Peer to Peer Characteristics of Peer-to-Peer (p2p)
What is peer to peer? Peers participate as equals in a network Useful? Disruptive? Unlike client-server model where there are Manageable, governable? different responsibilites: webserver compared to client-browser Architecture Original Internet, Usenet Current Internet is more client-server Napster, Gnutella, Usenet originally between Duke and UNC ('79) Limeware, Kazaa, BitTorrent, Rapidshare, Usenet, Skype P2P systems share resources, storage, files, Which are p2p? bandwidth, …
Compsci 82, Fall 2010 7.1 Compsci 82, Fall 2010 7.2
P2P: Technology, Ethics, Policy, Legal P2P: Technology, Ethics, Policy, Legal
Innocent Infringer, 17.504.c 2010 Capitol v (Jammie) Thomas Maverick Recording v Whitney Harper Jury trial, from $2Million to $25K … RIAA v Limewire, 2010 MGM v Grokster, 2005 (scotus) Shut down Limewire Non-infringing uses? Contributory MPA v Newzbin in UK, 2010 A&M Records v Napster (2001) Shuts down Usenet 'integrator': financial so… Ninth Circuit: Contributory and Vicarious Higher Education Opportunity Act 2008/10 Sony v Universal Studios (Betamax, 1984) Notice to Duke Students Substantial non-infringing uses, time-shifting Capitol v (Jammie) Thomas Jury trial, from $2Million to $25K …
Compsci 82, Fall 2010 7.3 Compsci 82, Fall 2010 7.4 Copyright infringement Napster and Shawn Fanning
Direct infringement Shawn Fanning You uploaded, downloaded, copied, sang, … Napster, 1998-99 Contributory (kind of indirect) infringement Centralized server, distributed "peers" Knowledge and participation (supply device) Under 20, mp3, … Vicarious (kind of indirect) infringement Still doing startups Ability to control, financial benefit
Napster started music Proof, precedent, evidence peer-to-peer What have courts say, what can you show
Compsci 82, Fall 2010 7.5 Compsci 82, Fall 2010 7.6
Gnutella and Justin Frankel Napster is Centralized p2p Winamp, 1998-99 Legal ramifications? Just 20, mp3+ others AOL, $50+ million Gnutella, 2000 AOL buying Gnutella
The goal of Cockos is to develop software sustainably while preventing profit rationale from forcing engineering compromises. By doing so, we can keep our product visions intact, giving maximum benefit to our users. (today) .
Compsci 82, Fall 2010 7.7 Compsci 82, Fall 2010 7.8 Gnutella/Limewire decentralized p2p
Distributed Started by Bram Cohen, Bootstrap issues http://bitconjurer.org Distributed p2p, torrent, tracker You must cooperate to download 20-30% of all Internet traffic Files are split up and downloaded in pieces Advantages? Disadvantages? Seeder, swarm, clients “optimistic unchoking” not tit-for-tat?
Compsci 82, Fall 2010 7.9 Compsci 82, Fall 2010 7.10
Brian Fox BitTorrent advantages?
GNU Bash Shell (developer) Buddycast (co-developer) “each person has a sweet spot — a place where they are incredibly productive and at their happiest while doing so — okorians spend their lives living there — the okori sweet spot is the realization of the concept, the delivery of the impossible, from the germ of the idea to the instantiation of it” http://www.theokorigroup.com/sweet_spot
Compsci 82, Fall 2010 7.11 Compsci 82, Fall 2010 7.12 Bittorrent meets DMCA and RIAA Campus and Other P2P issues
Indirect Swarm detection Skype, what, where, when (Sky+p2p=?) In swarm? Liable Does Skype have a commercial model? NAT, other IP address Origins of technology? “in-the-wild” experiment Current issues with US Government? eBay purchases for $2.6 billion in 2005 then … Bootstrapping after login, but true p2p False positives Proprietary code, some open standards Direct harder • AES, RSA, for encryption Man-in-the-middle Compliance with HEOA: campus monitors No Encryption Why? What? How? Issues for students Compsci 82, Fall 2010 7.13 Compsci 82, Fall 2010 7.14
Kazaa and Skype, Disruptive? Kazaa and Skype, Disruptive? Skype has been an incredible adventure and I “Skype literally touches millions am proud to have been part of it. Looking of lives and this is something to back at 2003, at two guys running around with be proud of…I would like to a crazy idea of building a global phone think that we have contributed to company purely on the Internet, …, still making the world a little bit battling a major lawsuit from our Kazaa days, flatter.” www.crunchbase.com 2003 seems a long time ago. It is amazing to When Niklas is not creating innovative, think that it is only four years! disruptive businesses, he is a passionate sailor Janus Friss blog and enjoys offshore racing with his wife as well as skiing. (Niklas Zennstrom)
Compsci 82, Fall 2010 7.15 Compsci 82, Fall 2010 7.16 Costs of dealing with campus p2p Audible Magic: Copysense Appliance
The Campus Computing Project, Paul EFF ‘analysis’ of solutions Green, 10/08 http://tinyurl.com/6l36p6 http://tinyurl.com/5mqxyd What does this do? Database of copyrighted works with digital fingerprints Private universities spend (average, ’07-’08) Compare packet data with database $105K software, $158K hardware, $144K other If there’s a match do “something” to squelch use direct costs (e.g., personnel) $60-75K/year Software for monitoring, shaping p2p Ethics? Hardware, e.g., Copysense appliance Tussles? Keeping up with RIAA: IT and student support
Compsci 82, Fall 2010 7.17 Compsci 82, Fall 2010 7.18
Packet shaping Deep Packet Inspection
From $1,500 to $58,000 (Packeteer, there are others) Comcast (2007) DPI to shape/deter p2p Look at where packets go, specific port traffic • http: 80, limewire: 6346, Edonkey: 4662, … Look at packets and then deploy subterfuge Look at what type of information packet carries Forge RST (reset) packet, similar technique to • Typically don’t need to do “deep” inspection what’s done with Great Firewall of China Throughput, latency, throttling Machine A “forges” a reset packet from Change network behavior machine B and sends to C. C then cuts off communication to B Really? Is it that simple? Violates end-to-end principle, havoc wreaking
Compsci 82, Fall 2010 7.19 Compsci 82, Fall 2010 7.20