Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hacking port 33445 #1422

Closed
neilnelson opened this issue Sep 9, 2015 · 13 comments
Closed

Hacking port 33445 #1422

neilnelson opened this issue Sep 9, 2015 · 13 comments

Comments

@neilnelson
Copy link

For example, upon turning my computer on this morning and before starting uTox I was getting a steady stream of udp packets, several a second, to Tox port 33445 from two IPs I do not have contacts on. Since Tox is P2P perhaps there is a valid reason for the traffic but at the moment I am blocking this traffic. Let me know otherwise.

@DanTheBritish
Copy link

This is known as the DHT. These are the nodes which connect you to the network so you can receive friend requests from people

@neilnelson
Copy link
Author

I will let the traffic through. Another curious aspect is that it looks like Tox traffic is running consistently around 30k bytes/second, with a wide range, and sometimes peaks around 100k bytes/second which seems a little high.

@LittleVulpix
Copy link
Contributor

@neilnelson This is also normal (sort of) because since there is no centralization, the nodes must actively partake in (re)distributing the traffic. To decrease the data usage, you can enable tcp-only mode - but this slows down file transfers as you then rely on other nodes in the tox network to relay all of your traffic even though you could for example make a direct connection with the person you're trying to talk with.

@neilnelson
Copy link
Author

Perhaps there is a page giving detail on what the Tox traffic is. You mentioned that nodes could relay traffic which on initial thought seems unnecessary since it would be easier, immediate, and a common design to just communicate between the two IPs in the communication. I was thinking that the Tox traffic, other than my own initiated Tox traffic, was merely address related information in the manner of a look-up to assist others in connecting, this might be called meta-data. The transfer of encrypted content, the messages and data from one person to another, through my computer and network, relaying, would be a problem in that even though the content is encrypted beyond my ability to decrypt, I could be held responsible in the manner of an accessory to that traffic. I am providing a means of the traffic. Relaying would seem to make sense for anonymization, which brings up the just noted problem, or for broadcasting to many IPs beyond a person's immediate bandwidth. I think we would need consent of the computer owner to use their computer for broadcasting.

@GrayHatter
Copy link
Collaborator

@neilnelson the only traffic you'll ever relay for other users is DHT traffic. That is traffic only used to help locate contacts.

@LittleVulpix
Copy link
Contributor

I believe that if you use tcp-only mode, you are having other nodes not only relay DHT traffic but also your encrypted traffic, for example if you send a file to someone whilst in a tcp-only mode, your traffic will appear to the target to be coming from one of the nodes along the way (I am actually not sure myself how these are chosen, perhaps it's only the bootstrap nodes or nodes that are running in a daemon mode, i.e. not "regular" tox network users?)

@vikstrous
Copy link

I thought the onion routing is used only for friend discovery, is it not?

@GrayHatter
Copy link
Collaborator

stale

@ghost
Copy link

ghost commented Dec 23, 2017

Is it possible to limit such traffic?
Specify some rate or similar things.
I think it is too much packets per second for chat.

P.S. I am using qTox

@ghost
Copy link

ghost commented Dec 23, 2017

Approximately it sends/receives 600 packets per minute per one instance.
Maybe it is possible to install own server and communicate with the world through that server and each node will have the same DHT traffic obtained from such server?

@ghost
Copy link

ghost commented Dec 23, 2017

@GrayHatter

Maybe it is time to reopen issue and rename to something related to traffic limits?
I think for now my meta traffic is much greater than my payload.
And such big traffic will be a problem for mobile devices.

@GrayHatter
Copy link
Collaborator

I'm not likely to reopen this issue.

But if you'd like to open an issue for the sheer number of packets toxcore sends. That should be fine.... but I'm pretty sure one already exists for that.

@ghost
Copy link

ghost commented Dec 24, 2017

OK

I found it... It can be this one: #1581

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants