0 Members and 1 Guest are viewing this topic.
Your error in searching for "c: user" is that the fakers do not run from C: drives.
At present they operate without any root drive information shown in accordance with the WinMX v3.54 protocol.
You also cannot search for only "user" and expect results, as the word "user" itself is filtered internally by the WinMX client (hard-coded).
If you want to see fake files, try searching for "\user\files\" next time (be sure to run as a primary when you do this so you yourself can 'reap the benefits' of such a search).
"Is the solution applying a simple block list?" "That seems to be a pie-in-the-sky claim too." - You sound like someone who knows little about what they are talking.
I'll assume your errors in understanding are related to an assumption that only 1 IP address could not possibly do any damage to a network of tens/hundreds of thousands of users, and that 40 or so addresses, equally so, could not impact against that. You would be very wrong to think that if this is true.
As for "automated tools", well yes, of course "real automated tools" sound like a brilliant idea. You'll be sure to let everyone know when you have the system designed now, won't you? O.K., in a less-arsey way: if you have any ideas that you feel could work in this regard, please by-all-means communicate your thoughts to others who may take those ideas into consideration.
Just to finish up with regards your last comment. I'm sorry that you feel unconvinced that the DLL and associated filtering tactics are not as good as people purport them to be. If you have any thoughts as to how any aspect of these methods could be improved then, again, please communicate them to others who can take those ideas into consideration.
Guessed, I,ll let you into an open secret, the fake uploaders connect as secondaries using TCP and do not even need to touch the peer caches, they are part of a high speed server network operated by Macrovision called Smokeblower.
The caches by the way are not designed to filter anyone or anything and as such are out of the equation.Also, we would not in any case ask any of them to disrupt the network just to prove something we know the answer to.
While I understand your frustration regarding the mechanics of the blocklist you must be aware that any information given here could be used to attack its effectiveness and that unfortunately means we will not reveal the full system of operations publicly.I hope you can see the common sense reasoning and respect the people doing the hard work, and perhaps find a little trust in them as the rest of the community does.
If we need to contact the peer cache servers in order to learn what primaries are available to attempt connects to, why don't they? How do they know what primaries are available?
What I wanted as to know a simple way to determine a flooders IP when I have a screen full of fake files and the nicks of the flooders.
O.K., guessed, I'll try to go over your points there;At this moment in time it is quite possible to effectively eliminate fakes from search results using the "-user" filter. This is because nearly all, if not all, of the fakes being seen on the network at this moment in time reside on a "\user\files\" path. By using "-user" you're omitting this path.The "helping the RIAA DOS attack our network" aspect of not filtering is true in the sense that if a secondary user initiates a search query containing a string that matches any of the highly-faked files placed on the network, for instance "star wars", or "star", or "wars", the weight of search results returned by the network to the initiator of the search (the primary of which the secondary user is attached) can cause the primary to be overloaded in many ways due to inabilities to be able to handle the mass of incoming UDP datagrams (search results). This is what you could define as a Denial of Service attack, or DOS, as the strength of the incoming search results can easily result in denial of service for the primary."All the RIAA need do is fake random directories like "d:\shared\" to defeat the above." - Yes, true, but at present they don't which is why the "-user" filter is effective.Your error in searching for "c: user" is that the fakers do not run from C: drives. At present they operate without any root drive information shown in accordance with the WinMx v3.54 protocol. You also cannot search for only "user" and expect results, as the word "user" itself is filtered internally by the WinMx client (hard-coded). If you want to see fake files, try searching for "\user\files\" next time (be sure to run as a primary when you do this so you yourself can 'reap the benefits' of such a search)."Is the solution applying a simple block list?" "That seems to be a pie-in-the-sky claim too." - You sound like someone who knows little about what they are talking. I'll assume your errors in understanding are related to an assumption that only 1 IP address could not possibly do any damage to a network of tens/hundreds of thousands of users, and that 40 or so addresses, equally so, could not impact against that. You would be very wrong to think that if this is true. I would ask you to consider that the media companies do not run legitimate WinMx clients that are limited to interfacing with the network in a typical way, rather, that they operate custom designed (and probably illegal (dmca violations, anyone?)) software that emulates a typical WinMx secondary protocol client but is by no means limited to a single connection to a primary user on the WPN. Or, more plainly put, a legimate secondary client only ever initiates a single outbound TCP link into a single primary on the network, whereas the media company's system is designed to allow a single IP address, running custom client software, to connect out into 10's of thousands of primary users at once. There is the error in your thinking.As for "automated tools", well yes, of course "real automated tools" sound like a brilliant idea. You'll be sure to let everyone know when you have the system designed now, won't you? O.K., in a less-arsey way: if you have any ideas that you feel could work in this regard, please by-all-means communicate your thoughts to others who may take those ideas into consideration.Just to finish up with regards your last comment. I'm sorry that you feel unconvinced that the DLL and associated filtering tactics are not as good as people purport them to be. If you have any thoughts as to how any aspect of these methods could be improved then, again, please communicate them to others who can take those ideas into consideration.Thanks for listening.