen with regular trackers.
[04:03:25] <The_8472> and i'm not a terrorist, i'm a part of the resistance against the corrupt... brbfbi
[04:07:37] <K`Tetch> yeah, i know, i'm just giving you the usually parroted reasons
[04:08:09] <K`Tetch> by people who have more keys on their keyboard, than braincells in their head
[04:08:14] <Switeck> I can upload the torrent faster with DHT disabled
[04:11:04] <Switeck> reasons I've heard for disabling DHT:  My router doesn't respond well to DHT traffic or my software firewall goes nuts
[04:11:32] *** anakh has quit IRC
[04:12:24] <The_8472> well the router thingy is true if you have a crappy router
[04:12:33] <The_8472> but software firewalls can be easily replaced
[04:12:40] <The_8472> or thrown out of the window(s)
[04:13:06] <DHE> but that subverts the usual reason for even having a router
[04:13:23] <DHE> now, openwrt with careful use of the NOTRACK rule.. hmm...
[04:13:46] <The_8472> ah yes... notrack *sigh*
[04:13:53] <The_8472> i should hammer that into dd-wrt at some point
[04:13:55] <DHE> wait, is that even compatible with port forwarding?
[04:14:05] <The_8472> i hope
[04:14:20] <DHE> can I say "forward this PACKET" (but not this stream, since it won't be locking onto it)
[04:14:25] <DHE> I'll try it when I get home
[04:14:54] <The_8472> i mean... packet based snat+dnat rules mirroring each other should be stateless
[04:15:06] <The_8472> since you forward all traffic to that particular port
[04:15:47] <DHE> my worry is that if the NOTRACK rule is matched, the packet might bypass the `nat` table entirely. a little experimentation can quickly determine if this is the case, but still.
[04:16:01] <The_8472> maybe you could do it with one of the mangle filters instead of the nat table
[04:18:04] <DHE> all the default mangle rules are things like TOS fields and packet marks. no IP rewrites...
[04:19:15] <DHE> and DNAT won't work outside the nat table
[04:19:23] *** bbelt16ag has quit IRC
[04:19:29] <The_8472> apparently you can create stateless nat with the ip route command
[04:20:09] <The_8472> question is if you can do it on a port-by-port basis
[04:20:37] <DHE> not necessarily, but the ip route command can do selective operations by marks, which can be done with iptables
[04:22:00] <DHE> still it looks promising
[04:22:39] <The_8472> now the question is if the gimped kernel on the routers can do that too
[04:22:54] <DHE> if the Advanced Routing feature is enabled, it should be enough.
[04:23:22] <DHE> I think it's needed for any of the advanced ip tool features, like ip rule
[04:23:47] <The_8472> well, then mark + ip route nat might to the trick
[04:24:08] <The_8472> + notrack
[04:24:55] <DHE> let's see if we can't make it work first...
[04:25:45] <The_8472> hrrm... speaking of which... i have to add a notrack rule for 6to4 too
[04:25:58] <The_8472> it fries conntrack, since it doesn't know how to real with it
[04:26:10] <DHE> *Deal ?
[04:26:44] <The_8472> well... 6to4 is a raw ipv6-over-ipv4 encapsulation. protocol 41 or so. so the usual TCP or UDP-specific rules don't apply
[04:26:50] <The_8472> it just tracks it as generic connection
[04:27:55] <DHE> and each packet is a unique connection? or each host?
[04:28:38] <The_8472> no, but ipv6 dht via 6to4 means it'll track the "connections"
[04:28:42] *** ChoyKloun has joined #bittorrent
[04:28:43] <The_8472> which are very shortlived
[04:28:50] <ChoyKloun> hm maybe i should use this nick more :P
[04:28:51] <The_8472> but it doesn't know how shortlived they're supposed to be
[04:29:07] <The_8472> so... conntrack overflow
[04:29:14] <DHE> okay, yeah I can see that wreaking havoc
[04:29:53] <The_8472> just like the normal DHT leads to conntrack overflow if the UDP pseudo-connection lifetimes are too high
[04:30:01] <The_8472> *configured too high
[04:30:30] <DHE> and if it doesn't know, it probably uses a longer lifetime field, like a TCP timeout. Oh joy.
[04:31:03] <The_8472> there is some generic_timeout, but messing with it seems to have other sideeffects
[04:31:29] <DHE> like ICMP?
[04:31:48] <The_8472> not sure, it caused problems at least when i lowered it ^^
[04:35:28] <ChoyKloun> gargh.. i shouldnt be allowed to code sometimes... wellwell, stupid bug, now my dht announce works :p
[04:39:24] <ChoyKloun> something that _really_ annoys me are all dht nodes that cant/wont/etc respond .. someone should add some simple NAT detection so they dont end up in _my_ back yard :)
[04:41:33] <The_8472> normally NATed nodes should fall out of a well-maintained routing table quite fast
[04:41:41] *** K`Tetch has quit IRC
[04:43:01] <ChoyKloun> they still annoy me when bootstrapping :p
[04:48:17] *** K`Tetch has joined #bittorrent
[04:48:28] <ChoyKloun> and they certainly dont fall out of _other_ peoples routing tables as i keep seeing them
[04:49:09] *** KyleK_ has joined #bittorrent
[04:50:27] <Switeck> why would DHT nodes be trying to connect to a peer/seed on anything other than their listening port?
[04:51:04] <Switeck> [16:31]	<spikeysnack>	My (upstream) firewall is rejecting all kinds of DHT udp packets on different ports forwarding only my one BT port which works correctly. DHT works on some torrents fine. Am I missing out or are other clients just spewing out on arbitrary ports?
[04:51:49] <ChoyKloun> are you sure your NAT box is keeping the udp source port propery
[04:51:53] <ChoyKloun> properly*
[04:52:15] <ChoyKloun> and not assigning new ones dynamically for some/all of the packets
[04:54:20] *** K`Tetch has quit IRC
[04:59:29] <Switeck> I don't know what spikeysnack had
[05:00:10] <Switeck> but if this was even an occasional thing, I'd expect BT Devs to have seen it.
[05:00:26] *** K`Tetch has joined #bittorrent
[05:02:05] <ChoyKloun> my bet is on your NAT box reassigning ports dynamically
[05:02:12] <ChoyKloun> might have run out of state or something
[05:02:30] <ChoyKloun> as most nat devices keep the src port when possible
[05:02:31] <Switeck> my NAT box?
[05:02:33] <Switeck> no
[05:02:38] <Switeck> it's not me
[05:03:12] <Switeck> I'm reporting something I heard second-hand
[05:03:13] <ChoyKloun> replace 'your' with 'spikeysnack' then :P
[05:03:34] <Switeck> and I didn't get much of anything for details
[05:03:54] <Switeck> [16:42]	<spikeysnack>	Well my tcp stateful packet setup works fine and all and I just would like to stop the banging against my firewall. What if I redirected the udp to my BT port? would that be bad?
[05:04:15] <Switeck> [16:46]	<spikeysnack>	I can send on any upper port and establish stateful connections on both tcp and udp outgoing. I would refusre to open up all upper udp ports to my windows machine inside.
[05:04:26] <Switeck> [16:47]	<Switeck>	are you tracking incoming ips' ports or the ports they're trying to connect to on your end?
[05:04:34] <Switeck> [16:50]	<spikeysnack>	No I track on outgoing connections and block attempts on weird ports. I accept no traffic from brazil, korea or china. I use ipfilter.dat and peerblock. Firewall is OpenBSD. IP is charter.net cable modem.
[05:04:55] <ChoyKloun> he should check the outgoing traffic from the fw and see if the src port always stays the same
[05:05:16] <Switeck> that was over 4 hours ago, he's long gone :(
[05:05:18] <The_8472> uhm, not if his router is doing the mangling
[05:06:17] <ChoyKloun> setup a box as a bridge inbetween or whatever :p
[05:06:18] <Switeck> I don't know what's going on with him and cannot ask any more questions as the conversation took place over 4 hours ago
[05:07:03] <ChoyKloun> i once had to switch ports on a vpn that ran over udp because i kept getting random game traffic destined for some other person on the same connection :p
[05:15:46] *** h2ro has quit IRC
[05:20:00] <ChoyKloun> hm how does my signature on the forum appear to others ? http://forum.bittorrent.org/profile.php?id=90637
[05:20:08] <ChoyKloun> how many ppl actually have the proper font installed
[05:25:37] *** KyleK_ has quit IRC
[05:25:59] <ChoyKloun> it means appx 'you dont like p2p? go to hell!' but the exact level of rudeness isnt possible to reproduce in english :p
[05:38:33] <The_8472> characters are very small ^^
[05:39:04] <ChoyKloun> but you see the actual characters if you increase font size ?
[05:39:26] <The_8472> and the letters remind me of some very old german printing fonts
[05:39:29] <The_8472> yes
[05:39:54] <The_8472> ????????????????????????????!
[05:39:59] <The_8472> hrrrm
[05:40:17] <The_8472> i don't even know what language that is
[05:40:20] <ChoyKloun> i actually think many recent distros etc do ship with khmer fonts
[05:40:45] <The_8472> i see
[05:41:37] <The_8472> well, windows 7 got pretty decent unicode coverage
[05:42:04] <ChoyKloun> worlds longest alphabet.. kinda fun to type on a keyboard :)
[05:45:42] <ChoyKloun> i kinda like DHT btw
[05:45:46] <ChoyKloun> its refreshingly simple
[05:46:10] <ChoyKloun> compared to the self-organizing systems ive played with / designed in the past
[05:46:13] <The_8472> the protocol is simple, the algorithms how to maintain your routing table properly and do things efficiently are sometimes a bit... subtle
[05:46:35] <ChoyKloun> heh yeah
[05:47:31] <ChoyKloun> i kinda liked my self-organizing routing algorithm/protocol where each node always knew where to forward a message to reach the target node
[05:47:53] <The_8472> http://infinite-source.de/az/whitepapers/kademlia_optimized.pdf <- must-read if you want to implement a proper DHT node
[05:48:05] <ChoyKloun> different system though.. amore of a mesh network than a distributed tracker
[05:48:10] <The_8472> BEP5 is insufficient
[05:49:54] <ChoyKloun> im not a big fan of reading first .. thats the last resort when my code blows up :)
[05:50:47] <The_8472> well, there is a big difference between a working and a proper implementation when it comes to DHT nodes
[05:51:06] <The_8472> it "works" usually means it's inefficient and thus you're burdening others
[05:51:22] <The_8472> in p2p environments you have to think of your impact on the whole system
[05:51:30] <ChoyKloun> hehe yeah
[05:53:40] *** ProperNoun has joined #bittorrent
[06:05:36] <Switeck> in a more bite-sized chunk, just think about how the other guy would see you.
[06:08:57] *** burris has quit IRC
[06:09:00] *** burris has joined #bittorrent
[06:30:57] *** burris has quit IRC
[06:31:06] *** burris has joined #bittorrent
[06:46:14] *** MassaRoddel has quit IRC
[06:46:32] *** chelz has quit IRC
[06:47:16] *** bittwist is now known as bitty
[06:47:26] *** bitty is now known as bittwist
[06:49:23] *** init0 has joined #bittorrent
[07:03:32] *** init0_ has quit IRC
[07:19:13] *** Switeck has quit IRC
[07:44:22] *** bbelt16ag has joined #bittorrent
[08:33:30] *** nGTHK has joined #bittorrent
[08:34:27] *** GTHK has quit IRC
[09:01:58] *** GTHK has joined #bittorrent
[09:07:37] *** goussx has quit IRC
[09:15:00] *** goussx has joined #bittorrent
[09:15:21] *** MassaRoddel has joined #bittorrent
[09:25:11] *** GTHK has quit IRC
[09:33:53] *** nGTHK has quit IRC
[09:34:17] *** goussx has quit IRC
[10:11:50] *** MassaRoddel has quit IRC
[10:12:39] *** PN has joined #bittorrent
[10:15:05] *** MassaRoddel has joined #bittorrent
[10:25:20] *** ProperNoun has quit IRC
[10:38:10] *** rrr_ has quit IRC
[11:22:51] *** Miller` has quit IRC
[12:16:25] *** Miller` has joined #bittorrent
[12:43:32] *** razvand has joined #bittorrent
[13:46:40] *** Miller` has quit IRC
[14:08:04] *** KyleK_ has joined #bittorrent
[14:33:54] <ChoyKloun> argh
[14:33:56] <ChoyKloun> i hate bencode
[14:33:58] <ChoyKloun> hate hate hate
[14:34:12] <ChoyKloun> i should write a proposal of switching bt to esbuf_serialize :p
[14:35:48] <The_8472> a serious case of NIH?
[14:36:52] <ChoyKloun> the knights who say NIH! ?
[14:37:03] <The_8472> not invented here
[14:37:28] <The_8472> http://en.wikipedia.org/wiki/Not_invented_here
[14:37:30] <ChoyKloun> more like IAP
[14:37:36] <ChoyKloun> It's A PITA
[14:37:37] <ChoyKloun> :P
[14:37:46] <DHE> Invent Another Protocol?
[14:38:02] <The_8472> you're the first dev to complain about it
[14:38:05] <ChoyKloun> wasnt that what i just said i felt like doing :PP
[14:38:07] <DHE> and I still say bencode was pretty easy to do
[14:38:47] <DHE> wrote my own in a langauge I was just learning, it worked with minimal kinks, and was faster than what was already available for the same language.
[14:38:49] <DHE> win win for me
[14:38:58] <DHE> surely it can't be that hard
[14:39:08] <ChoyKloun> it's just so much more work to implement in C than other marshalling
[14:39:25] <ChoyKloun> nah im just fixing a detail in my bencode parser and it reminded me of my burning hate for it :p
[14:39:42] <The_8472> well, use a C library with dynamic data structures and you're golden
[14:40:06] <ChoyKloun> i do, i use esbuf
[14:40:15] <The_8472> which i've never heard of
[14:40:23] <ChoyKloun> http://estoykh.com/opensource/ :)
[14:40:59] <The_8472> which i haven't heard of either
[14:41:00] <ChoyKloun> latest ver isnt up yet though
[14:41:27] <ChoyKloun> ive used it in every major piece of code ive written since 2003
[14:41:58] <The_8472> let me guess... written by... you?
[14:42:03] <ChoyKloun> bingo :)
[14:42:18] <ChoyKloun> i guess i do suffer from a bit of NIH as you can see in that directory that i've also written my own XML lib .. :)
[14:42:37] <ChoyKloun> although main reason for that was that i needed it to use esbuf
[14:42:38] <DHE> despite several being available already for years
[14:43:49] <ChoyKloun> well we can all share information with gopher and ftp
[14:43:53] <ChoyKloun> so why work on bittorrent
[14:43:54] <ChoyKloun> :P
[14:44:20] <The_8472> because bittorrent offers features that neither gopher nor ftp do
[14:44:39] <ChoyKloun> and esbuf offers features other buffer/mgmt libs dont
[14:44:39] <ChoyKloun> :p
[14:44:49] <The_8472> for the endusers? i do not think so
[14:45:18] <ChoyKloun> :-)
[14:45:33] <mpl> try to share as much data with as many ppl as efficiently with ftp...
[14:45:42] <ChoyKloun> yeah exactly
[14:45:44] <ChoyKloun> QED :)
[14:45:44] * DHE fires up an FTP server on his DSL line
[14:45:54] * DHE has quit (Ping timeout)
[14:45:58] <The_8472> maybe there is a shortcoming in esbuf if it leads you to complain about implementing bencoding
[14:46:05] <ChoyKloun> well ftp actually works better than bt on my connection
[14:46:07] <The_8472> since other C-client devs havn't complained about it
[14:46:08] <ChoyKloun> but then im on 256/128 heh
[14:46:18] <ChoyKloun> maybe im just better at complaining? :)
[14:46:24] <DHE> thou needst QOS
[14:46:39] <ChoyKloun> ya
[14:46:45] <The_8472> circumstanical evidence points in the NIH direction
[14:46:51] <ChoyKloun> havent had the time to toss out the chinese plastic currently doing the routing
[14:46:59] <ChoyKloun> i mean i have several soekris boxes sitting right here
[14:47:14] <ChoyKloun> i dont even need NAT or any crap like that
[14:47:33] <ChoyKloun> well MSS clamping is nice coz of stupid pppoe
[14:48:05] <DHE> you only have one PC?
[14:48:09] <ChoyKloun> no
[14:48:11] <ChoyKloun> i have a /24 at home
[14:48:16] <DHE> oh...
[14:48:19] <DHE> I only have a /31
[14:48:27] <ChoyKloun> check addr i irc from :p
[14:48:45] <The_8472> i have a /48
[14:48:54] <ChoyKloun> inetnum:        194.71.126.0 - 194.71.126.255
[14:48:54] <ChoyKloun> netname:        ESTOYKH-NET
[14:48:55] <ChoyKloun> descr:          Estoy Ltd. Cambodian network
[14:49:02] <ChoyKloun> i have an accute NAT allergy
[14:49:14] <ChoyKloun> and i know the guys at my isp :p
[14:49:17] <The_8472> ohh, you're talking about ipv4 :P
[14:49:26] <DHE> The_8472: oh, well, so do I in that case... but worldwide accessability is a problem. so I got a /31 to ease the ipv4 suffering.
[14:49:46] <ChoyKloun> oh i read /31 as /30 at first
[14:49:58] <ChoyKloun>  /31 wouldnt be much of a usable ipv4 prefix heh
[14:50:02] <DHE> you run a small datacenter from home or something?
[14:50:08] <ChoyKloun> nah
[14:50:21] <ChoyKloun> power here is too awful for that anyway
[14:50:27] <DHE> /31 works just fine. I don't need 4 addresses. 2 is enough.
[14:50:48] <ChoyKloun> well normally lowest+highest arent usable
[14:50:51] <ChoyKloun> although f.ex. linux can do it
[14:51:25] <DHE> oh, that. no. In that case, a /30 only has 1 usable address (always count the router). I'm treating the /31 as two /32 addresses
[14:51:52] <ChoyKloun> well /30 are normally used for exactly that
[14:51:54] <DHE> my ISP's static space has gotten a little fragmented so I asked for one of the /31 blocks
[14:51:55] <ChoyKloun> point-to-point links
[14:51:55] <ChoyKloun> :p
[14:52:03] <kjetilho> you don't really need a broadcast address
[14:52:19] <ChoyKloun> nah but many ip stacks complain loudly
[14:52:26] <DHE> ifconfig eth0 up 1.2.3.4 netmask 255.255.255.255;  route add -host 192.168.0.1 dev eth0;  route add default gw 192.168.0.1
[14:52:30] <DHE> tada!
[14:52:32] <The_8472> not on PPP links.
[14:52:36] <ChoyKloun> i recally windows until xp or so even refused to talk to ANY .255/.0 addr
[14:53:02] <ChoyKloun> ppp links arent really comparable though
[14:53:13] <ChoyKloun> you dont even need a gateway address
[14:53:41] <The_8472> you only need 1 address, which is the least wasteful way to assign a single address... soo...
[14:54:14] <DHE> yeah ipv4 is still at a premium. and buying IP blocks from the regisrars like ARIN is an administrative pain
[14:54:15] <ChoyKloun> for customers i always use a large subnet + proxyarp
[14:54:15] <The_8472> a /32 basically
[14:54:18] <ChoyKloun> and do /32 routes
[14:55:27] * The_8472 asks RIPE if i can get a /8 for my toaster. and another one for the fridge
[14:55:48] <ChoyKloun> you can buy space on the grey market :p
[14:56:07] <DHE> not with some registrars you can't...
[14:56:26] <ChoyKloun> hey i use RIPE space registered to an african company announced from asia
[14:56:37] <ChoyKloun> so thats more of a finer detail :p
[14:56:40] <ChoyKloun> btw regarding ppp
[14:56:52] <ChoyKloun> set user name="pppin" ipaddr=ippool ipmask=255.255.255.255
[14:56:52] <ChoyKloun> set user name="pppin" localipaddr=10.141.49.1 netrouting=off
[14:56:53] <DHE> but someone has to pay to renew the block...
[14:57:03] <ChoyKloun> #> show ippool
[14:57:03] <ChoyKloun>  ip base address     count
[14:57:03] <ChoyKloun>   10.141.49.32        32
[14:57:06] <ChoyKloun> dhe: no
[14:57:14] <ChoyKloun> end user doesnt pay
[14:57:22] <ChoyKloun> and in RIPE land there are no per-block charges
[14:57:28] <DHE> really...
[14:57:42] <ChoyKloun> however the local internet registry pays a yearly fee thats based on its size including # of bloks
[14:59:40] <ChoyKloun> anyway
[15:00:15] <ChoyKloun> what i SHOULD write up thats actually important for something is a "how to avoid having your DHT implementation being usable in DDoS attacks" summary
[15:01:05] <ChoyKloun> oh and i also propose a small protocol extension
[15:01:43] <The_8472> yes?
[15:01:45] <ChoyKloun> that any udp packet can be responded to with a "shut the fuck up" and then that host will be totally ignored by the client in the future
[15:02:05] <ChoyKloun> so theres an easy way to stop any unwelcome udp traffic from dht clients
[15:02:32] <The_8472> and there i thought we had ICMP for that ^^
[15:02:33] <DHE> well, the UDP layer itself does define one, but typically reserved for OS use
[15:03:27] <ChoyKloun> how many dht clients stop all udp communications because of an icmp response .. :)
[15:03:40] <The_8472> none, probably
[15:03:48] <The_8472> but then again it's also unlikely that they'll keep state for that
[15:03:52] <ChoyKloun> and im talking of adding the ip addr to an actual "ignore" lits
[15:03:53] <ChoyKloun> list
[15:04:32] <ChoyKloun> not only that port, since then there are 65535-1 ports left to get unwanted traffic on ..
[15:04:47] <DHE> and the OS takes care of the rest via said ICMP
[15:04:54] <DHE> so really
[15:05:01] <The_8472> so i could just spoof packets and kill the DHT by sending STFU-packets for all DHT nodes?
[15:05:03] <ChoyKloun> uhm it doesnt work that way in reality
[15:05:16] <ChoyKloun> have you ever been the recipient of a large amplifier udp-based ddos atack
[15:05:22] <ChoyKloun> the_8472: obviously you need some auth
[15:05:35] <ChoyKloun> that was kinda implied
[15:05:39] <The_8472> and suddenly the small extension grows ^^
[15:05:55] <DHE> no, I like the spoofing idea better
[15:05:55] <ChoyKloun> its a shame dht doesnt already have a mandatory cookie in all packets
[15:06:35] <ChoyKloun> however if clients implementing this also started using non-predictable transids that could be used
[15:07:15] <The_8472> considering that only 1-4byte transaction IDs are used...
[15:07:26] <The_8472> by most clients
[15:07:43] <ChoyKloun> easy change to add enough entropy
[15:07:54] <The_8472> true
[15:08:01] <The_8472> but you would have to mandate it for the STFU-packet
[15:08:19] <ChoyKloun> dhe: i can promise you that you can send all the icmp you want, you're still getting 3+Gbps of udp responses :p
[15:08:36] <The_8472> anyway, that DoS amplification attack you're speaking of... the best you can do is increase the packet size. you can't multiply the number of packets
[15:08:54] <The_8472> and since the DHT is lossy and nodes are possibly rate-limited...
[15:09:00] <DHE> if I'm getting 3 Gbps of DHT, I don't think sending stfu will get me anywhere either
[15:09:01] <ChoyKloun> ill see if i cant think of a way to actually get multiplication
[15:09:24] <ChoyKloun> dhe: i'd have loved to have a STFU feature in DNS when we got huge DNS amp attacks :p
[15:10:56] <ChoyKloun> would have involved less network voodoo and less being on the phone with upstreams instructing them on what ACLs to insert in their edge routers :p
[15:11:36] <ChoyKloun> the_8472: DHT also gives an attacker excellent spreading of attack sources
[15:11:53] <The_8472> ISP-side configureable firewalls for endusers would be awesome. this way a DoS couldn't congest the last mile
[15:12:02] <ChoyKloun> like i used to irc from addrs that were only reachable from .SE
[15:12:16] <ChoyKloun> could easily collect enough .se dht nodes to blast me to hell
[15:12:39] <ChoyKloun> the_8472: well if you have good isps you kinda have it, but it involes middle-of-the-night phonecalls :)
[15:13:04] <The_8472> yeah, i meant via some standardized protocol
[15:13:20] <ChoyKloun> well once we had a us backbone provider contacting us and asking whether we wanted that gig of traffic they saw filtered .. :)
[15:13:38] <The_8472> hahaha
[15:13:51] <ChoyKloun> note that we had no relationship with this provider
[15:14:00] <ChoyKloun> just hosting a bunch of ddos magnets :)
[15:20:39] <The_8472> btw, shouldn't routers raise all kinds of red flags if you're sending to millions of IPs with spoofed source addresses?
[15:21:57] <kjetilho> how do you recognise spoofing?
[15:22:21] <The_8472> that the packets from the spoofed address normally wouldn't go along that route?
[15:22:32] <kjetilho> universal egressfiltering would nice, wouldn't it
[15:22:38] <ChoyKloun> the_8472: routers route .... :)
[15:22:49] <ChoyKloun> in the core the routing is all done in hardware anyways
[15:22:50] <kjetilho> core routers have no idea what happens towards the edges
[15:22:58] <ChoyKloun> though you can keep a certain level of monitoring with f.ex. netflow
[15:23:11] <ChoyKloun> and some isps do actually detect weird traffic patterns
[15:23:39] <ChoyKloun> ya filtering spoofed packets is more or less undoable except on the edge, from customers
[15:23:39] <The_8472> i'm just saying, with a faked source + millions of different destination addresses some routes must seem fishy
[15:24:29] <The_8472> as in... "look, you're sending me traffic from prefixes you're not even announcing via BGP"
[15:26:00] <DHE> and cisco has a low-cpu-cost filter available that does pretty much that exact thing. though it's probably best used on edge devices in the wrong direction. which means more people need to use it.
[15:26:07] <ChoyKloun> asymmetric routing is very common...
[15:26:25] <The_8472> well, at the core probably, yes
[15:26:53] <The_8472> but it should raise flags on peering providers and other more leafy ASNs
[15:27:02] <DHE> So turn it on at your distribution routers facing the end devices.
[15:27:19] <ChoyKloun> not only at the core
[15:27:47] <DHE> The_8472: I'm just worried about how it would get applied in BGP scenarios. From what I read in the cisco docs, it's based on the routing table so if a route isn't selected for the main routing table, I'm worried about false positives
[15:27:56] <DHE> *main routing table
[15:28:07] <ChoyKloun> well end story is, its not doable in reall ife
[15:47:20] *** waldorf_ has joined #bittorrent
[15:54:37] <ChoyKloun> global internet routing kinda resembles strings and tincans
[15:54:41] <ChoyKloun> its a wonder it doesnt collapse more often
[15:55:01] <DHE> maybe, but the devices on the other ends tend to be smart enough
[15:55:07] <ChoyKloun> last year a single small isp in bumfucksville caused a global incident which affected like 70% of all traffic
[15:55:25] <ChoyKloun> by announcing an extremely long as-path
[15:55:54] <DHE> oh, that was an OS bug in routers though. crashing I think.
[15:56:02] <ChoyKloun> apparently some older cisco routers (amongst others) drop the bgp session when they see it
[15:56:02] <ChoyKloun> so we had core routers all over the world tearing down their bgp sessions
[15:56:22] <ChoyKloun> well another good example is when some turkish telco blocked youtube internally
[15:56:26] <ChoyKloun> but the prefix leaked
[15:56:39] <ChoyKloun> so a large part of the global users couldnt reach youtube :P
[15:57:05] <DHE> that's a matter of trusting the prefixes offered. IP spoof filtering wouldn't have done you any good there.
[15:57:05] <ChoyKloun> also last year at prq we had a bgp-based DoS attack
[15:57:09] <ChoyKloun> they couldnt bring down some site via other means
[15:57:26] <ChoyKloun> so they used a hacked isp in the us to announce a more specific prefix for the subnet the site was in
[15:57:44] <ChoyKloun> ya but its good examples of the state of global internet routing :P
[15:58:12] <DHE> so maybe we need routers to tie into IANA to validate the routes announced?
[15:58:46] <ChoyKloun> there are tools to do it
[15:58:52] <ChoyKloun> but its simply not feasable in real life
[15:59:09] <The_8472> i think they're planning on securing BGP like they did with DNSSEC
[15:59:22] <ChoyKloun> there are some proposals
[15:59:23] <ChoyKloun> but well
[15:59:30] <ChoyKloun> 'not reasable in real life' :P
[15:59:48] <DHE> dnssec is still coming, but hasn't arrived yet
[16:00:07] <DHE> I mean BIND supports it, but the internet...
[16:00:27] <The_8472> well, some ccNICs already support it, vista/7/linux support it...
[16:00:37] <The_8472> it's a start
[16:01:04] <The_8472> and it went through faster than IPv6 ^^
[16:01:21] <ChoyKloun> also the global bgp routing table is growing like mad
[16:01:29] <DHE> so what's the BGPsec protocol like? a signed statement from ARIN/RIPE/etc saying you're allowed to advertise this block?
[16:01:54] <The_8472> don't ask me, i already forgot the details
[16:02:07] <ChoyKloun> there are a coupleo f different ideas
[16:02:13] <ChoyKloun> none of which would work outside a lab
[16:02:24] <The_8472> but i think the first step was actually authenticating the propagation of routes, not the origin
[16:04:00] <DHE> but the problem with routing seems to be idiot admins making mistakes, not malicious BGP peering applications.
[16:04:25] <ChoyKloun> well i just gave you an example of malicious bgp use :)
[16:04:28] <DHE> I could hack Quagga to do evil things, but I don't think anybody actually does that. the youtube fiasco was more an administrative error
[16:05:53] <The_8472> if anyone would consistently do malicious things via BGP then they'd get de-peered or heavily filtered
[16:06:12] <The_8472> depending on how much weight each side has ^^
[16:06:43] <ChoyKloun> well then they could just sign up with / hack another isp ..
[16:07:46] <DHE> word of idiocy causing internet outages spread pretty fast.
[16:07:57] <ChoyKloun> yet they happen .. :)
[16:08:07] <ChoyKloun> but dont worry, no maliciousness needed
[16:08:14] <ChoyKloun> bgp will implode of its own weight quite soon
[16:08:20] <ChoyKloun> just watch the growth of the global bgp table ..
[16:08:28] <DHE> I am familiar with it
[16:08:34] <The_8472> then again ipv4 will explode quite soon too
[16:08:48] <ChoyKloun> well the bgp is the same in v6 ..
[16:08:49] <The_8472> and ipv6 is supposed to simplify routing...
[16:08:57] <ChoyKloun> actually almost all v6 peerign is done over v4
[16:08:58] <DHE> I'm responsible for monitoring at my ISP. I tend to know how trending is going
[16:09:13] <ChoyKloun> ya v6 will help with the table size
[16:09:30] <ChoyKloun> just hope that the tier1 actors keep tight prefix size filters
[16:09:39] <DHE> does ipv6 allow you to have a subnet size smaller than /64?
[16:09:40] <ChoyKloun> so we dont see morons deaggregating like they do in ipv4 today
[16:11:33] <The_8472> problem with BGP is that it's not a decentralized route finding algorithm... instead if keeps almost absolute knowldge of the entire graph in every vertex
[16:11:58] <ChoyKloun> ya
[16:12:26] <ChoyKloun> though you can setup your bgp in a way that you dont need the full table everywhere
[16:13:34] <The_8472> but as long as even unicast causes that much trouble multicast stays a pipe dream *sigh*
[16:15:51] <The_8472> if deployed internet-wide or at least in large regions we could cut down significantly on overall transit traffic AND on last mile upload...
[16:16:14] <ChoyKloun> all isps should have a multicast domain for p2p :)
[16:16:45] <DHE> multicast download of fedora 13 at 300 kb/sec... I think that could work
[16:17:12] <The_8472> by multicast domain you mean ... ?
[16:17:55] <ChoyKloun> i was just thinking of tracking etc
[16:18:20] <The_8472> tracking is a non-issue. we have DHT for that. i'm talking about the payload
[16:18:52] <ChoyKloun> though i do recall that there used to be some satellite service that gave you lots of warez downloads multicast-style
[16:19:36] <The_8472> that's probably via classic ASM, i'm talking about SSM
[16:23:18] *** rrr_ has joined #bittorrent
[16:25:49] <ChoyKloun> like users could queue stuff for download
[16:26:14] <ChoyKloun> but there was a lot of warez doods using it so you always got the latest stuff automagically
[16:58:08] *** PN is now known as ProperNoun
[17:00:54] *** Elrohir has joined #bittorrent
[17:02:37] *** Miller` has joined #bittorrent
[17:03:42] *** lioux has joined #bittorrent
[17:07:59] *** Elrohir has quit IRC
[17:42:27] <ChoyKloun> proposal: all clients should start including a cookie in the dht udp queries they send
[17:42:35] <ChoyKloun> and echo it in responses if present
[17:43:17] *** goussx has joined #bittorrent
[17:43:20] <The_8472> how would that be different from the transaction id?
[17:43:29] <Andrius> I'm going to eat your cookies
[17:43:35] <Andrius> and dht will crumble
[17:43:49] <ChoyKloun> its not actually
[17:43:59] <ChoyKloun> the above implied strong entropy though
[17:44:29] <The_8472> then just changing the definition of the transaction ID would be better
[17:44:32] <Andrius> It's obvious that I'm not going to eat transaction id, but cookies are fine
[17:45:00] <ChoyKloun> ya
[17:45:03] <ChoyKloun> clearly one way to do it
[17:45:34] <ChoyKloun> hm would there be any point in making an extension for encrypting the traffic
[17:46:41] <The_8472> if ISPs start to intercept and manipulate the traffic, then yes
[17:49:36] <ChoyKloun> my suggestion would be to use curve25519 key exchange
[17:49:40] <ChoyKloun> its extremey fast
[17:50:31] <ChoyKloun> and the data sent by each end is just 32 bytes
[17:55:54] *** KyleK__ has joined #bittorrent
[18:03:55] *** KyleK_ has quit IRC
[18:03:55] *** KyleK__ is now known as KyleK_
[18:16:40] *** goussx has quit IRC
[18:49:39] *** waldorf_ has quit IRC
[18:56:36] *** KyleK_ has quit IRC
[19:13:52] <SundanceKid> hello ppl. I'm looking for a good bdecoder for PHP
[19:14:09] <DHE> is mine any good?
[19:14:15] <SundanceKid> please give me a link if you know...
[19:14:25] <DHE> dehacked.2y.net/BT/  link on the bottom
[19:14:29] <ChoyKloun> oh fuck
[19:14:30] <ChoyKloun> i hate bencode
[19:14:32] <ChoyKloun> and i hate php
[19:14:47] <DWKnight> then go jump off a cliff
[19:14:49] * DHE takes a shot of the Potion of Apathy
[19:15:00] <SundanceKid> :-)
[19:15:07] * DWKnight chugs a bottle
[19:15:08] <SundanceKid> I develop my own tracker
[19:15:13] <DHE> oh, so did I
[19:15:36] <SundanceKid> lol)
[19:15:39] <SundanceKid> torrentparse :))
[19:16:27] <ChoyKloun> you would hate php too if it was your dayjob :P
[19:16:34] <ChoyKloun> well i dont actually write code most of the time
[19:16:38] <SundanceKid> I've seen it already. Bullshit :)
[19:16:39] <ChoyKloun> but im the boss of 5 php developers
[19:16:48] <SundanceKid> ChoyKloun: lol.
[19:16:54] <SundanceKid> http://phpdaemon.googlecode.com
[19:17:02] <mpl> ChoyKloun: if you're the boss, make them switchto something else ;P
[19:17:15] <SundanceKid> php rules
[19:17:17] <ChoyKloun> they only know php
[19:17:29] <ChoyKloun> well php and flash/actionscript and javascript etc
[19:17:32] *** DHE has quit IRC
[19:17:36] <ChoyKloun> but if they started to develop all websites in flash i'd fucking kill them
[19:17:54] <SundanceKid> DHE: thank you. do you know any another?
[19:20:51] *** lioux_ has joined #bittorrent
[19:21:48] <ChoyKloun> the mitigating factor is that its quite good business.. total salaries for 5 univ graduate developers + 2 office staff is less than what ONE developer would get in europe
[19:23:41] <mpl> ChoyKloun: in other words you're running a sweatshop?
[19:23:53] <ChoyKloun> well we do have air condition?
[19:24:00] <ChoyKloun> so no sweat!
[19:24:16] <ChoyKloun> but yeah business model is pretty similar
[19:24:30] <ChoyKloun> except our labour isnt unqualified/manual work
[19:25:17] <ChoyKloun> and we pay far more than what they'd earn at most other jobs
[19:25:31] <ChoyKloun> average income here is $600 ... per year
[19:27:16] <mpl> :(
[19:28:47] <ChoyKloun> you prefer developing countries to remain poor or what ?
[19:29:22] <ChoyKloun> or maybe you want to 'hire' our female staff for the job they'd do if they didnt have this (prostitution)
[19:29:46] <mpl> ChoyKloun: no, I was making the sad face about your last comment: 19:25 < ChoyKloun> average income here is $600 ... per year
[19:30:34] <mpl> ChoyKloun: so, good for you if you think you're offering better working conditions.
[19:30:34] <ChoyKloun> ah k
[19:30:51] <ChoyKloun> this isn't even the third world.. its the 4th :)
[19:30:58] <mpl> where is it?
[19:31:10] <ChoyKloun> preah reach nachakr kampuchea !
[19:31:44] <mpl> cambodia?
[19:31:57] <ChoyKloun> yep
[19:32:01] <mpl> ok
[19:36:02] <ChoyKloun> the nicest and most interesting country in the world <3
[19:36:11] <mpl> ChoyKloun: 19:29 < ChoyKloun> you prefer developing countries to remain poor or what ? <-- I bought fair trade pants and underwear from china and india yesterday ;)
[19:36:20] <ChoyKloun> fair trade is fucking crap
[19:36:48] <mpl> ChoyKloun: easy to say that, but at least it's a step better than the rest imho.
[19:37:22] <ChoyKloun> the workers and countries benefit more WITHOUT "fair trade" ..
[19:37:33] <mpl> hah, riiight.
[19:37:39] <ChoyKloun> just buy products from developing countries... any products
[19:38:44] <ChoyKloun> mpl: read the book In defense of global capitalism by Norberg
[19:38:49] <mpl> right, and the conditions will get better for workers because most of the money is not going into the pocket of bosses?
[19:38:53] <ChoyKloun> it details the problems with 'fair trade' very well
[19:39:37] <mpl> ChoyKloun: I will, thx for the reference.
[19:39:46] <ChoyKloun> you do know that FT charges quite hefty licensing fees from the workers/farmers, right? :>
[19:40:03] <mpl> yes.
[19:40:20] *** lioux has quit IRC
[19:40:56] <ChoyKloun> and uhm if you actually studied the real world you'd see people DREAMING about getting jobs in sweatshops
[19:41:17] <mpl> because they have no other choice.
[19:41:24] <mpl> it's that or die starving.
[19:41:31] <mpl> or prostitution as you said it.
[19:42:18] <ChoyKloun>  http://estoykh.com/hellonearth/dsc00241.jpg you think those kids share the worldview of western liberal do-gooders ?
[19:42:58] <mpl> ChoyKloun: which is exactly what I just said above...
[19:43:51] <ChoyKloun> oh well, read the book :) the issue is a bit too complicated for a short irc chat :p
[19:44:02] <mpl> agreed.
[19:44:35] <ChoyKloun> living in developing countries is a good eye-opener too
[19:44:54] <charles> those are your php hackers?  buy them some shirts
[19:45:01] <ChoyKloun> charles: hahah
[19:45:02] <ChoyKloun> yeah
[19:45:04] <ChoyKloun> thats our office !
[19:45:28] <ChoyKloun> it smells a bit bad and the rats and stray dogs are a bit of a nuisance
[19:45:37] <charles> is that you lying on the ground by the bike?
[19:46:11] <ChoyKloun> lying on the ground by the bike?
[19:46:21] <charles> there are three people in that picture
[19:46:31] <charles> one's resting/asleep/dead on the ground by the bike
[19:46:38] <charles> if they're dead, it's probably not you
[19:46:40] <ChoyKloun> btw... http://estoykh.com/fiber/ there are some signs of civilization here after all :)
[19:46:48] <mpl> yeah he's the boss, he's just sleeping while the other ones are working ;)
[19:46:59] <ChoyKloun> ah yeah i see it now
[19:47:15] <ChoyKloun> if he was dead i think someone would have stolen his bike and/or his clothes :)
[19:48:05] <mpl> ChoyKloun: what's the second pic, the sewage system?
[19:48:12] <TheSHAD0W> Oh god they did it again!
[19:48:14] <TheSHAD0W> http://reason.com/archives/2009/11/27/miniature-monsters-attack-amer
[19:48:18] <ChoyKloun> mpl: check all the images
[19:48:30] <ChoyKloun> the dirty tunnel is where they're installing the cables
[19:48:41] <mpl> ah, fiber installation?
[19:48:44] <ChoyKloun> ya
[19:48:47] <mpl> ok
[19:49:58] <charles> well, I'm convinced.  If there are two kids without shirts somewhere in the world, fair trade must be bullshit cooked up by libr'l do-gooders
[19:50:20] <ChoyKloun> hey someone get me a fire extinguisher quick
[19:50:28] <ChoyKloun> the strawman charles built is on fire !
[19:50:51] * charles throws the burning strawman at ChoyKloun
[19:51:39] * mpl hugs the burning strawman
[19:51:57] * ChoyKloun turns it into a Burning Man festival
[19:52:09] <mpl> ow ow ow!
[19:52:21] * ChoyKloun Front 242 - Don't Crash
[19:54:10] <charles> ah, back when f242 was still good
[20:00:43] <ChoyKloun> they did a good live show in 2007 actually
[20:01:03] <ChoyKloun> nitzer ebb (at the same event) was much better though
[20:01:29] <ChoyKloun> but the fucking power failed during the chorus of join in the chant.. was a "bit" of an anticlimax...
[20:06:41] <charles> they were never the same after Richard 23 left the first time around...
[20:06:54] <charles> Pulse was a big improvement though
[20:07:39] <ChoyKloun> pulse was a bit .. well, boring
[20:07:44] <ChoyKloun> good music but lacks a soul
[20:09:26] <charles> Tyranny was the last really strong one
[20:11:50] <ChoyKloun> weirdest music video ever lol
[20:13:24] <ChoyKloun> no EBM clubs here :( :( :(
[20:14:30] *** waldorf_ has joined #bittorrent
[20:15:00] <ChoyKloun> also my connection is too slow to stream mp3 radios reliably :( :(
[20:15:15] <ChoyKloun> can do it at the office though at off-peak hours
[20:16:51] *** razvand has quit IRC
[20:19:49] *** waldorf_ has quit IRC
[20:51:58] <SundanceKid> :)
[20:52:17] <SundanceKid> folks, please advice tell me what about order of info's items
[20:52:26] <SundanceKid> in info_hash
[20:52:53] <SundanceKid> I guess it may cause many troubles
[20:53:16] <SundanceKid> if the order will be changed
[20:53:24] <The_8472> dictionaries are sorted by binary sorting of the keys
[20:53:38] <SundanceKid> binary sorting?
[20:54:01] <The_8472> well, not unicode-compare of the characters but sorting by the bytes of the keys
[20:54:07] *** razvand has joined #bittorrent
[20:54:11] <The_8472> binary, not strings
[20:54:24] <SundanceKid> thank you very muchg
[20:54:26] <SundanceKid> *much
[20:54:39] <The_8472> the bencoding spec mentions that somewhere btw
[20:55:01] <SundanceKid> theory's wiki doesn't say it...
[20:55:02] <The_8472> oh, and lists have no well-defined order, but if you dump them into numerically indexed arrays they should retain their order
[20:55:04] <SundanceKid> AFAIK
[20:55:10] <The_8472> that should be fixed
[20:55:34] <The_8472> http://bittorrent.org/beps/bep_0003.html <- the official spec does though
[20:56:09] <The_8472> http://wiki.theory.org/BitTorrentSpecification#dictionaries <- it does too
[20:56:18] <The_8472> "Keys must be strings and appear in sorted order (sorted as raw strings, not alphanumerics). The strings should be compared using a binary comparison, not a culture-specific "natural" comparison. "
[21:27:33] *** Switeck has joined #bittorrent
[21:44:41] *** KyleK_ has joined #bittorrent
[21:58:14] *** razvand has quit IRC
[22:03:35] *** GTHK has joined #bittorrent
[23:23:51] *** Andrius has quit IRC
[23:49:22] *** KyleK_ has quit IRC

top