[e-privacy] Deep packet inspection engine goes open source

Andrea Glorioso andrea at digitalpolicy.it
Tue Sep 15 11:37:40 CEST 2009


http://arstechnica.com/open-source/news/2009/09/deep-packet-inspection-engine-goes-open-source.ars

Deep packet inspection engine goes open source

   A leading European vendor of deep packet inspection (DPI) has just
   open-sourced the detection engine that identifies protocols passing
   over the Internet--just don't count on learning how it identifies even
   encrypted BitTorrent and Skype connections.
   By [34]Nate Anderson | Last updated September 9, 2009 6:31 AM CT

   Deep packet inspection engine goes open source

   [38]Deep packet inspection (DPI) hardware can identify an astonishing
   array of protocols passing across the Internet--up to and including
   protocols that are rare even to us in the Orbiting HQ (Gadu-Gadu?
   Manolito? Feidian?). But if you've ever wondered just how this can be
   done, and done at wire speed, wonder no more: Europe's leading DPI
   vendor has open-sourced a version of its traffic detection engine.

   [39]OpenDPI.org is the new home for ipoque's open source project;
   anyone interested can take a look at the code or contribute patches.
   The goal in this case, though, isn't so much about crowdsourcing
   product development but about easing [40]consumer [41]fears about DPI
   technology.

   Klaus Mochalski, CEO of ipoque, explains that "transparency was
   important for us from the beginning. The lack of transparency from the
   vendors' side is widespread in the DPI business. Our thoughts are a bit
   different and that is why we decided to push this project."

   The OpenDPI engine, released under the LGPL license, differs from
   ipoque's commercial scanning engine in its high-priced DPI hardware.
   The open-source version is much slower and (more importantly) doesn't
   reveal ipoque's methods for identifying encrypted transmissions. DPI
   vendors all claim high levels of success at identifying such traffic
   based on the flow patterns and handshake signatures common to protocols
   like BitTorrent and Skype, even if they cannot crack the encryption and
   examine the content of those transmissions.

   The OpenDPI engine will identify a huge list of non-encrypted
   protocols, however:
     * P2P File Sharing: BitTorrent, eDonkey , KaZaa/Fasttrack, Gnutella,
       WinMX, DirectConnect, AppleJuice, Soulseek, XDCC, Filetopia,
       Manolito, iMesh, Pando
     * Voice over IP: SIP, IAX, RTP
     * Instant Messaging: Yahoo, Oscar, IRC, unencrypted Jabber,
       Gadu!Gadu, MSN
     * Streaming Protocols: ORB, RTSP, Flash, MMS, MPEG, Quicktime, Joost,
       WindowsMedia, RealMedia, TVAnts, SOPCast, TVUPlayer, PPStream,
       PPLive, QQLive, Zattoo, VeohTV, AVI, Feidian, Ececast, Kontiki,
       Move, RTSP, SCTP, SHOUTcast
     * Tunnel Protocols: IPsec,GRE, SSL, SSH, IP in IP
     * Standard Protocols: HTTP, Direct download links (1-click file
       hosters), POP, SMTP, IMAP, FTP, BGP, DHCP, DNS, EGP, ICMP, IGMP,
       MySQL, NFS, NTP, OSPF, pcAnywhere, PostgresSQL, RDP, SMB, SNMP,
       SSDP, STUN, Telnet, Usenet, VNC, IPP, MDNS, NETBIOS, XDMCP, RADIUS,
       SYSLOG, LDAP
     * Gaming Protocols: World of Warcraft, Half-Life, Steam, Xbox, Quake,
       Second Life

   ipoque apparently wants to convince people that its detection code
   doesn't store or examine the actual content being transmitted. The
   company made the same point in a white paper released last week. "DPI
   as such has no negative impact on online privacy," it says. "It is,
   again, only the applications that may have this impact. Prohibiting DPI
   as a technology would be just as naive as prohibiting automatic speech
   recognition because it can be used to eavesdrop on conversations based
   on content. Although DPI can be used as a base technology to look at
   and evaluate the actual content of a network communication, this goes
   beyond what we understand as DPI as it is used by Internet bandwidth
   management--the classification of network protocols and applications."

   DPI can (and does) go much further than this, of course; it is used by
   law enforcement to grab complete copies of particular users' Internet
   datastreams in investigations, and companies like NebuAd (now defunct)
   and Phorm (still funct) use it to examine the URLs being visited by
   users in order to better target advertising to them. ipoque's paper
   admits to such uses, but calls them "beyond the scope of this paper."

   Releasing its detection engine for analysis is meant to allay fears
   that ipoque's traffic management DPI is a "bad" application of the
   technology. "By giving the general public access to parts of our DPI
   engine, we want to demonstrate that many of the alleged privacy
   violations simply do not happen in DPI bandwidth management systems,"
   says the company, though plenty of Internet users dislike DPI for
   reasons that have little to do with privacy and have much more to do
   with concerns over things like network neutrality (however one defines
   that idea).

   But at least we now know how to identify a Second Life connection:
>if ((ntohs(packet->udp->dest) == 12035 || ntohs(packet->udp->dest) == 12036 ||
(ntohs(packet->udp->dest) >= 13000 && ntohs(packet->udp->dest) <= 13050))
//port
                && packet->payload_packet_len > 6       // min length with no ex
tra header, high frequency and 1 byte message body
                && get_u8(packet->payload, 0) == 0x40   // reliable packet
                && ntohl(get_u32(packet->payload, 1)) == 0x00000001     // seque
nce number equals 1
                //ntohl (get_u32 (packet->payload, 5)) == 0x00FFFF00      // no
extra header, low frequency message - can't use, message may have higher frequen
cy
                ) {
                IPQ_LOG(IPOQUE_PROTOCOL_SECONDLIFE, ipoque_struct, IPQ_LOG_DEBUG
, "Second Life detected.\n");
                ipoque_int_secondlife_add_connection(ipoque_struct);
                return;

   [42]Click here to view comments on this article.

  34. http://arstechnica.com/authors/nate-anderson/
  35. http://arstechnica.com/open-source/news/2009/09/deep-packet-inspection-engine-goes-open-source.ars
  36. http://arstechnica.com/open-source/news/2009/09/deep-packet-inspection-engine-goes-open-source.ars
  37. http://episteme.arstechnica.com/eve/forums?a=dl&f=174096756&x_id=mtid39640
  38. http://arstechnica.com/hardware/news/2007/07/Deep-packet-inspection-meets-net-neutrality.ars
  39. http://www.opendpi.org/
  40. http://arstechnica.com/tech-policy/news/2009/03/does-deep-packet-inspection-mean.ars
  41. http://arstechnica.com/tech-policy/news/2008/09/prof-rails-against-greatest-reduction-of-user-privacy-in-net-history.ars

--
      Andrea Glorioso || http://people.digitalpolicy.it/sama/cv/
          M: +32-488-409-055         F: +39-051-930-31-133
  * Le opinioni espresse in questa mail sono del tutto personali *
      * The opinions expressed here are absolutely personal *

	"Constitutions represent the deliberate judgment of the
     people as to the provisions and restraints which [...] will
	secure to each citizen the greatest liberty and utmost
	       protection. They are rules proscribed by 
	         Philip sober to control Philip drunk."
			   David J. Brewer (1893)
       An Independent Judiciary as the Salvation of the Nation
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 196 bytes
Desc: not available
URL: <http://lists.winstonsmith.org/pipermail/e-privacy/attachments/20090915/f7d627e5/attachment.pgp>


More information about the E-privacy mailing list