Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Streamyx Is Streamyx blocking your traffic?, Here's how to find out.

views
     
SUSspanker
post Apr 27 2008, 05:06 PM, updated 18y ago

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


So I was really fed up of the lies thrown at me by Streamyx call center (VADS), but the last straw came when TM tech support themselves lied to me about blocking my traffic, so I have no choice but to get proof. This is how I did it:

1) Download Ethereal Network Analyzer

2) Install Ethereal along with the WinPcap driver that comes with it.
2a) Alternatively you can download the latest version of WinPcap instead of using the one packaged in Ethereal

3) Run Ethereal


4) Click to configure snooping
user posted image


5) Configure the interface, which port you want to monitor, protocols, yada yada
user posted image


6) After you've started capturing, remember to stop.
user posted image



7) This is roughly what things will look like after you are done. If you are sniffing your BT traffic Look for the RST packet (as described in this thread.
user posted image


What it actually means is that the client (you being the host) has acknowledged your request to reset the connection. However, if you check your entire TCP stream you will find that you have NOT sent out a RST packet. Meaning Streamyx screwed you.


Alternatively, if you are having problem with non-BT connection (perhaps you are downloading ahems from IRC), like how I am facing very slow traffic with my paid NNTP news service, you see this:
user posted image

This proves that somehow part of your TCP sequence (usually the binary part) has been dropped by someone, so your entire sequence cannot be used by the application and has to be requested again. In short, you're still screwed by streamyx.

When I used a friend's streamyx account to log in(this dude has much lower traffic than I do), all these errors miraculously dissappeared and I am getting full speed.

I have decided to documented my findings because 2 days back after I made a complaint to Streamyx to escalate my case to level 2, someone from TM Technical Support said "international traffic is not our problem", and decided to close my case. He even challenged me to go to the SS13 TM office to prove my case, which I will do tomorrow, along with my documentations. I made another follow-up call to Streamyx today to inform them my findings, and viola, miraculously all those errors dissappeared.

Anyway, I'm going to visit TM tomorrow, and if it happens again, I'm going to complain to MCMC.

Hope it helps you people.

This post has been edited by spanker: Apr 27 2008, 05:27 PM
nwk
post Apr 27 2008, 05:10 PM

Getting Started
**
Junior Member
256 posts

Joined: Sep 2006
From: Britannia
you should also lodge a police report against tmnut for false advertising about their service and cheating you. that will teach those boleh dogs to think twice about challenging you.
runemastertan
post Apr 27 2008, 05:15 PM

Regular
******
Senior Member
1,221 posts

Joined: Sep 2007
WOW!!! Keep up posted of your progress, spanker. I think a lot of people would like to know what TMNut says about this
scyap
post Apr 27 2008, 05:21 PM

On my way
****
Senior Member
684 posts

Joined: Dec 2007


QUOTE(nwk @ Apr 27 2008, 05:10 PM)
you should also lodge a police report against tmnut for false advertising about their service and cheating you. that will teach those boleh dogs to think twice about challenging you.
*
yeah but this is malaysia... everything will be cover-ups here and there and in the end nothin happens
SUSspanker
post Apr 27 2008, 05:25 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


At this point, I'm not concerned about correcting Streamyx's misguided ways. I just want to get what I paid for.

That's why I've put up this crappy documentation to help prove how Streamyx is manipulating network packets to deny you service.
JinXXX
post Apr 27 2008, 06:12 PM

Look at all my stars!!
*******
Senior Member
2,516 posts

Joined: Feb 2007
From: Uarla Umpur



well for 1.. better email to tmnuts and also cc to MCMC regarding your finding..

and push MCMC to take action on your part, as its their job, furthermore its "false advertising" on tmnuts part..

remember to perform your "test" using "legal" files, as tmnuts/partly gov/umno own will use "illegal" files to f*** with you...


Added on April 27, 2008, 6:13 pm
QUOTE(spanker @ Apr 27 2008, 05:25 PM)
At this point, I'm not concerned about correcting Streamyx's misguided ways. I just want to get what I paid for.

That's why I've put up this crappy documentation to help prove how Streamyx is manipulating network packets to deny you service.
*
yeah it has been documented that tmnuts f with us.. there has been results on rst packets on torrentfreak and tmnuts is one of the top 10 provider..

i wonder why they rather spend money on this kind of bandwidth mgt tools rather than upgrading the network..



This post has been edited by JinXXX: Apr 27 2008, 06:13 PM
ash.ashie
post Apr 27 2008, 06:57 PM

Getting Started
**
Junior Member
144 posts

Joined: Apr 2008
From: BTHO'Ville, Southern Cheras.



good work, spanker! smile.gif
and thanks for the info. wink.gif
lionheart23
post Apr 27 2008, 07:00 PM

Getting Started
**
Junior Member
103 posts

Joined: Oct 2006


QUOTE(spanker @ Apr 27 2008, 05:06 PM)
So I was really fed up of the lies thrown at me by Streamyx call center (VADS), but the last straw came when TM tech support themselves lied to me about blocking my traffic, so I have no choice but to get proof. This is how I did it:

1) Download Ethereal Network Analyzer

2) Install Ethereal along with the WinPcap driver that comes with it.
2a) Alternatively you can download the latest version of WinPcap instead of using the one packaged in Ethereal

3) Run Ethereal
4) Click to configure snooping
user posted image
5) Configure the interface, which port you want to monitor, protocols, yada yada
user posted image
6) After you've started capturing, remember to stop.
user posted image
7) This is roughly what things will look like after you are done. If you are sniffing your BT traffic Look for the RST packet (as described in this thread.
user posted image
What it actually means is that the client (you being the host) has acknowledged your request to reset the connection. However, if you check your entire TCP stream you will find that you have NOT sent out a RST packet. Meaning Streamyx screwed you.
Alternatively, if you are having problem with non-BT connection (perhaps you are downloading ahems from IRC), like how I am facing very slow traffic with my paid NNTP news service, you see this:
user posted image

This proves that somehow part of your TCP sequence (usually the binary part) has been dropped by someone, so your entire sequence cannot be used by the application and has to be requested again. In short, you're still screwed by streamyx.

When I used a friend's streamyx account to log in(this dude has much lower traffic than I do), all these errors miraculously dissappeared and I am getting full speed.

I have decided to documented my findings because 2 days back after I made a complaint to Streamyx to escalate my case to level 2, someone from TM Technical Support said "international traffic is not our problem", and decided to close my case. He even challenged me to go to the SS13 TM office to prove my case, which I will do tomorrow, along with my documentations. I made another follow-up call to Streamyx today to inform them my findings, and viola, miraculously all those errors dissappeared.

Anyway, I'm going to visit TM tomorrow, and if it happens again, I'm going to complain to MCMC.

Hope it helps you people.
*
Hope they speechless when you showing this to them.......... rclxms.gif
Because I'm very sure those Nut didn't study deeply about the networking thing sweat.gif
The only ppl will understand is the person who control the dslam..............
But tm point ppl shocking.gif
they only a normal stuff doh.gif doh.gif
Pray they will understand what you're trying to said so whistling.gif whistling.gif
yangxi
post Apr 27 2008, 08:11 PM

Violinist ^.^ 囧 囧
*******
Senior Member
4,189 posts

Joined: Jan 2003
From: Age Quod Agis



FCC usa start punish who slow down P2P ?


Hacker-techniques

http://torrentfreak.com/comcast-uses-hacke...hniques-080225/

Today is an important day for network neutrality, as the FCCs Broadband Network management hearing has been discussing Comcasts attempt to slow down BitTorrent traffic. One of the panelists said Comcast uses hacker techniques to manage their network.



BitTorrent Throttling: Interview With Gemini Project
http://torrentfreak.com/bittorrent-throttl...project-080402/


Every week there is more controversy as ISPs continue to limit, throttle and otherwise interfere with P2P traffic. For those people who think their ISP is meddling with their traffic, there is a new system available to confirm it. TorrentFreak catches up with the creators of Gemini Project.

This post has been edited by yangxi: Apr 27 2008, 08:12 PM
MX510
post Apr 27 2008, 08:12 PM

Love Me Sin Hate Me Sinner
*******
Senior Member
4,038 posts

Joined: Aug 2005
From: Earth



Good job but i don't think u will win with them they already make it official to throttled p2p connections
yangxi
post Apr 27 2008, 08:15 PM

Violinist ^.^ 囧 囧
*******
Senior Member
4,189 posts

Joined: Jan 2003
From: Age Quod Agis



Hope can discuss TMNUT stupid behavior in Parliament .

"Anwar" hope can help us , next Menteri ?


Added on April 27, 2008, 8:22 pmTMNUT start throttle HTTP connection . Bitcomet dead since last week.

PS2P technology not working anymore. 诅咒祖宗二十代@^#%&

This post has been edited by yangxi: Apr 27 2008, 08:22 PM
cornelius_young
post Apr 27 2008, 08:51 PM

Casual
***
Junior Member
369 posts

Joined: Dec 2006
Keep us updated Spanker.
Would like to know how TMNet react.
yangxi
post Apr 27 2008, 08:54 PM

Violinist ^.^ 囧 囧
*******
Senior Member
4,189 posts

Joined: Jan 2003
From: Age Quod Agis



Send this info to MALAYSIAKINI or Jeefooi .

Email: newseditor@malaysiakini.com

http://www.malaysiakini.com/pages/general/contact.htm
http://www.jeffooi.com/

Hope them can help us, becuase now days most newspaper (nst,sun,sinchew) 捧LP ..tak adil.

This post has been edited by yangxi: Apr 27 2008, 08:55 PM
lionheart23
post Apr 27 2008, 09:06 PM

Getting Started
**
Junior Member
103 posts

Joined: Oct 2006


QUOTE(yangxi @ Apr 27 2008, 08:15 PM)
Hope can discuss TMNUT stupid behavior in Parliament .

"Anwar" hope can help us  , next Menteri ?


Added on April 27, 2008, 8:22 pmTMNUT start throttle HTTP connection .  Bitcomet dead since last week.

PS2P technology not working anymore.  诅咒祖宗二十代@^#%&
*
诅咒ppl not good one doh.gif , you should "swear" them closing their business tongue.gif
SUSspanker
post Apr 27 2008, 09:17 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


QUOTE(MX510 @ Apr 27 2008, 08:12 PM)
Good job but i don't think u will win with them they already make it official to throttled p2p connections
*
I don't care if they throttled P2P, but they are blocking my NNTP connections, a service which I pay premium dollars for.
suyee
post Apr 27 2008, 09:30 PM

Casual
***
Junior Member
378 posts

Joined: Jan 2003
From: PJ



There also do some twist on SMTP .

Where mess out all my company email last week.

Port 25 is being screw.
Airwave
post Apr 27 2008, 11:40 PM

Getting Started
**
Junior Member
95 posts

Joined: May 2007
Thanks for sharing the info with us.
phantom00
post Apr 28 2008, 04:43 AM

New Member
*
Newbie
0 posts

Joined: Aug 2006
huhuhu...maybe they upgrade their services....mine get full speed at night
wenhui100
post Apr 28 2008, 09:37 AM

Getting Started
**
Junior Member
272 posts

Joined: Feb 2005


thank for the info spanker ...

screw you tmnut ... hope p2p finds a better technology to counter ISP..
lionheart23
post Apr 28 2008, 01:05 PM

Getting Started
**
Junior Member
103 posts

Joined: Oct 2006


so topic starter, have you been to tmnut point today?
What's their feedback tongue.gif
SUSspanker
post Apr 28 2008, 06:34 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


Went to the office at SS13 today. Branch supervisor by the name of Encik Hussein said he has no knowledge of such blocking since he is only managing hardware between phone trunks to DSLAM exchange. Took my number. Told him about the attitude of his staff regarding the "not our problem" attitude, he defended his staff. I said "as a customer I don't care what you are in charge of, I just know TM and Streamyx, and your staff told me to come to the SS13 office, now I'm here. And you should not say it's not your problem because my logs said it is your problem". Showed him the logs, he said he will pass it onto other departments.

Sounds like this will be buried under a mountain of other cases. Looks like the people managing the network packets are the "untouchables" part of the TM org chart. Told him if it happens again, my next visit is to MCMC.

This post has been edited by spanker: Apr 28 2008, 06:36 PM
wKkaY
post Apr 28 2008, 06:58 PM

misutā supākoru
Group Icon
VIP
6,008 posts

Joined: Jan 2003
QUOTE(spanker @ Apr 27 2008, 05:06 PM)
What it actually means is that the client (you being the host) has acknowledged your request to reset the connection. However, if you check your entire TCP stream you will find that you have NOT sent out a RST packet. Meaning Streamyx screwed you.
*

The problem with your results is that any part in the path between you and 75.158.91.220 could have spoofed the RST, not just TMNet. You need to come up with a more solid experiment that isolates these 3rd parties from being a possible factor.
MarcoYee
post Apr 28 2008, 09:28 PM

Getting Started
**
Junior Member
163 posts

Joined: Aug 2005
...i scare those TM stuff cant understand what you say...
lionheart23
post Apr 28 2008, 11:40 PM

Getting Started
**
Junior Member
103 posts

Joined: Oct 2006


Of course tmnut won't understand what the hell he's trying to said....tongue.gif
It's too complicated for them to understand, they're just a nut............

Topic starter, you should open your case with MCMC, no point keep on complaining with nut ppl for no point, i very sure they won't understand what the hell you're trying to said.

Just write a letter to MCMC and CFM........
have a nice day:D
qedx
post Apr 29 2008, 02:16 AM

Enthusiast
*****
Senior Member
712 posts

Joined: Oct 2004


QUOTE(MarcoYee @ Apr 28 2008, 09:28 PM)
...i scare those TM stuff cant understand what you say...
*
This could be so true it's scary sad.gif
RangerRed
post Apr 29 2008, 09:07 AM

Look at all my stars!!
Group Icon
Moderator
2,083 posts

Joined: Jan 2003
From: Penang

Maybe some ISPs exercise a reset command to malaysian IPs only.
Eoma
post Apr 29 2008, 02:21 PM

- ,. -
Group Icon
Elite
4,603 posts

Joined: Jan 2003
From: PJ


QUOTE(wKkaY @ Apr 28 2008, 06:58 PM)
The problem with your results is that any part in the path between you and 75.158.91.220 could have spoofed the RST, not just TMNet. You need to come up with a more solid experiment that isolates these 3rd parties from being a possible factor.
*
Don't bother, it'll just fall unto deaf ears looking for blood. Over eagerness and hastiness to prove something are trademarks of this sub forum.
SUSspanker
post Apr 29 2008, 04:29 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


QUOTE(wKkaY @ Apr 28 2008, 06:58 PM)
The problem with your results is that any part in the path between you and 75.158.91.220 could have spoofed the RST, not just TMNet. You need to come up with a more solid experiment that isolates these 3rd parties from being a possible factor.
*
Well if someone other than Streamyx is spoofing them, I'd get RST packets from sources between Streamyx and 75.158.91.220 only (i.e. any relay servers connecting the 2 points). However, I get them on different channels, which does suggest someone much closer to home is spoofing the RST.

Nice catch though smile.gif
SUSsharkteef
post Apr 29 2008, 05:37 PM

Not Godlike
*******
Senior Member
2,504 posts

Joined: Dec 2006
From: Hollander


wait, just out of curiosity, would complaning to MCMC about bandwidth shaping eventually lead to the hard pushing for copyright infringement control ?

example, say we complain about bandwidth shaping. MCMC acknowledges and "bam" releases the throttling issue. With TMNet unable to cope with rising performances and bandwidth, they decide its time to crackdown on illegal downloads of copyrighted materials because controlling bandwidth can no longer be under their control. This might eventually lead us to be like singapore. download copyrighted materials , get heavy fine.

is it such a good idea to be doing so ? would this affect TMnet's decision to push out and support RIAA and RIM to notify the companies of users that breach that law ?


i for one am not affiliated with TM. please understand that i am also not happy bout the throttling going on hence seeking alternatives that are free. clients such as xunlei and also thinking of re-activating my old VPN a/c. but by doing so, would we be under more fire ?


wKkaY
post Apr 29 2008, 05:46 PM

misutā supākoru
Group Icon
VIP
6,008 posts

Joined: Jan 2003
QUOTE(Eoma @ Apr 29 2008, 02:21 PM)
Don't bother, it'll just fall unto deaf ears looking for blood. Over eagerness and hastiness to prove something are trademarks of this sub forum.
*

The faith is weak in you tongue.gif

QUOTE(spanker @ Apr 29 2008, 04:29 PM)
Well if someone other than Streamyx is spoofing them, I'd get RST packets from sources between Streamyx and 75.158.91.220 only (i.e. any relay servers connecting the 2 points). However, I get them on different channels, which does suggest someone much closer to home is spoofing the RST.

Nice catch though smile.gif
*

What do you mean by "channels"? TCP/IP has no notion of that.

The source IP in IP packets is very spoofable (not just in theory, in practice too) due to the design of IP. Plain TCP/IP while it adds some protection from blind spoofing cannot prevent these man-in-the-middle RST spoofs. Now, if you can believe that TMNet is able to spoof a RST packet from you to 75.158.91.220, then by transitivity you will also accept that any party in between (including 75.158.91.220's ISP) is also able to.


Added on April 29, 2008, 5:58 pm
QUOTE(sharkteef @ Apr 29 2008, 05:37 PM)
wait, just out of curiosity, would complaning to MCMC about bandwidth shaping eventually lead to the hard pushing for copyright infringement control ?
*

Don't see why. It's none of their business.
kons
post Apr 29 2008, 06:25 PM

Конс
Group Icon
Moderator
6,180 posts

Joined: Oct 2004



QUOTE(spanker @ Apr 27 2008, 05:06 PM)
When I used a friend's streamyx account to log in(this dude has much lower traffic than I do), all these errors miraculously dissappeared and I am getting full speed.

I have decided to documented my findings because 2 days back after I made a complaint to Streamyx to escalate my case to level 2, someone from TM Technical Support said "international traffic is not our problem", and decided to close my case. He even challenged me to go to the SS13 TM office to prove my case, which I will do tomorrow, along with my documentations. I made another follow-up call to Streamyx today to inform them my findings, and viola, miraculously all those errors dissappeared.

Anyway, I'm going to visit TM tomorrow, and if it happens again, I'm going to complain to MCMC.

Hope it helps you people.
*
Out of everything available in IP protocols, I wonder why TM wanted to tease your NNTP traffic?
Teasing your HTTP traffic would be more frustrating, I guess.

Furthermore, if they are doing shaping, I'm sure they would shape something more than just a mere NNTP right?

Well, the last time I got this, I just disable Tx & Rx offload on the NIC and everything was solved!
wodenus
post Apr 29 2008, 06:26 PM

Tree Octopus
********
All Stars
14,990 posts

Joined: Jan 2003
If you're going to TM you can use mine as well.. It's attached to this post... more evidence for you. And this isn't even BT, it's normal everyday use tongue.gif


Added on April 29, 2008, 6:29 pm
QUOTE(kons @ Apr 29 2008, 06:25 PM)
Out of everything available in IP protocols, I wonder why TM wanted to tease your NNTP traffic?
Teasing your HTTP traffic would be more frustrating, I guess.

Furthermore, if they are doing shaping, I'm sure they would shape something more than just a mere NNTP right?

Well, the last time I got this, I just disable Tx & Rx offload on the NIC and everything was solved!
*
Doesn't the connection slow down if you do that ?

This post has been edited by wodenus: Apr 29 2008, 06:30 PM
kons
post Apr 29 2008, 06:32 PM

Конс
Group Icon
Moderator
6,180 posts

Joined: Oct 2004



QUOTE(wodenus @ Apr 29 2008, 06:26 PM)
Doesn't the connection slow down if you do that ?
*
It's faster now after disabling it....
Theoretically it is suppose to be faster, but I guess it's the NIC driver issue that's why it could not unleash it full potential...
wodenus
post Apr 29 2008, 07:29 PM

Tree Octopus
********
All Stars
14,990 posts

Joined: Jan 2003
QUOTE(kons @ Apr 29 2008, 06:32 PM)
It's faster now after disabling it....
Theoretically it is suppose to be faster, but I guess it's the NIC driver issue that's why it could not unleash it full potential...
*
Blah.. what NIC are you using ? must go and get it smile.gif

This post has been edited by wodenus: Apr 29 2008, 07:30 PM
SUSspanker
post May 8 2008, 05:08 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


QUOTE(wKkaY @ Apr 29 2008, 05:46 PM)
The faith is weak in you tongue.gif

That guy doesn't know what he's talking about

QUOTE(wKkaY @ Apr 29 2008, 05:46 PM)
What do you mean by "channels"? TCP/IP has no notion of that.

"Channels" as in peers/seeders. If the RST packets are coming in from various sources, it'll be much closer to me than it is to the seeders/peers.

QUOTE(wKkaY @ Apr 29 2008, 05:46 PM)
The source IP in IP packets is very spoofable (not just in theory, in practice too) due to the design of IP. Plain TCP/IP while it adds some protection from blind spoofing cannot prevent these man-in-the-middle RST spoofs. Now, if you can believe that TMNet is able to spoof a RST packet from you to 75.158.91.220, then by transitivity you will also accept that any party in between (including 75.158.91.220's ISP) is also able to.
*
If it is ONLY to 75.158.91.220, then yes you have a point. Plus, it doesn't explain my NNTP traffic being dropped tongue.gif

QUOTE(kons @ Apr 29 2008, 06:25 PM)
Out of everything available in IP protocols, I wonder why TM wanted to tease your NNTP traffic?
Teasing your HTTP traffic would be more frustrating, I guess.

Furthermore, if they are doing shaping, I'm sure they would shape something more than just a mere NNTP right?
My NNTP traffic exceeds 50GB a month smile.gif

This post has been edited by spanker: May 8 2008, 05:09 PM

 

Change to:
| Lo-Fi Version
0.0202sec    0.29    5 queries    GZIP Disabled
Time is now: 8th December 2025 - 01:28 AM