21 Oct
2009
21 Oct
'09
9:47 p.m.
I was not aware that tools or techniques to do this are widespread or highly functional in a way that would get them adopted in an Internet access control application of a national scope. Tell me more? -- Sent from mobile device On Oct 21, 2009, at 9:27 PM, Adrian Chadd <adrian@creative.net.au> wrote:
On Wed, Oct 21, 2009, Alex Balashov wrote:
oh my goodness. You're behind on your reading...
I didn't mean DPI. I meant in a way that can be inferred from the headers themselves, and aside from the port number.
You don't think that statistical analysis of traffic patterns of your UDP traffic wouldn't identify it as a likely tunnel? :)
Adrian