![]() |
Protocol Revision It would be nice to see the next protocol of Gnutella incorporate strictly a TLS protocol that would emulate traffic normally seen on the HTTPS port so ISPs would have trouble blocking Gnutella (like mine). |
Hello, How your ISP is blocking the Gnutella traffic ? Because Gnutella could be used on different ports and as the gnutella messages are usually compressed is not easy to analyse the tcp frames. Regards Juan |
Sadly the compression yields a standard beginning of the message stream, so they can just stop the handshakes. To avoid that we'd have to start the handshakes with a random (and ignored) bitsequence and compress from the very beginning. |
Let me know when this happens, then I can use G2 |
G2 isn't Gnutella. |
Quote:
See the respective Wikipedia article for details: Gnutella2 - Wikipedia |
All times are GMT -7. The time now is 07:12 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
SEO by vBSEO 3.6.0 ©2011, Crawlability, Inc.
Copyright © 2020 Gnutella Forums.
All Rights Reserved.