![]() ![]() I got some decent DoD ipblocklist screenies in there as well it appears. Then again that particular post was only for a small gaming community so professionalism wasn't really on my mind at the time. I also just noticed how much younger I was back then in my writing. Inside the guide at that time according to the screenshots I posted it appears the version of az was 4.1.0.5 to 4.2.0.2. Though inside that post it also discusses my previous 2008 threads involving everything from Shu & Seba14, all the way to your own efforts with the birth of this very website. ![]() As for dating myself on this topic, thanks to some regrettable admin work on my part, the furthest back I appear to have an entire archive of a posting is on May 22nd, 2009. Can you show us some of your work?First of all, good day & it's an honor! Thanks for the advice about the tracker division timings, if I do an update to the video I'll make sure to change that. Thus when Bittorrent clients/trackers are communicating with the VPN it does so exactly as it would if it were your routers provided IP.At the 0:53 mark, you say you have been writing about this for over a decade. Of-course, there is more to downloading torrents then just downloading them - if your system has been compromised (eg you ran untrusted software) this could be finding your route table, and even conceivably your ISP assigned IP address and sending it back outside the Bittorrent program/protocol.įrom a conceptual point of view a VPN provides an IP address to your computer, and this IP address takes precedence over your ISP provided IP address (except for to the VPN endpoint). If the IP address assigned to you by your ISP is being leaked, the traffic is not going across the VPN, which could happen for one of 3 reasons - The VPN does not have a default gateway set, the VPN is down and the system is falling back to the systems regular IP or the computer has been set up to allow some routes to bypass the VPN (which is unlikely but possible). The short answer is "Assuming the VPN is correctly set up, they can't". ![]() If 'return' traffic (an actual response, or an attempt by the other side to connect to you) is seen within a certain timeframe, then it is considered to be part of that flow, and the two ends can communicate. If you try to connect to me, what will generally happen is that the VPN host's firewall will record the flow (e.g. Whether or not your provided allows inbound traffic is another matter, but keep in mind torrenting generally uses UDP, where the notion of stateful is a little more complicated than for TCP. So where without a VPN, your ISP modem's public IP is what others will use, with a VPN, the VPN IP is what is used. The same question is generally applicable to a setup without VPN.Īssuming you have a ->-> setup, the mechanism by which you can torrent is the same as it is via VPN.īasically, whatever your local IP (probably 192.168.0.x-like), the connection itself will be done using public IP addresses - on a very basic level, this is a simple matter of other hosts recording which IP they see your client connecting from.Ī VPN just adds a hop: ->->->. The VPN is essentially a remote firewall from this perspective. Once you start connecting to them (per the list supplied by your tracker) then you are effectively poking very specific holes in your firewall for communication to happen to (and from) very specific places. Most home router firewalls (with UPNP disabled) will automatically block incoming connections as well which creates this same problem of peers not being able to connect to you. Whenever your software gets an updated list of peers and contacts new peers then you will get new data flowing outwards as well as inwards. The VPN is probably doing exactly what you expect, blocking unknown host connections, but once you contact someone through it you have effectively established a two way pipe between you and a peer. You may be blocking inbound requests from unknown hosts, but by contacting a peer and requesting data from it yourself you are initiating a two way data connection that they can use to not only send data, but to request it as well. ![]() The peers don't need to know your real IP, you are giving them a way to contact you by simply contacting them yourself.Įven if the tracker shares an unreachable IP (your VPN) and other peers fail to connect, directly at least, you make yourself reachable by contacting those peers yourself. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |