Calgarypuck Forums - The Unofficial Calgary Flames Fan Community
Old 08-05-2010, 03:52 PM   #21
Azure
Had an idea!
 
Azure's Avatar
 
Join Date: Oct 2005
Exp:
Default

You could call it a specific request. There is a little bit more involved though, in terms of how I'm associated with them.

The sheer number of websites being accessed each day is staggering, so in terms of starting a blacklist or whitelist, even if only for SSL, if that is possible, would be a huge headache.

I realize that we're never going to be able to block all objectionable content, so we're just looking at ways to block programs like Tor that create bottlenecks because they send all their data over SSL.
Azure is online now   Reply With Quote
Old 08-05-2010, 04:02 PM   #22
mykalberta
Franchise Player
 
mykalberta's Avatar
 
Join Date: Aug 2005
Location: Calgary
Exp:
Default

Remove admin rights from everyone.

Install a web filter device to block anything not company related - devices come with premade white and black lists so the monitoring goes down considerably. Yes its alot of work at the beginning but you have to start somewhere.

If you are on a Windows domain modify your login script to remove all instances of the software.

Send an email out to all users advising of an update IT policy. Dont mention onion routers specifically but make sure its in the document.

Add admin rights on a case by case basis and get HR to fire anyone who installs an onion router on their computer as its a violation of the corporate IT policy.
__________________
MYK - Supports Arizona to democtratically pass laws for the state of Arizona
Rudy was the only hope in 08
2011 Election: Cons 40% - Nanos 38% Ekos 34%
mykalberta is offline   Reply With Quote
Old 08-05-2010, 04:31 PM   #23
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

It's not a company situation mykalberta, look down a few more posts
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 08-05-2010, 04:52 PM   #24
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

Quote:
Originally Posted by Azure View Post
The sheer number of websites being accessed each day is staggering, so in terms of starting a blacklist or whitelist, even if only for SSL, if that is possible, would be a huge headache.
Well a blacklist wouldn't be too bad if you could find a decent source for the info. I haven't been able to find anything tho.

Quote:
Originally Posted by Azure View Post
I realize that we're never going to be able to block all objectionable content, so we're just looking at ways to block programs like Tor that create bottlenecks because they send all their data over SSL.
The SSL packets themselves shouldn't be creating any kind of bottleneck that I can think of, SSL puts a load on a server when that server has to actually decrypt it (like on the web server), otherwise it's just a normal packet as far as a router or whatever is concerned isn't it?

If the Tor users are setting up the app as a server though that will generate extra bandwidth, though Tor usually tries to be pretty light in that respect, only 20KB/s by default I think (though they can crank that up).
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 08-05-2010, 05:04 PM   #25
temple5
Crash and Bang Winger
 
Join Date: Jan 2008
Exp:
Default

Use your router commands to limit the bandwidth on certain ip addresses that use these onion routers. You can then instruct your support desk people to ask users not to use the onion router and they will notice improved performance.

Then play dumb and say you dont support 3rd party applications vis a vi network performance. Then its a decision on whether or not those users leave your network for one that allows onion routers.

Here is a list of ip of known onion routers, you can start there.

12.180.53.27
12.210.16.72
128.112.139.71
128.2.132.175
128.2.141.33
128.213.49.23
128.232.110.15
128.30.28.19
128.39.141.245
128.61.33.204
128.83.114.63
129.187.150.131
129.21.144.146
129.21.228.88
129.21.235.5
129.22.170.183
129.241.146.126
130.126.141.153
130.233.31.185
131.128.57.15
131.155.71.110
131.175.189.134
131.179.224.133
131.188.185.41
131.212.128.101
132.241.222.72
134.130.58.205
134.53.24.52
136.145.54.123
137.120.180.50
137.120.180.65
137.148.5.13
137.186.203.38
137.226.59.249
138.236.226.221
139.142.184.213
140.247.60.64
140.247.62.119
140.247.62.121
141.149.128.197
141.151.11.182
141.154.30.240
141.158.117.185
141.20.103.68
141.76.46.90
143.106.35.156
143.225.138.34
144.120.8.219
145.116.2.192
149.9.0.21
150.140.191.102
151.204.64.80
151.37.130.242
151.8.40.35
154.20.197.21
154.35.1.8
155.207.113.227
157.82.61.22
158.130.50.3
168.150.251.36
170.140.8.149
18.152.2.242
18.187.1.68
18.244.0.114
18.244.0.188
18.246.2.33
18.78.1.38
192.42.113.248
192.83.249.30
192.94.73.4
193.16.154.187
193.201.52.56
193.201.53.118
193.201.54.32
193.202.88.3
193.219.28.245
193.239.165.73
193.28.225.8
193.4.140.225
194.109.109.109
194.109.206.212
194.109.217.74
194.177.96.122
194.21.56.6
194.254.163.170
194.95.224.201
195.137.213.113
195.137.53.121
195.158.168.91
195.169.149.213
195.169.149.45
195.245.255.11
195.37.132.28
195.4.33.106
195.4.34.130
195.71.99.214
195.72.0.6
195.85.225.145
198.161.91.196
198.252.201.22
198.53.171.191
198.82.143.115
199.77.129.53
200.121.55.151
202.173.141.155
203.155.247.4
203.214.40.55
203.218.152.56
203.59.90.71
203.81.205.245
203.87.60.80
204.253.162.11
206.174.19.25
206.225.83.5
207.150.167.67
207.241.238.149
208.185.251.121
208.201.238.46
208.40.218.131
209.114.200.129
209.158.45.74
209.172.34.176
209.172.52.78
209.237.225.10
209.237.225.244
209.242.32.13
209.6.168.183
209.8.40.177
211.30.179.86
212.112.228.2
212.112.235.78
212.112.235.83
212.112.241.137
212.112.242.159
212.112.242.21
212.114.250.252
212.129.150.55
212.187.48.185
212.202.185.218
212.202.185.218
212.202.202.61
212.202.210.148
212.202.233.2
212.224.22.39
212.227.108.114
212.227.20.171
212.227.21.133
212.239.118.83
212.24.170.230
212.254.169.67
212.37.39.59
212.51.10.6
212.56.108.4
212.61.66.38
212.65.15.99
213.100.118.133
213.100.254.163
213.112.252.71
213.114.177.177
213.114.241.157
213.114.249.104
213.114.29.49
213.114.70.228
213.133.99.185
213.139.167.121
213.146.114.96
213.152.49.145
213.199.120.94
213.203.214.130
213.228.241.143
213.23.166.241
213.239.194.175
213.239.202.232
213.239.206.174
213.239.206.209
213.239.212.133
213.239.212.206
213.239.212.45
213.39.136.173
213.39.208.142
213.39.224.249
213.61.151.217
213.66.96.2
213.84.43.3
213.84.74.36
213.9.1.108
216.110.230.24
216.12.165.46
216.127.67.122
216.128.228.129
216.130.255.201
216.137.65.86
216.152.242.200
216.194.67.53
216.229.42.234
216.231.47.120
216.239.84.251
216.254.30.234
216.32.80.75
216.39.137.58
216.55.149.21
217.115.192.218
217.14.64.70
217.147.80.73
217.149.34.124
217.155.230.230
217.160.108.109
217.160.109.40
217.160.132.150
217.160.135.169
217.160.142.69
217.160.169.57
217.160.170.132
217.160.176.49
217.160.177.118
217.160.203.26
217.160.204.97
217.160.243.3
217.172.183.219
217.172.187.46
217.19.27.52
217.195.47.235
217.195.47.250
217.195.47.90
217.20.115.110
217.20.118.52
217.20.119.144
217.28.206.143
217.30.80.251
217.67.20.124
217.79.181.118
217.84.20.164
219.105.111.74
219.121.56.122
220.234.207.167
24.10.127.243
24.109.169.177
24.110.46.122
24.118.119.93
24.125.123.117
24.127.127.0
24.13.102.7
24.136.12.209
24.155.82.33
24.158.125.162
24.175.184.12
24.18.9.231
24.195.233.60
24.196.160.242
24.196.81.188
24.202.238.201
24.21.218.164
24.22.104.31
24.223.233.77
24.242.15.236
24.248.42.6
24.250.192.233
24.26.168.120
24.30.166.167
24.30.67.89
24.42.97.30
24.49.13.143
24.61.206.174
24.63.99.6
24.8.195.218
24.9.185.227
24.91.138.153
24.92.148.113
24.94.2.121
24.95.77.45
38.118.213.59
38.99.66.86
58.70.61.200
59.104.14.202
60.36.181.86
61.242.102.18
61.60.193.99
62.121.31.116
62.142.71.120
62.178.28.11
62.197.40.155
62.2.174.20
62.241.240.86
62.243.85.164
62.245.160.221
62.48.34.110
62.75.129.201
62.75.149.130
62.75.151.195
62.75.171.154
63.226.50.201
63.240.161.99
63.246.145.70
63.85.194.6
64.115.210.23
64.122.12.107
64.135.207.45
64.142.114.146
64.142.31.83
64.142.74.86
64.230.61.228
64.246.26.190
64.246.50.101
64.34.171.70
64.5.53.220
64.5.53.33
64.5.53.76
64.81.100.208
64.81.227.88
64.81.240.144
64.81.60.157
64.90.164.74
64.90.179.108
64.90.191.94
64.95.64.86
65.174.217.58
65.196.226.32
65.25.220.178
65.25.243.192
65.254.37.163
65.254.45.209
65.254.53.253
65.27.237.240
65.28.107.89
65.34.4.116
65.60.136.107
65.7.136.249
65.87.159.80
66.11.179.38
66.111.43.137
66.119.199.39
66.133.254.180
66.167.145.76
66.171.213.151
66.173.227.152
66.199.240.50
66.210.104.251
66.240.226.11
66.25.179.124
66.27.23.221
66.36.149.5
66.70.10.53
66.75.246.142
66.90.89.162
66.92.13.212
66.92.188.226
66.92.65.81
66.92.68.250
66.93.119.120
66.93.170.242
66.93.38.182
67.160.81.217
67.162.245.33
67.165.17.208
67.173.141.4
67.173.143.46
67.176.204.108
67.18.245.109
67.23.145.190
67.9.73.103
68.100.47.107
68.105.208.9
68.110.103.159
68.124.67.183
68.127.166.152
68.13.108.179
68.147.200.77
68.148.190.38
68.15.6.112
68.166.37.86
68.167.210.150
68.171.51.78
68.173.37.136
68.196.34.109
68.206.115.47
68.22.203.57
68.236.70.84
68.35.231.249
68.40.13.117
68.40.171.66
68.40.71.110
68.51.73.79
68.63.175.251
68.75.130.19
68.77.46.181
68.80.155.150
68.92.133.155
68.97.126.56
68.98.18.98
69.115.136.99
69.115.136.99
69.12.128.187
69.12.128.32
69.12.134.80
69.12.145.165
69.143.132.120
69.156.163.231
69.163.32.140
69.19.200.4
69.223.151.51
69.234.64.214
69.238.169.111
69.24.161.198
69.30.208.78
69.30.99.210
69.41.174.196
69.51.152.43
69.56.216.138
69.60.111.222
69.60.114.226
69.60.122.49
69.60.123.22
69.62.156.11
69.90.33.237
69.92.94.253
69.93.158.203
69.93.89.162
70.107.183.65
70.110.70.238
70.113.92.185
70.154.240.195
70.162.65.208
70.174.161.159
70.187.87.248
70.189.232.20
70.20.36.160
70.225.174.68
70.230.73.20
70.248.67.160
70.27.5.5
70.30.133.219
70.31.42.165
70.49.106.177
70.80.240.218
70.84.114.153
70.84.253.4
70.89.90.165
71.116.93.118
71.123.91.194
71.133.227.217
71.137.240.249
71.210.131.125
71.242.124.82
71.245.96.91
71.248.176.135
71.36.98.117
71.39.113.14
72.150.10.129
72.21.33.202
72.226.235.186
72.3.249.87
72.60.167.126
72.9.242.90
80.126.37.100
80.126.7.66
80.127.66.162
80.135.142.100
80.143.187.33
80.145.178.17
80.188.120.29
80.190.233.18
80.190.242.122
80.190.242.130
80.190.250.139
80.190.250.83
80.190.251.24
80.202.94.130
80.203.228.236
80.237.146.62
80.237.160.201
80.237.203.179
80.242.195.68
80.47.217.105
80.57.244.213
80.68.93.199
80.69.66.227
80.74.144.159
80.78.242.241
81.0.225.179
81.1.123.182
81.169.136.161
81.169.158.102
81.169.171.212
81.169.176.178
81.169.179.142
81.169.180.180
81.169.181.10
81.169.183.70
81.179.210.50
81.186.252.150
81.216.128.130
81.227.243.7
81.227.76.106
81.232.171.52
81.235.200.91
81.53.207.146
81.56.27.175
81.57.158.21
81.62.25.76
81.75.221.33
82.119.168.20
82.128.211.126
82.128.216.146
82.131.6.73
82.135.6.122
82.141.92.180
82.141.92.235
82.156.33.125
82.165.144.169
82.165.180.112
82.165.233.43
82.182.109.115
82.183.192.131
82.227.61.106
82.244.152.77
82.49.137.161
82.51.170.216
82.57.105.249
82.60.6.171
82.67.68.163
82.92.225.162
82.94.251.206
83.103.151.156
83.133.126.131
83.133.81.20
83.149.72.45
83.149.97.103
83.151.25.186
83.160.194.169
83.160.255.58
83.171.155.111
83.171.191.230
83.219.212.101
83.223.108.108
83.227.72.118
83.233.97.28
83.243.88.133
83.245.15.87
83.245.82.184
83.33.23.15
83.67.103.151
84.141.182.242
84.159.13.229
84.16.234.49
84.16.235.143
84.16.236.173
84.174.82.31
84.177.181.48
84.179.35.76
84.217.125.240
84.220.122.177
84.220.98.187
84.221.75.14
84.221.92.228
84.248.19.49
84.34.133.217
84.41.143.100
84.56.169.94
84.56.41.121
84.56.65.169
84.56.86.102
84.56.86.96
84.57.75.167
84.58.143.182
84.61.117.183
84.61.138.252
84.72.104.77
84.73.12.12
84.73.180.96
85.10.194.117
85.10.210.46
85.10.240.250
85.10.241.166
85.119.156.237
85.15.185.38
85.176.222.156
85.176.65.55
85.178.235.61
85.178.53.250
85.214.29.61
85.214.44.126
85.225.170.177
85.25.130.195
85.25.66.203
85.25.66.207
85.31.186.61
85.57.130.50
85.76.189.225
85.76.77.6
85.77.12.12
85.8.136.101
85.84.204.128
85.90.138.251
86.56.26.161
86.59.21.38
87.123.108.23
87.123.119.108
87.123.37.254
87.3.84.56
87.89.99.153
88.134.98.136
88.198.0.177
88.72.36.152
88.96.65.45
temple5 is offline   Reply With Quote
Old 08-05-2010, 05:07 PM   #26
Hack&Lube
Atomic Nerd
 
Join Date: Jul 2004
Location: Calgary
Exp:
Default

I'm curious, what kind of objectionable content are we talking about here? If possible, a complete and fully detailed list if possible

Are we talking about people downloading music/movies? Or more morally objectionable content? I'm curious from a socialogical point of view of how these communities are dealing with modernity.

What filters do you already have in place? Are they resorting to these methods to get around them?
Hack&Lube is offline   Reply With Quote
Old 08-05-2010, 06:35 PM   #27
Azure
Had an idea!
 
Azure's Avatar
 
Join Date: Oct 2005
Exp:
Default

Quote:
Originally Posted by Hack&Lube View Post
I'm curious, what kind of objectionable content are we talking about here? If possible, a complete and fully detailed list if possible

Are we talking about people downloading music/movies? Or more morally objectionable content? I'm curious from a socialogical point of view of how these communities are dealing with modernity.

What filters do you already have in place? Are they resorting to these methods to get around them?
Again, I'm not sure what is actually being accessed using Tor. Could be anything. Could be some paranoid guy who thinks he has to use onion routers to encrypt everything he does on the internet because big brother is out to get him.

The filter in place is the iPrism from St. Bernard. I do also think that they use the Sonicwall content filter, although each community has their own Sonicwall, and would control it themselves.

Oh, if you have other questions I'd be happy to answer them over PM. Don't really want to drive this thread more off-topic.
Azure is online now   Reply With Quote
Old 08-05-2010, 06:38 PM   #28
Azure
Had an idea!
 
Azure's Avatar
 
Join Date: Oct 2005
Exp:
Default

Quote:
Originally Posted by photon View Post
The SSL packets themselves shouldn't be creating any kind of bottleneck that I can think of, SSL puts a load on a server when that server has to actually decrypt it (like on the web server), otherwise it's just a normal packet as far as a router or whatever is concerned isn't it?

If the Tor users are setting up the app as a server though that will generate extra bandwidth, though Tor usually tries to be pretty light in that respect, only 20KB/s by default I think (though they can crank that up).
Well that is my question too. I was told the onion routers are causing bottlenecks in the network because of something involved with SSL.

I would assume it has something to do with everything being decrypted? I'm not sure.

It definitely has something to do with SSL. I'll have to find out more. Reason I say that is because during the Grey Cup, Olympics, when a lot of people were watching online events and using bandwidth, the hardware in place had no problem designating priority bandwidth to VOIP or IPTV, which ran flawlessly during that time.

Of course none of those things were over SSL.
Azure is online now   Reply With Quote
Old 08-05-2010, 08:38 PM   #29
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

Quote:
Originally Posted by Azure View Post
Well that is my question too. I was told the onion routers are causing bottlenecks in the network because of something involved with SSL.

I would assume it has something to do with everything being decrypted? I'm not sure.

It definitely has something to do with SSL. I'll have to find out more. Reason I say that is because during the Grey Cup, Olympics, when a lot of people were watching online events and using bandwidth, the hardware in place had no problem designating priority bandwidth to VOIP or IPTV, which ran flawlessly during that time.

Of course none of those things were over SSL.
The routers can't decrypt the packets though, that's the whole point of the encryption is the only one that can decrypt it is the browser and the web server.

It could be that the SSL packets aren't being shaped because they don't know what they are and they leaving port 443 at a high priority, but that'd be a choice because I'm sure they could push the priority of the encrypted packets down even if they can't be decrypted. Might slow down online banking too, but that's probably low enough usage that it'd be a fair enough tradeoff to ensure the entire network doesn't deteriorate.

But yeah need more info, and I'm not a network guy either so I could be completely off track.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 08-05-2010, 08:59 PM   #30
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

I wonder if this would be a solution - since Tor is essentially a proxy, what would happen if ALL web traffic had to utilize a proxy at the ISP to access the web?

Since a browser can only use one proxy, would this effectively kill Tor? I haven’t looked into the client design enough - perhaps Tor clients know to relay requests to upstream proxies.

Edit: nope, not a solution: https://trac.torproject.org/projects...PorSOCKSproxy.

Edit #2:

I think the approach you need to begin with, and that would demonstrate due diligence to your customer, is to block access to the Tor Directory Servers. These are the authoritative servers that the Tor client uses to find available Tor routers. If the client can’t fetch this list, it can’t connect.

Presumably, a hard core user could manually obtain the list from a mirror site, however, blocking access to the directory servers is a good first step. You could also build a script that would access these same directory servers and retrieve the list, and update your blocks for the actual Tor routers too. Schedule that to run hourly, and you’re going to be moving just as quickly to stamp out Tor activity as users will be able to find new Tor routers.

An important thing to keep in mind is that you don’t have to achieve a 100% technically airtight solution - if you can effectively block all of Tor every hour or so, via a combination of directory server and known Tor router IP’s, you’ll make using Tor painful enough that people will find another approach.

And then the game starts again, but that’s another story...
__________________
-Scott

Last edited by sclitheroe; 08-05-2010 at 09:19 PM.
sclitheroe is offline   Reply With Quote
Old 08-05-2010, 09:28 PM   #31
Azure
Had an idea!
 
Azure's Avatar
 
Join Date: Oct 2005
Exp:
Default

I am going to recommend blocking access to the Tor Directory Servers, and to start blocking ports that may be in any way associated with Tor.

Also going to recommend like you said blocking and constantly updating the actual Tor routers.

Even if that doesn't solve the problem, which it won't, if I can help make it a headache on the technical side for someone to use Tor, I'm one step further ahead.

One step in a ladder that I'm never going to be able to climb.

I'll try to get further information why using Tor and such services creates a problem at the gateway level. Pretty sure I understood correctly that it was.

A while back there was an article in Linux Magazine that talked about a Proxy server basically killing services like HSS and Tor. I'll have to dig that up again.

Lots of good information here. Thanks for the replies so far!
Azure is online now   Reply With Quote
Old 08-05-2010, 09:34 PM   #32
Azure
Had an idea!
 
Azure's Avatar
 
Join Date: Oct 2005
Exp:
Default

Quote:
Originally Posted by photon View Post
The routers can't decrypt the packets though, that's the whole point of the encryption is the only one that can decrypt it is the browser and the web server.

It could be that the SSL packets aren't being shaped because they don't know what they are and they leaving port 443 at a high priority, but that'd be a choice because I'm sure they could push the priority of the encrypted packets down even if they can't be decrypted. Might slow down online banking too, but that's probably low enough usage that it'd be a fair enough tradeoff to ensure the entire network doesn't deteriorate.

But yeah need more info, and I'm not a network guy either so I could be completely off track.
Like I said I'll have to ask for more information. But it could be that because the SSL packets weren't being shaped, numerous people using onion routers were using up bandwidth that they couldn't restrict.

I would assume you CAN buy an appliance that will shape SSL traffic though.

Tor might only run at 20KB/s, but if you have numerous DIFFERENT people using it, or HSS, or FreeVPN, or any other similar service, it all adds up.
Azure is online now   Reply With Quote
Old 08-05-2010, 09:43 PM   #33
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

Keep us posted, it’s an interesting thread for sure.
__________________
-Scott
sclitheroe is offline   Reply With Quote
Old 08-05-2010, 09:54 PM   #34
Rathji
Franchise Player
 
Rathji's Avatar
 
Join Date: Nov 2006
Location: Supporting Urban Sprawl
Exp:
Default

Quote:
Originally Posted by Azure View Post
Like I said I'll have to ask for more information. But it could be that because the SSL packets weren't being shaped, numerous people using onion routers were using up bandwidth that they couldn't restrict.

I would assume you CAN buy an appliance that will shape SSL traffic though.

Tor might only run at 20KB/s, but if you have numerous DIFFERENT people using it, or HSS, or FreeVPN, or any other similar service, it all adds up.

Arbor-Ellacoya e30

I have heard (I think on dslreports.com) that this is what Shaw uses (used?) to shape traffic in area where the infrastructure is not sufficient to guarantee enough bandwidth for phones. If there is anything that can shape SSL traffic it might be a good place to start looking.

There is also a more robust e100 model, but I have no idea how it differs.
__________________
"Wake up, Luigi! The only time plumbers sleep on the job is when we're working by the hour."
Rathji is offline   Reply With Quote
Old 08-05-2010, 10:51 PM   #35
photon
The new goggles also do nothing.
 
photon's Avatar
 
Join Date: Oct 2001
Location: Calgary
Exp:
Default

Quote:
Originally Posted by Azure View Post
I would assume you CAN buy an appliance that will shape SSL traffic though.
I'd assume the one already purchased would be able to too, but that's just an assumption too.

The proxy idea is interesting, though it has it's own sets of wrinkles to maintain I think I've read, besides needing a box robust enough to run the proxy on.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
photon is offline   Reply With Quote
Old 08-06-2010, 02:29 AM   #36
BloodFetish
First Line Centre
 
Join Date: Aug 2009
Location: Coquitlam, BC
Exp:
Default

Quote:
Originally Posted by Azure View Post
It definitely has something to do with SSL. I'll have to find out more. Reason I say that is because during the Grey Cup, Olympics, when a lot of people were watching online events and using bandwidth, the hardware in place had no problem designating priority bandwidth to VOIP or IPTV, which ran flawlessly during that time.

Of course none of those things were over SSL.
Do you have access to the Sonicwalls to inspect the configuration?

Our company uses Sonicwalls too, and in some or our locations we reserve a percentage of bandwith for our core business services using the built in "Ethernet BWM" settings in the Firewall -> Access Rules. When our users misbehave and start streaming world cup soccer our registers still function normally, similar to your experience with VOIP and IPTV.

Now it's an assumption that your sonicwalls are configured to prioritize bandwidth in the same way, but I guess my point here is I can relate a theoretical example of how VOIP and IPTV could work flawlessly during peak usage times and therefore don't see how this points to SSL or TOR as culprits.
BloodFetish is offline   Reply With Quote
Old 08-06-2010, 02:50 AM   #37
BloodFetish
First Line Centre
 
Join Date: Aug 2009
Location: Coquitlam, BC
Exp:
Default

Quote:
Originally Posted by Azure View Post
I would assume you CAN buy an appliance that will shape SSL traffic though.
The Sonicwalls can probably do it, but probably in a more rudimentary fashion than an appliance dedicated to the task. They also might need to have Enhanced OS instead of Standard OS.

Just theory, but in the Sonicwalls firewall access rules (LAN -> WAN zone, or VPN -> WAN zone, depending on your setup) you could create a new rule to allow https traffic. It's already allowed, of course, but by creating a new rule for just https you can then play around with it and not affect anything else.

And then, on the Ethernet BWM tab of the rule, reserve 0% bandwidth for https BUT change the Bandwidth Priority setting to "7 lowest".

If that has the desired affect, then later you could add yet another https rule of higher priority that "whitelists" known online banking sites.

Like I said, just a theory since I've never attempted it myself.

EDIT: You won't get pretty charts like on the Arbor device though, and if money is no object...

Last edited by BloodFetish; 08-06-2010 at 02:55 AM.
BloodFetish is offline   Reply With Quote
The Following User Says Thank You to BloodFetish For This Useful Post:
Old 08-06-2010, 02:52 AM   #38
BloodFetish
First Line Centre
 
Join Date: Aug 2009
Location: Coquitlam, BC
Exp:
Default

Quote:
Originally Posted by photon View Post
I'd assume the one already purchased would be able to too, but that's just an assumption too.

The proxy idea is interesting, though it has it's own sets of wrinkles to maintain I think I've read, besides needing a box robust enough to run the proxy on.
Plus it would introduce another point of failure for the entire network.
BloodFetish is offline   Reply With Quote
The Following User Says Thank You to BloodFetish For This Useful Post:
Old 08-06-2010, 11:12 AM   #39
sclitheroe
#1 Goaltender
 
Join Date: Sep 2005
Exp:
Default

Quote:
Originally Posted by BloodFetish View Post
Plus it would introduce another point of failure for the entire network.
Not if done properly - money was not a constraint for this problem.
__________________
-Scott
sclitheroe is offline   Reply With Quote
The Following User Says Thank You to sclitheroe For This Useful Post:
Old 08-06-2010, 03:15 PM   #40
Azure
Had an idea!
 
Azure's Avatar
 
Join Date: Oct 2005
Exp:
Default

Quote:
Originally Posted by sclitheroe View Post
Not if done properly - money was not a constraint for this problem.
Peak connection of the network is 150mbps. Too much for a proxy server? Or what kind of hardware would I be looking at?

I'm going to go find the Linux Magazine article on proxy servers right now.
Azure is online now   Reply With Quote
Reply

Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -6. The time now is 04:52 PM.

Calgary Flames
2023-24




Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright Calgarypuck 2021