Switch to DuckDuckGo Search
   August 13, 2012  
< | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | >


NOTICE: This channel is no longer actively logged.

Toggle Join/Part | bottom
[00:06:01] *** ced117[-] has quit IRC
[00:10:53] *** TheObfuscator has joined #bittorrent
[00:11:21] *** GeorgeJ has quit IRC
[00:11:57] *** TheObfuscator is now known as GeorgeJ
[00:19:46] *** dandon has joined #bittorrent
[00:31:23] *** ProperNoun has joined #bittorrent
[00:49:13] *** guest-4578 has quit IRC
[00:56:58] *** aristidesfl has left #bittorrent
[01:04:21] <GeorgeJ> If a peer announed itself with requirecrypto=1, should I only give its ip to peers that atleast provice supportcrypto=1?
[01:14:04] <GeorgeJ> provide*
[01:18:04] <DWKnight> only if you're keeping track of supportcrypto/requirecrypto
[01:18:14] <DWKnight> (requirecrypto implies supportcrypto)
[01:18:36] <GeorgeJ> Indeed.
[01:18:52] <GeorgeJ> From what I can see, some trackers ignore the crypto stuff.
[01:19:01] <DWKnight> read: most
[01:19:11] <DWKnight> there might be one or two that actuall do
[01:19:19] <DWKnight> but most ignore
[01:19:26] <GeorgeJ> What happens when a peer that requires crypto gets peers that don't support crypto?
[01:20:35] <DWKnight> they fail to connect
[01:20:38] <GeorgeJ> Also, if a peer supports crypto, should I provide peers that also support crypto first?
[01:21:03] <GeorgeJ> And non-crypto after.
[01:26:58] *** victrola` has joined #bittorrent
[02:29:50] *** hydri_ has joined #bittorrent
[02:29:51] *** hydri has quit IRC
[02:29:51] *** hydri_ is now known as hydri
[02:30:07] *** ProperNoun has quit IRC
[02:37:11] *** The_8472 has quit IRC
[03:34:50] *** ProperNoun has joined #bittorrent
[03:34:51] *** ProperNoun has joined #bittorrent
[03:50:41] *** zleslie has joined #bittorrent
[03:51:45] *** Kitsoran has joined #bittorrent
[03:52:13] <zleslie> I am looking to create a distribution network for personal backups. Is there a good lightweight tracker that I could use for this purpose?
[03:52:40] *** ProperNoun has quit IRC
[03:52:55] <zleslie> I've looked at opentracker, which looks to do the job, but I thought I would check here, since the information on google seems to point me to using other public trackers
[03:53:07] *** Kitsoran_ has quit IRC
[03:53:34] <TheSHAD0W> "Personal backups" - not sure what you're trying to accomplish.
[03:53:36] <zleslie> I know I could use publicbt and the like, but I am wondering about the security implications of doing so
[03:54:21] <zleslie> I mean, create a tar file, gpg encrypt the tar file, create a torrent, ship it places
[03:54:34] <DeHackEd> a lot of places?
[03:54:40] <zleslie> less than 10
[03:54:53] <TheSHAD0W> This is your personal data, or you're doing this for other people?
[03:55:04] * TheSHAD0W would kinda recommend DHT
[03:55:08] <zleslie> Just mine. Mostly a private git repo
[03:55:44] <zleslie> How does one go about creating a torrent that can be used with dht? From my understanding, there still has to be an entry point to the stream, correct?
[03:56:03] <TheSHAD0W> Any BT client that's compatible will bootstrap itself.
[03:56:26] <DeHackEd> during torrent creation you should provide the IP/port of a host that you know is up and running and accessible... but otherwise, what he said.
[03:56:26] <TheSHAD0W> Creating it? Just omit the tracker.
[03:56:45] <zleslie> so just mktorrent -o blag.torrent blag.tar.gz
[03:56:47] <zleslie> or whatever
[03:56:49] <zleslie> ?
[03:56:59] <TheSHAD0W> If you really want a tracker, I'd suggest phpbtt.
[03:57:02] <zleslie> What are some good toll.s for this?
[03:57:06] <zleslie> meh, I hate php
[03:57:19] <zleslie> *tools
[03:57:30] <TheSHAD0W> Yeah, but it's a small # of peers, it'll handle it easily.
[03:57:49] *** Kitsoran_ has joined #bittorrent
[03:57:55] <DeHackEd> *snicker*
[03:58:07] <zleslie> I may not want a tracker. And in fact, if I could get my torrents to distribute to one another, I would use dht
[03:58:35] <DeHackEd> you should still pass the .torrent file around, but that would be all you need. short of launching clients of course
[03:58:37] *** Kitsoran has quit IRC
[03:58:51] <TheSHAD0W> He could just pass the magnet link, too.
[03:58:58] <TheSHAD0W> Auto-process through email.
[03:58:59] <zleslie> So far, I have created a torrent file and distributed it to three different machines. I have rtorrent seeing the file behind nat, and two other systems trying to get the torrent. I am using a publicbt as a tracker, but the two other peers can't find the seed
[03:59:01] <DeHackEd> with gpg-encrypted payloads that would be okay,,
[03:59:10] <zleslie> TheSHAD0W: I would love to know how to use magnet links for this
[03:59:59] <TheSHAD0W> If all three are NAT'd, nothing will move.
[04:00:12] <TheSHAD0W> If the seed is behind NAT, run it and be patient, it should eventually connect.
[04:00:29] <zleslie> One of the peers is not NAT, but it doesn't have the file to seed
[04:00:36] <TheSHAD0W> As for generating magnet links, you just need the hash.
[04:01:03] <TheSHAD0W> Yeah. Give it time, the seed should find the open peer and connect.
[04:01:54] <zleslie> What is the lag for?
[04:02:01] <DeHackEd> periodic checkin to the tracker
[04:02:21] <DeHackEd> so in theory you could restart thet NAT'd clients to speed up the process if they have no connections at all...
[04:02:35] <TheSHAD0W> Not for trackerless.
[04:02:48] <DeHackEd> but his test is running on a public tracker
[04:02:53] <zleslie> true
[04:03:06] <zleslie> But if I could do this without a tracker, I would love to.
[04:05:21] <zleslie> mktorrent seems to require an announce url. What other tools are available for this? The bittorrent.py scripts seem to be a bit outdated.
[04:07:28] <zleslie> Perhaps my ISP is blocking traffic to the tracker
[04:08:19] <DeHackEd> unless you enabled private mode, clients will fall back to DHT. your ISP would also need to block that...
[04:08:27] <DeHackEd> not impossible but somewhat unlikely
[04:09:10] <zleslie> It appears that the only client doing dht is the seed.
[04:09:18] <zleslie> Still nothing is moving to the peers
[04:09:53] *** ProperNoun has joined #bittorrent
[04:09:53] *** ProperNoun has joined #bittorrent
[04:10:15] <TheSHAD0W> Are you sure the seed is a seed?
[04:10:32] <zleslie> rtorrent says 100% complete
[04:10:36] <TheSHAD0W> Okay.
[04:10:48] <TheSHAD0W> You'd be surprised how often that happens. X_X
[04:11:38] <zleslie> What *nix tools can I use to create a dht torrent?
[04:12:28] <zleslie> I have to admit, I don't really understand dht, other tell the client about a blob, and it will look for other clients that have the same blob, and they will have a party
[04:13:20] <TheSHAD0W> That's about it.
[04:13:42] <TheSHAD0W> Don't know what tools are available.
[04:14:16] <TheSHAD0W> But really, all you need to do is get the infohash from a torrent and stick it in a URL.
[04:14:45] <TheSHAD0W> So long as one compatible client is running the actual torrent, the data will spread.
[04:14:56] <TheSHAD0W> (Your seed, preferably.)
[04:17:05] <zleslie> How might I retrieve the info hash? Or does that mean its time to read up on the spec and break out some ruby?
[04:17:30] <DWKnight> don't private flag your torrents if you want them to use dht
[04:20:40] <TheSHAD0W> zleslie: There are python tools out there you can adapt; the definition of the info hash is: sha1(bencode(bdecode(torrent)['info']))
[04:21:55] <TheSHAD0W> AFK BBL
[04:22:00] <zleslie> Thank you
[04:47:46] *** Kitsoran has joined #bittorrent
[04:48:53] *** Kitsoran_ has quit IRC
[05:13:35] *** MassaRoddel has quit IRC
[05:15:02] *** localhost has quit IRC
[05:16:07] *** Kitsoran has quit IRC
[05:18:33] *** localhost has joined #bittorrent
[06:55:08] *** ProperNoun has quit IRC
[07:19:38] *** MassaRoddel has joined #bittorrent
[07:29:58] *** jave has quit IRC
[07:30:46] *** jave has joined #bittorrent
[07:41:25] *** ProperNoun has joined #bittorrent
[07:41:25] *** ProperNoun has joined #bittorrent
[08:06:38] *** DWKnight has quit IRC
[08:23:37] *** ProperNoun has quit IRC
[08:26:04] *** dummeh29 has joined #bittorrent
[08:28:46] *** DWKnight has joined #bittorrent
[08:43:06] *** ProperNoun has joined #bittorrent
[08:43:07] *** ProperNoun has joined #bittorrent
[10:31:41] *** ProperNoun has quit IRC
[10:48:45] *** ProperNoun has joined #bittorrent
[10:48:46] *** ProperNoun has joined #bittorrent
[11:36:45] *** ProperNoun has quit IRC
[11:42:30] *** dummeh29 has quit IRC
[11:44:35] *** ProperNoun has joined #bittorrent
[11:44:36] *** ProperNoun has joined #bittorrent
[12:13:20] *** cardamon has joined #bittorrent
[12:13:33] <cardamon> What's the point of randomized listen ports?
[12:25:38] <TheSHAD0W> When ISPs started throttling BT to the point of dysfunction, they began doing it based on port ranges.
[12:25:42] <DeHackEd> prevents ISPs from throttling by standardized potrs
[12:26:26] <TheSHAD0W> If ISPs had throttled BT reasonably, that change might never have occurred.
[12:28:10] <DeHackEd> mine throttled up/down to 30 kB/sec each on a per-user basis between ~4pm and 2am
[12:50:59] <cardamon> Okay.
[12:51:35] <cardamon> How does that work with a firewall?
[12:51:53] <TheSHAD0W> Not well. :-P
[12:52:04] <cardamon> I imagine not so well, unless the randomization is restricted to a range and that range left unblocked.
[12:52:09] <TheSHAD0W> If upnp is available, the client can automatically pinhole it...
[12:52:24] <TheSHAD0W> Otherwise, you'd pick a static random port and pinhole it manually.
[12:52:40] <cardamon> I'm not familiar with that, but I'm working with rtorrent and firestarter.
[12:53:01] <DeHackEd> select ports and port forward on your router
[12:53:02] <cardamon> In case you are familiar. Firestarter's just a graphical iptables frontend.
[12:53:20] <DeHackEd> upnp is hated in the security community as being hazardous, if convenient
[12:53:26] <cardamon> Ah.
[12:54:03] <DeHackEd> it lets any app request any port forwarding without any authentication and often routers don't even have the option to list active forwards
[12:54:32] <TheSHAD0W> And often upnp allows other, deeper access to the router.
[12:54:38] <cardamon> What's an active forward?
[12:55:09] <DeHackEd> a port forwarding requested by upnp that's still active?
[12:55:12] <cardamon> A forward which is actively being used?
[12:55:36] <cardamon> Mkay, well, I'm just going to open up a range.
[12:55:48] <TheSHAD0W> It's possible to have a upnp port forwarding stored in the router but not enabled.
[12:55:54] * TheSHAD0W nods
[12:58:08] <cardamon> How big a range do you think is necessary?
[12:58:17] <DeHackEd> 1
[12:58:48] <TheSHAD0W> Well, for BT, 1. For general use, I'd forward a block of 100 ports to each computer behind the NAT.
[13:00:35] * TheSHAD0W typically forwards 10100-10199 to 192.168.x.101, etc
[15:14:05] *** localhost has quit IRC
[15:20:06] *** Gottaname has joined #bittorrent
[15:21:32] *** localhost has joined #bittorrent
[15:39:09] *** ProperNoun has quit IRC
[16:39:25] *** ssiloti has quit IRC
[16:39:27] *** devilspgd has quit IRC
[16:39:27] *** Smirker has quit IRC
[16:39:42] *** devilspgd has joined #bittorrent
[16:45:01] *** ssiloti has joined #bittorrent
[16:45:01] *** Smirker has joined #bittorrent
[19:27:42] *** HarryS has quit IRC
[20:19:27] *** The_8472 has joined #bittorrent
[20:27:28] *** localhost has quit IRC
[20:49:12] *** HarryS has joined #bittorrent
[21:47:01] *** _Foxtrot has joined #bittorrent
[21:47:23] <_Foxtrot> I am currently running through vpn with peerblock. Any other recommendations?
[21:57:30] <DWKnight> stop deluding yourself that peerblock will protect you from anything
[22:03:17] <DWKnight> on a scale of 1 to 10, 10 giving you the highest protection
[22:03:23] <DWKnight> peerblock scores a negative 50
[22:03:44] <_Foxtrot> peerblock helps protect against certain IPs, providing a positive value.
[22:03:51] <_Foxtrot> On a scale from 1 to 10, maybe a 2.
[22:04:00] <_Foxtrot> But like I said, also routing through swissvpn
[22:04:09] <_Foxtrot> Which is why I ask if there are any other steps I could take?
[22:06:34] <DWKnight> peerblock is actually more likely to funnel you into the anti-p2p groups
[22:06:37] <DWKnight> rather than out of
[22:07:02] <_Foxtrot> Please explain this because it defies logic. Being solely a ip-blocker, how can if funnel you into them?
[22:07:27] <DWKnight> the anti-p2p groups are in the 66% of the internet they haven't blocked
[22:07:54] <DWKnight> and only a microscopic percentage of the groups are actually in the 34% that they have
[22:08:05] <_Foxtrot> Where did you get those figures from?
[22:08:41] <DWKnight> they are an estimate, but torrentfreak has the exact numbers on their article
[22:09:51] <DWKnight> the miss rate for the anti-p2p groups' ip addresses vs the peerblock blocklist is massive though
[22:10:54] <_Foxtrot> Well thanks for the info, but my initial question is still unanswered. Aside from a VPN, is there anything else I can do?
[22:11:05] <DWKnight> no
[22:25:02] *** The_8472 has quit IRC
[22:29:14] *** `rafi_ has joined #bittorrent
[22:29:18] *** ProperNo- has joined #bittorrent
[22:29:29] *** ProperNo- is now known as ProperNoun
[22:30:45] *** ProperNoun has quit IRC
[22:30:45] *** ProperNoun has joined #bittorrent
[22:48:47] *** localhost has joined #bittorrent
[22:49:51] *** localhost has quit IRC
[22:51:54] *** `rafi_ has quit IRC
[22:55:09] *** _Foxtrot has quit IRC
[23:25:28] *** Kitsoran has joined #bittorrent
top

   August 13, 2012  
< | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | >