Peer to Peer Issues

I have a small network operating behind a NAT router, OSs consist of XP 
home and Ubuntu Linux.

On my NAT router I have tended to block all ports outbound and open up 
as required.

In the UK many TV networks operate a Peer to Peer system to allow 
viewers to catch up on TV programs after the initial broadcast.

What are the main security issues with this, I understand P2P as 
effectively allowing anyone access to my PC but assume this is Read Only 
and only a specific directory.

To date I have tended to use the streaming service but quality is less 
than obtaining the entire program for later viewing.

Any comments appreciated.

Geoff Lane
0
Geoff
1/27/2008 2:07:03 PM
grc.security.software 15003 articles. 0 followers. Follow

4 Replies
421 Views

Similar Articles

[PageSpeed] 58

Geoff Lane wrote:
> I have a small network operating behind a NAT router, OSs consist of XP
> home and Ubuntu Linux.
> 
> On my NAT router I have tended to block all ports outbound and open up
> as required.
> 
> In the UK many TV networks operate a Peer to Peer system to allow
> viewers to catch up on TV programs after the initial broadcast.
> 
> What are the main security issues with this, I understand P2P as
> effectively allowing anyone access to my PC but assume this is Read Only
> and only a specific directory.
> 
> To date I have tended to use the streaming service but quality is less
> than obtaining the entire program for later viewing.
> 
> Any comments appreciated.
> 
> Geoff Lane
What ports does this TV P2P stream use? Is there some documentation we
could look at?

I have a similar network at home and set up port forwarding as needed. I
wouldn't worry about it as much. Probably it's better to do the
streaming on Linux if possible because of the additional lack of viruses
for Linux if viruses are a problem.

Paul
0
Paul
1/27/2008 3:44:29 PM
"Geoff Lane" <geoff@3lanes.freeserve.co.uk> wrote in message 
news:fni341$12a9$1@news.grc.com...
>I have a small network operating behind a NAT router, OSs consist of XP 
>home and Ubuntu Linux.
>
> On my NAT router I have tended to block all ports outbound and open up as 
> required.
>
> In the UK many TV networks operate a Peer to Peer system to allow viewers 
> to catch up on TV programs after the initial broadcast.
>
> What are the main security issues with this, I understand P2P as 
> effectively allowing anyone access to my PC but assume this is Read Only 
> and only a specific directory.
>
> To date I have tended to use the streaming service but quality is less 
> than obtaining the entire program for later viewing.

One thing to do is to run CurrPorts and see what programs are LISTENING or 
ESTABLISHED.  But destinations like 0.0.0.0 are your computer and are not a 
risk.  Many programs that connect to the Internet don't leave their 
connection open when the program is closed.  If an established connection is 
one you can verify as safe, like port 119 to news.grc.com, that's ok. 
Listening ports are usually riskier.

http://www.nirsoft.net/utils/cports.html

-- 
Robert


0
Robert
1/28/2008 2:19:59 PM
Paul Stejskal wrote:

> What ports does this TV P2P stream use? Is there some documentation we
> could look at?

Not sure at the moment, I'll check it out.
> 
> I have a similar network at home and set up port forwarding as needed. I
> wouldn't worry about it as much. Probably it's better to do the
> streaming on Linux if possible because of the additional lack of viruses
> for Linux if viruses are a problem.

Some UK stations allow downloading or streaming, others seem to allow 
streaming only.

It was more the download issue I was asking about.

Geoff Lane

0
Geoff
1/30/2008 8:59:11 PM
Robert Wycoff wrote:

> One thing to do is to run CurrPorts and see what programs are LISTENING or 
> ESTABLISHED.  But destinations like 0.0.0.0 are your computer and are not a 
> risk.  Many programs that connect to the Internet don't leave their 
> connection open when the program is closed.  If an established connection is 
> one you can verify as safe, like port 119 to news.grc.com, that's ok. 
> Listening ports are usually riskier.

Thanks for the program tip, I've downloaded it and will monitor the 
ports when I access the TV programs.

Geoff Lane
0
Geoff
1/30/2008 9:00:31 PM
Reply:

Similar Artilces:

Peer to Peer
Hi, I am studying a new Peer2Peer project and I have some concerns that speed limit cannot be done. I mean. The software can show the download (or upload) is using n% ( n<30) of your bandwidth but in fact it's using all of it. If I get the project, I will use Delphi + Indy. But first I would like to know from you if you can control your bandwidth through a software? TIA, Clément Hi, You generally cant control the peak bandwidth use (unless you have the intention to hack the network card in use). You can however control the bandwidth use over time. You do th...

peer to peer
Hi guys I don't have to reset my home peer to peer often so I have totally forgotten how to do it. I am running win98se with all the updates, thin Ethernet cable Ethernet cards in each machine. The computer tells me that the ports, irq, and mem address match between hardware and software, the workgroup names are the same. I can see the one computer name in nhood on each machine but not both names on each machine. I uninstalled ZAF and moved the IE6.0 beta INTRANET security to low. This was working yesterday I installed a new copy of Win98se on my wife's machine which hadn...

PEER-TO-PEER
Howdy Security minded people!!! Iwas wondering , How much Peer -to -peer file sharing can you NOT do with a GOOD firewall like ZONE alarm, TpF , and SYgate.????????? Does not a firewall BLOCK OFF the PORT 139 NETBIOS feature that is SO intrinsic to FILESHARING ?? ,ala GNUTELLA , GROKSTER ,IMESH ,KAZZA ????????????? sstu wrote: > Howdy Security minded people!!! Iwas wondering , How much Peer > -to -peer file sharing can you NOT do with a GOOD firewall like ZONE > alarm, TpF , and SYgate.????????? Does not a firewall BLOCK OFF the > PORT 139 NETBIOS feat...

Peer-to Peer Printer Issue
Do work for a small organizations with a 4 node peer-to-peer network that has an "issue" that is driving me nuts (or perhaps nuttier than I used to be). Computer A is an XP Pro machine that has a shared printer attached to it. They print to this printer from Computer B, a Win 2000 Pro machine. Computer A has a account user name / password combination that matches the user on Computer B I connect to that printer and can print successfully from Computer B. I log off and reboot and the printer is available and works perfectly. I tested it last night using a remote conn...

Peer 2 Peer
any new P2P software on the block?? i tried kazaa, edonkey, limewire, cutemx, morpheus, audiogalaxy, grokster and bearshare - any others which are worthed given a try?? -- Kryzhn Mail : dkriz2k at hotmail dot com MSN : dkriz2k Imici : kryzhn Message Posted Using Xnews - http://xnews.3dnews.net/release/xnews.zip Running a WinXp System which rocks!! "kryzhn" <dkriz2k@hotmail.com.DELETETHIS> wrote in message = news:Xns91E5ACB98CF34ctantionvolnetDELETE@207.71.92.194... >=20 > any new P2P software on the block?? >=20 > i tried kaza...

Peer to peer connection
Hi, I'm trying to make a program to transfer files between my pc and another that is behind a router. My side will act as master and the other just as a slave, serving what master asks without user interference. I know that the easiest way is to run a idTCPserver at the slave side and a idTCPclient at master's side, but this needs to forward the used port at the router. I want to keep out of this. So I try the reverse way. A idTCPclient at slave side and idTCPserver at my side as master (in my side I can forward ports). Starting the slave it connects to master-server. Af...

peer to peer programming
Hi, Does anyone know where I could find information about creating peer to peer applications in perl? (Like messengers that don't require a base server...) If it is possible to do it in perl, please tell me where I can find more about it if you know. Thank you. Octavian On Wed, 2008-08-13 at 20:45 +0300, Octavian Rasnita wrote: > Hi, > > Does anyone know where I could find information about creating peer to peer > applications in perl? > (Like messengers that don't require a base server...) > > If it is possible to do it in perl, plea...

Peer to peer with XP
I'm back to my never ending network server dilemma... I last left off building a new server computer running W2Kpro and Metadot portal intranet server. It has been working well but not in active use, it's sitting on my bench running everything and backing itself up every night. Problem with Metadot is a) I cannot get direct file access to the HD. b) It's way more than we need. We basically just want to have access to shared MS access, word and excel docs on the server and be able to open them on any local PC. In the Win9x days this is what worked, but since the addi...

Peer to Peer Option
--____ADXKZADLVECJQHAJDWKJ____ Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline; modification-date="Tue, 20 Feb 2006 10:29:28 +0000" Hi, Does anyone know how to setup the iFolder 3.2 peer to peer option? on the = iFolder website (www.ifolder.com) it says it is contained in the source = downloads. Can anyone help me? Thanks in advance. Steve. --____ADXKZADLVECJQHAJDWKJ____ Content-Type: multipart/related; boundary="____SBDTGINQINGHZHNMBGVL____" --____SBDTGINQINGHZHNMBGVL____ ...

Ghost peer to peer
Sometimes we ghost image 1 machine from another (peer to peer). If I do this with ZCM, what must I do to the freshly imaged machine to have registration, etc. work correctly? -- willmw ------------------------------------------------------------------------ willmw, It appears that in the past few days you have not received a response to your posting. That concerns us, and has triggered this automated reply. Has your problem been resolved? If not, you might try one of the following options: - Visit http://support.novell.com and search the knowledgebase and/or che...

Peer 2 Peer
Hi, is there any quick guide about using P2P functionality in 3.8?, i've been using unison between 2 hosts and worked well so far. Now I need to sync 4 machines with the same data and I guess iFolder would do a better job. Regards, -- ciriarte ------------------------------------------------------------------------ ciriarte, It appears that in the past few days you have not received a response to your posting. That concerns us, and has triggered this automated reply. Has your problem been resolved? If not, you might try one of the following options: - Vis...

Peer to peer applications
Am facing a problem in developing peer to peer appln. first of all a machine has two ips(one private visible in intranet like 192.168.0.121 and second public ip visible in internet 10.2.2.3).now i need to connect to a peer located at remote place with the same criteria(two ips).The problem is i cnt go through the public ip to internal ip.On reading some articles on net i came to know the technique used to connect through public ip to private ip is termed as "HOLE PUNCHING"/"PORT FORWARDING".can some one help me on this issue? r is there any alternative other than this.I have to do it progra...

Hamachi
Having briefly read about the new Hamachi VPN system I am of the understanding that to initially make the connection I have to log on to the Hamaci server to get the IP addresses. Would this not only be necessary for dynamic IP addresses. Geoff Lane Geoff Lane wrote: > Having briefly read about the new Hamachi VPN system I am of the > understanding that to initially make the connection I have to log on > to the Hamaci server to get the IP addresses. > > Would this not only be necessary for dynamic IP addresses. > > Geoff Lane > I'm not sure...

Peer-To-Peer Security Headaches And Faster-Spreading Worms Expected In 2004
The New Year will bring with it a fresh IT security threat, according to new research from TruSecure Corporation, the leading provider of intelligent risk management products and services. Peer-to-peer (P2P) file sharing applications such as music downloads and instant messaging are set to be at the heart of the problem. The research is based on months of malicious code data from the Wild List Organization, a division of ICSA Labs, and other research performed by TruSecure. White papers describing this research are now available on www.trusecure.com/cgi-bin/download.cgi? ESCD=W0151&a...

Web resources about - Peer to Peer Issues - grc.security.software

List of Sports Illustrated Swimsuit Issue cover models - Wikipedia, the free encyclopedia
List of Sports Illustrated Swimsuit Issue cover models enumerates the chronological history of cover models for the Sports Illustrated Swimsuit ...

Facebook On European Outage: DNS Issue, Not Anonymous Hack
Facebook said an outage Thursday in European countries including Denmark, France, Norway, and Italy was a DNS issue, and the social network was ...

Site Issues and Feedback
We’ve setup a new menu item, under About Balloon Juice, for all future issue reports and suggestions about the site. That way, we don’t miss ...

Be Careful With Political Scorecards And One-Issue And Identity Politics Groups
Nanette Barragán Yesterday, in a post about food safety and how corrupt campaign financing can literally poison consumers, we listed all the ...

Brussels Extends Lockdown as U.S. Issues Terror Alert
Authorities in Brussels extended the city’s highest-level terror alert into next week as they maintained their warning Islamic State terrorists ...

CNN’s King: Obama ‘Lonely and Isolated’ on Issue of Syrian Refugees
CNN's King: Obama ‘Lonely and Isolated' on Issue of Syrian Refugees

Killjoy: Hillary Issues ‘Thanksgiving Dinner Debate Guide’ For Supporters
Hillary plays the gender card in her suggestions for ruining your Thanksgiving

"Ahh...FUCK!" Audio Issues Lead Football Game TV Director To Broadcast Own Meltdown
Comcast SportsNet Chicago had some issues before today’s telecast of an Illinois state high school championship game between Auburn and Tri-Valley, ...

The Danish Girl Makes Transgender Issues Safe For The Oscar Crowd
Of all the adjectives to describe a movie, “well-intentioned” is among the least scintillating and most wearying. It’s why a lot of people have ...

DOJ Investigating Comcast For Advertising Antitrust Issues -
Back when regulators blocked Comcast's attempted acquisition of Time Warner Cable, there were rumblings that some of what was uncovered during ...

Resources last updated: 11/28/2015 4:31:42 PM