OT: dealing with fastrack (Kazaa et.al.)

From: Carlos G Mendioroz (tron@huapi.ba.ar)
Date: Wed Sep 25 2002 - 17:31:56 GMT-3


Hi,
after a long time of chasing local servers on different ports and
using CAR to make it a pain to use those pesty peer to peer programs,
I'm trying to automatize the thing.

Basically I want to find who has fasttrack (snort or the like triggering
on port 1214 activity) and make a list, then dynamically build an ACL to
CAR all traffic from/to those stations into a small pipe. End result
would be
"if you use it, your network access rate will be poor".

Question: has anybody got a way to program ACLs from a unix box (via a
script)
in a secure way ? Is there a way to use SNMP to do this ?

Advise on any solution to the fastrack net hogging problem is
appreciated.
Note: My network policy does not allow me to kill port 1214 :-(

TIA

-- 
Carlos G Mendioroz  <tron@huapi.ba.ar>  LW7 EQI  Argentina


This archive was generated by hypermail 2.1.4 : Mon Oct 07 2002 - 07:44:03 GMT-3