|
|
Subscribe / Log in / New account

Transport-level protocols in user space

Transport-level protocols in user space

Posted Jun 27, 2016 17:34 UTC (Mon) by raven667 (subscriber, #5198)
In reply to: Transport-level protocols in user space by marcH
Parent article: Transport-level protocols in user space

> gentlemen agreements can only last for so long

I'm not sure that's really true, so much in society depends on people doing the right thing even when an authority isn't watching, civilization seems to still exist. The network is just another facet of human interaction.


to post comments

Transport-level protocols in user space

Posted Jun 30, 2016 3:51 UTC (Thu) by marcH (subscriber, #57642) [Link]

"A network" maybe sometimes yes; not the internet. In a civilization you're not exposed to threats from the entire planet.

Whatever "real-world" agency is actually policing the internet has much bigger fish to fry than congestion control. Among many others, ransomware looks higher priority to me. Good luck with that one already.

I don't think anyone expects the internet to look anything like a civilization any time soon. I hope the Linux network stack maintainers are not under such an illusion.

Transport-level protocols in user space

Posted Jul 2, 2016 13:16 UTC (Sat) by Wol (subscriber, #4433) [Link]

> > gentlemen agreements can only last for so long

> I'm not sure that's really true, so much in society depends on people doing the right thing even when an authority isn't watching, civilization seems to still exist. The network is just another facet of human interaction.

The problem here is that the people feeling the pain are not the people inflicting it. Even within a household. And as soon as the choke-point moves "out there", all the evidence says that people are indifferent (at best!) to the pain they inflict on other people - if it's some impersonal "them", it's not seen as important.

I think the fairest thing to do is choke traffic by IP address. And if it's IPv6, you choke based on the network portion (iiuc, v6 comes as a network half and device half, and it's allocated by the network half). That way, cheating by opening multiple connections won't work :-)

Cheers,
Wol


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds