Cisco SCA BB Protocol Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Cisco SCA BB Protocol Reference Guide Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Service Control Application for Broadband Protocol Reference Guide © 2006 - 2018 Cisco Systems, Inc. All rights reserved. CONTENTS About this Guide 1 Introduction 1 Document Revision History 1 Organization 6 Related Publications 6 Conventions 7 Obtaining Documentation and Submitting a Service Request 1-8 1-8 P2P Protocols 1-1 Introduction 1-1 Internet Protocols 2-1 Introduction 2-1 IP Protocols 3-1 Introduction 3-1 Protocol Signatures 4-1 Introduction 4-1 General Information 5-1 Introduction 5-1 HTTP Download - URL-based Signatures 5-1 Flash-based Signatures 5-1 31SMS 5-2 Skype Signatures and Support Matrix 5-2 Viber Unidirectional Flow Classification 5-4 Messaging Counting Support for Viber 5-4 Tunable Support for Few Android Appstore 5-5 Getflix Application Support for Mobile Devices 5-5 Alicall Signatures and Support Matrix 5-5 Blocking Alicall 5-5 Gmail Video and VoIP Signatures Support 5-6 Gmail Video Signature Details 5-6 Cisco Service Control Application for Broadband Protocol Reference Guide iii Contents Blocking Gmail Video 5-6 Effective Blocking of Yahoo Messenger VoIP Services 5-7 MSN VoIP Traffic Blocking 5-7 Thunder Service: Blocking Thunder Download 5-8 Thunder Service: Blocking WebThunder Download 5-11 Generic P2PSuspected (Not supported in release PP #27 and later) 5-13 HeadCall 5-13 P2P Throttling 5-13 Popcorn-Time 5-14 Behavioral Upload Download Signature Updates 5-14 Service Tree and HTTP Browsing 5-14 Teredo 5-15 BBC iPlayer 5-15 STUN 5-16 YouTube Blocking 5-16 Flash youtube 5-16 FourSquare 5-16 Skype 5-16 SpiderOak Hive 5-16 Tor obfuscation (obfsproxy) 5-17 Dailymotion 5-17 Ubisoft Uplay 5-17 Google Services 5-17 DroidVPN 5-18 Methods of Blocking Applicable only to Protocol Pack #36 5-18 Methods of Blocking Applicable only to Protocol Pack #37 5-18 Methods of Blocking (Protocol Pack #38) 5-19 Setting the Content Filtering Category Preference (Protocol Pack #39) 5-19 Methods of Blocking (Protocol Pack #42) 5-19 Cisco Service Control Application for Broadband Protocol Reference Guide iv About this Guide Introduction This reference guide is intended to provide information about protocol support in Cisco Service Control Application for Broadband (SCA BB) to the various users and potential users of Cisco SCA BB. Document Revision History The Document Revision History below records changes to this document. Table 1 Document Revision History Related Protocol Pack Notes, Cisco Service Control Release Revision and Date Change Summary — Protocol Pack #60, Cisco SCA Protocol Pack #60 protocol BB 5.2.0 information added August 02, 2018 — Protocol Pack #59, Cisco SCA Protocol Pack #59 protocol BB 5.2.0 information added March 30, 2018 — Protocol Pack #58, Cisco SCA Protocol Pack #58 protocol BB 5.2.0 information added November 30, 2017 — Protocol Pack #57, Cisco SCA Protocol Pack #57 protocol BB 5.2.0 information added July 31, 2017 — Protocol Pack #56, Cisco SCA Protocol Pack #56 protocol BB 5.2.0 information added Mar 31, 2017 Cisco Service Control Application for Broadband Reference Guide v Table 1 Document Revision History Related Protocol Pack Notes, Cisco Service Control Release Revision and Date Change Summary — Protocol Pack #60, Cisco SCA Protocol Pack #60 protocol BB 5.2.0 information added August 02, 2018 — Protocol Pack #59, Cisco SCA Protocol Pack #59 protocol BB 5.2.0 information added March 30, 2018 — Protocol Pack #58, Cisco SCA Protocol Pack #58 protocol BB 5.2.0 information added November 30, 2017 — Protocol Pack #55, Cisco SCA Protocol Pack #55 protocol BB 5.2.0 information added Nov 28, 2016 — Protocol Pack #54, Cisco SCA Protocol Pack #54 protocol BB 4.2.0, 5.2.0 information added July 25, 2016 — Protocol Pack #53, Cisco SCA Protocol Pack #53 protocol BB 4.2.0, 5.2.0 information added May 27, 2016 — Protocol Pack #52, Cisco SCA Protocol Pack #52 protocol BB 4.2.0, 5.2.0 information added March 25, 2016 — Protocol Pack #51, Cisco SCA Protocol Pack #51 protocol BB 4.2.0, 5.1.0, 5.2.0 information added February 3, 2016 — Protocol Pack #50, Cisco SCA Protocol Pack #50 protocol BB 4.2.0, 5.1.0, 5.2.0 information added November 30, 2015 — Protocol Pack #49, Cisco SCA Protocol Pack #49 protocol BB 4.2.0, 5.1.0, 5.2.0 information added September 30, 2015 — Protocol Pack #48, Cisco SCA Protocol Pack #48 protocol BB 4.0.0, 4.2.0, 5.1.0 information added July 29, 2015 — Protocol Pack #47, Cisco SCA Protocol Pack #47 protocol BB 4.0.0, 4.2.0, 5.1.0 information added May 28, 2015 Cisco Service Control Application for Broadband Reference Guide vi Table 1 Document Revision History Related Protocol Pack Notes, Cisco Service Control Release Revision and Date Change Summary — Protocol Pack #60, Cisco SCA Protocol Pack #60 protocol BB 5.2.0 information added August 02, 2018 — Protocol Pack #59, Cisco SCA Protocol Pack #59 protocol BB 5.2.0 information added March 30, 2018 — Protocol Pack #58, Cisco SCA Protocol Pack #58 protocol BB 5.2.0 information added November 30, 2017 — Protocol Pack #46, Cisco SCA Protocol Pack #46 protocol BB 4.0.0, 4.2.0, 5.0.0, 5.1.0 information added March 30, 2015 — Protocol Pack #45, Cisco SCA Protocol Pack #45 protocol BB 4.0.0, 4.1.0, 4.2.0, 5.0.0 information added January 31, 2015 —Protoco Pack #44, Cisco SCA Protocol Pack #44 protocol BB 4.0.0, 4.1.0, 4.2.0, 5.0.0 information added December 08, 2014 OL-9764-48 Protocol Pack #43, Cisco SCA Protocol Pack #43 protocol BB 4.0.0, 4.1.0, 4.2.0, 5.0.0 information added September 30, 2014 OL-9764-47 Protocol Pack #42, Cisco SCA Protocol Pack #42 protocol BB 4.0.0, 4.1.0 information added May 31, 2014 OL-9764-46 Protocol Pack #41, Cisco SCA Protocol Pack #41 protocol BB 4.0.0, 4.1.0 information added May 31, 2014 OL-9764-45 Protocol Pack #40, Cisco SCA Protocol Pack #40 protocol BB 4.0.0, 4.1.0 information added March 31, 2014 OL-9764-44 Protocol Pack #39, Cisco SCA Protocol Pack #39 protocol BB 3.7.2, 3.8.5, 4.0.0, 4.1.0 information added January 31, 2014 OL-9764-43 Protocol Pack #38, Cisco SCA Protocol Pack #38 protocol BB 3.7.2, 3.8.5, 4.0.0 information added November 29, 2013 Cisco Service Control Application for Broadband Reference Guide vii Table 1 Document Revision History Related Protocol Pack Notes, Cisco Service Control Release Revision and Date Change Summary — Protocol Pack #60, Cisco SCA Protocol Pack #60 protocol BB 5.2.0 information added August 02, 2018 — Protocol Pack #59, Cisco SCA Protocol Pack #59 protocol BB 5.2.0 information added March 30, 2018 — Protocol Pack #58, Cisco SCA Protocol Pack #58 protocol BB 5.2.0 information added November 30, 2017 OL-9764-42 Protocol Pack #37, Cisco SCA Protocol Pack #37 protocol BB 4.0.0 information updated for Cisco SCA BB 4.0.0 September 30, 2013 OL-9764-40 Protocol Pack #36, Cisco SCA Protocol Pack #36 protocol BB 3.8.5 information added August 07, 2013 OL-9764-38 Protocol Pack #35, Cisco SCA Protocol Pack #35 protocol BB 3.8.5 information added June 14, 2013 OL-9764-37 Protocol
Recommended publications
  • Najlepsze Programy Do Pobierania Torrentów
    TOP 10: Najlepsze programy do pobierania torrentów Wpisany przez Wojtek Onyśków Wtorek, 10 Listopad 2015 09:00 Wybieramy dziesięć najlepszych programów do pobierania plików torrent. {reklama-artykul} Torrenty to nie najnowszy, aczkolwiek jeden z najbardziej popularnych sposobów pobierania plików z internetu. Zasada działania tej sieci jest bardzo prosta - każdy z użytkowników pobierając jakiś plik, udostępnia go także innym osobom, a prędkość pobierania jest uzależniona głównie od ilości aktywnych internautów. Do pobierania torrentów służą specjalne programy, różniące się między sobą ilością opcji konfiguracyjnych oraz poziomem skomplikowania. Poniżej przedstawiamy dziesięć najlepszych według nas klientów sieci torrent, które sprostają oczekiwaniom nawet najbardziej wymagających użytkowników. Kolejność rankingu jest całkowicie losowa. Vuze Licencja: Bezpłatna (freeware) / Rozmiar: 10.3 MB / System: Windows XP/Vista/7/8/10 Vuze obsługuje wszystkie popularne typy plików torrent, choć jego działanie nie kończy się na pobieraniu i udostępnianiu danych. Twórcy skupili się na szerszych możliwościach związanych z multimediami. Program posiada wbudowaną wyszukiwarkę, za pomocą której znajdziemy najnowsze filmy czy też muzykę na najpopularniejszych stronach z torrentami. To jednak nie wszystko. Vuze posiada również rozbudowane opcje społecznościowe, dzięki którym udostępnimy pliki naszym znajomym, a nawet przydzielimy im odpowiednią ilość pasma internetowego. Aplikacja posiada wbudowany odtwarzacz plików multimedialnych, by bez wychodzenia z programu podejrzeć to, co właśnie ściągnęliśmy. Vuze należy zatem traktować jako kombajn multimedialny oferujący możliwość pobierania plików torrent. Vuze - Pobierz za darmo! Program Vuze 1 / 7 TOP 10: Najlepsze programy do pobierania torrentów Wpisany przez Wojtek Onyśków Wtorek, 10 Listopad 2015 09:00 uTorrent Licencja: Bezpłatna (freeware) / Rozmiar: 1.73 MB / System: Windows XP/Vista/7/8/10 uTorrent to jeden z najpopularniejszych programów do pobierania plików torrent.
    [Show full text]
  • Copyrighted Material
    33_754935 bindex.qxp 11/7/05 10:09 PM Page 345 Index Applications Menu, 42–43, 68–71 • Symbols • Applixware Office package, 15 appointments, tracking, 210 * (asterisk), 249, 251 archives, packing and unpacking (tar), 20, \ (backslash), 248 337–338 - (dash), 94 arguments, command line, 247 . (dot), 92 asterisk (*), 249, 251 ! (exclamation point), 252–253 Asymmetric DSL (ADSL), 108–109 / (forward slash), 79, 81 attachments, e-mail, 154 > (greater-than sign), 249 audio CDs, playing, 221–223 - (hyphen), 95 authentication, 292 < (less-than sign), 249 automatic command completion, 250 . (period), 96 automatic login, 40, 318–319, 325 | (pipe), 248 ? (question mark), 251 " (quotation marks), 247 ; (semicolon), 248 • B • [] (square brackets), 252 backdoor, 292 .. (two dots or dot-dot), 92 background, desktop, 73–74, 75–76 backing up files, 20 backslash (\), 248 • A • base station, 129 bash (Bourne Again Shell) access point, wireless LAN, 129, 131 automatic command completion, 250 Adobe Portable Document Format. See PDF combining commands, 248 ADSL (Asymmetric DSL), 108–109 described, 47–48, 246 AES (Advanced Encryption Standard), 129 error messages, saving to file, 249–250 aggregator, RSS, 185 file, command input from, 249 AIM (America Online instant messaging output, saving to file, 249 service), 54, 161–162 repeating previously typed commands, Akregator news reader, 54, 185–186 252–253 amaroK music player, 224 syntax, 247–248 Apache Web server, 16 wildcards, 251–252 applets, 68, 75 bastion host, 293 application gateway, 292 bit bucket, 250 applications Blam RSS reader, 54 controlling, 18–19 block device, 94 development, 17 Bluetooth wireless, 20, 271 e-mail, 152–153 bookmark field, 200 GNOME Desktop, illustrated,COPYRIGHTED 64 boot menu MATERIAL items, installing, 27–28 GNU, 343 boot process, starting and stopping services, installing at setup, 32 263–264 KDE Desktop, illustrated, 64 booting, 26–27, 39–40 Linux packages, 11 Bourne Again Shell.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Compsci 514: Computer Networks Lecture 13: Distributed Hash Table
    CompSci 514: Computer Networks Lecture 13: Distributed Hash Table Xiaowei Yang Overview • What problems do DHTs solve? • How are DHTs implemented? Background • A hash table is a data structure that stores (key, object) pairs. • Key is mapped to a table index via a hash function for fast lookup. • Content distribution networks – Given an URL, returns the object Example of a Hash table: a web cache http://www.cnn.com0 Page content http://www.nytimes.com ……. 1 http://www.slashdot.org ….. … 2 … … … • Client requests http://www.cnn.com • Web cache returns the page content located at the 1st entry of the table. DHT: why? • If the number of objects is large, it is impossible for any single node to store it. • Solution: distributed hash tables. – Split one large hash table into smaller tables and distribute them to multiple nodes DHT K V K V K V K V A content distribution network • A single provider that manages multiple replicas. • A client obtains content from a close replica. Basic function of DHT • DHT is a virtual hash table – Input: a key – Output: a data item • Data Items are stored by a network of nodes. • DHT abstraction – Input: a key – Output: the node that stores the key • Applications handle key and data item association. DHT: a visual example K V K V (K1, V1) K V K V K V Insert (K1, V1) DHT: a visual example K V K V (K1, V1) K V K V K V Retrieve K1 Desired properties of DHT • Scalability: each node does not keep much state • Performance: look up latency is small • Load balancing: no node is overloaded with a large amount of state • Dynamic reconfiguration: when nodes join and leave, the amount of state moved from nodes to nodes is small.
    [Show full text]
  • Is Our Privacy Being Compromised As We Speak? Eavesdropper's Heaven
    IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.10, October 2017 119 Is our privacy being compromised as we speak? Eavesdropper’s heaven or a nightmare? A study of Mobile Voice over Internet Protocol (mVoIP) and Instant Messaging (IM) Applications. Farhan Ahmed Muhammad Ahsan Muhammad Saeed Nasir Touheed Siddiqui Najam Department of Computer Department of Computer Department of Computer Department of Computer Science, University of Science, IBA Karachi Science, University of Science, University of Karachi Pakistan Karachi Karachi Karachi, Pakistan Karachi, Pakistan Karachi, Pakistan Abstract around these applications, these two key areas are not at all In the recent times, mobile voice over internet protocol (mVoIP) explored and there are only a handful of studies if at all applications have been greatly adopted by the masses and have which examine aspect of these so called “perfect really captured much of the attention in the application market applications”. Majority of the people who use these place. These applications not only provide voice communication applications aren’t even aware of the fact that anyone can with little to no cost but also offer instant messaging service. basically intercept their communication and if the People across the world use applications like this and some even communicate daily with others just by using these applications communication is not encrypted, can easily read and misuse rather than the conventional way of text messages and GSM calls. their information. Other than this, is the communication With applications consolidating millions and millions of users, encrypted at the servers or is the privacy of the user in the security and privacy is a topic which many prefer not to discuss.
    [Show full text]
  • Peer-To-Peer Systems
    Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Unstructured P2P Overlay Networks – Unstructured Heterogeneous Overlays This slide set is based on the lecture "Communication Networks 2" of Prof. Dr.-Ing. Ralf Steinmetz at TU Darmstadt Unstructured Heterogeneous P2P Overlays Unstructured P2P Structured P2P Centralized P2P Homogeneous P2P Heterogeneous P2P DHT-Based Heterogeneous P2P 1. All features of 1. All features of 1. All features of 1. All features of 1. All features of Peer-to-Peer Peer-to-Peer Peer-to-Peer Peer-to-Peer Peer-to-Peer included included included included included 2. Central entity is 2. Any terminal 2. Any terminal 2. Any terminal 2. Peers are necessary to entity can be entity can be entity can be organized in a provide the removed without removed without removed hierarchical service loss of loss of without loss of manner 3. Central entity is functionality functionality functionality 3. Any terminal some kind of 3. ! no central 3. ! dynamic central 3. ! No central entity can be index/group entities entities entities removed without database 4. Connections in loss of functionality the overlay are Examples: “fixed” Examples: Examples: § Gnutella 0.6 Examples: Examples: § Napster § Gnutella 0.4 § Fasttrack § Chord • AH-Chord § Freenet § eDonkey § CAN • Globase.KOM § Kademlia from R.Schollmeier and J.Eberspächer, TU München HHU – Technology of Social Networks – JProf. Dr. Kalman Graffi – Peer-to-Peer Systems – http://tsn.hhu.de/teaching/lectures/2014ws/p2p.html
    [Show full text]
  • Comodo System Cleaner Version 3.0
    Comodo System Cleaner Version 3.0 User Guide Version 3.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo System Cleaner - User Guide Table of Contents 1.Comodo System-Cleaner - Introduction ............................................................................................................ 3 1.1.System Requirements...........................................................................................................................................5 1.2.Installing Comodo System-Cleaner........................................................................................................................5 1.3.Starting Comodo System-Cleaner..........................................................................................................................9 1.4.The Main Interface...............................................................................................................................................9 1.5.The Summary Area.............................................................................................................................................11 1.6.Understanding Profiles.......................................................................................................................................12 2.Registry Cleaner............................................................................................................................................. 15 2.1.Clean.................................................................................................................................................................16
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • UNITED STATES BANKRUPTCY COURT DISTRICT of NEW JERSEY Caption in Compliance with D.N.J
    Case 19-30256-VFP Doc 169 Filed 12/31/19 Entered 12/31/19 09:20:50 Desc Main Document Page 1 of 16 UNITED STATES BANKRUPTCY COURT DISTRICT OF NEW JERSEY Caption in Compliance with D.N.J. LBR 9004-19(b) OMNI AGENT SOLUTIONS, LLC 5955 De Soto Ave, Ste 100 Woodland Hills, CA 91367 (818) 906-8300 (818) 783-2737 Facsimile Scott M. Ewing ([email protected]) Case No.: 19-30256-VFP In Re: Chapter: 11 CTE 1 LLC, Judge: Vincent F. Papalia Debtor(s) CERTIFICATION OF SERVICE 1. I, Scott M. Ewing : X represent the Claims and Noticing Agent, in the above-captioned matters am the secretary/paralegal for __________________, who represents in this matter. am the in the above case and am representing myself. I caused the following pleadings and/or documents to be 2. On December 24, 2019 served on the parties listed in the chart below: Notice of Bid Deadline, Auction Date, and Sale Hearing for the Approval of the Sale of Certain Assets of the Debtor Free and Clear of Liens, Claims, and Interests1 Order Approving Sales Procedure Notice and Bidding Procedures [Docket No. 156] 3. I hereby certify under penalty of perjury that the above documents were sent using the mode of service indicated. Dated: December 26, 2019 /s/ Scott M. Ewing Signature: Scott M. Ewing 1 A copy of the Notice is attached as Exhibit D. 3952037 Case 19-30256-VFP Doc 169 Filed 12/31/19 Entered 12/31/19 09:20:50 Desc Main Document Page 2 of 16 Name And Address of Party Served Relationship Of Mode Of Service Party To The Case SEE EXHIBIT A SEE EXHIBIT A Hand-Delivered Regular mail Certified mail/RRR X Other Electronic mail (As authorized by the Court or by rule.
    [Show full text]