Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Streamyx Is Streamyx blocking your traffic?, Here's how to find out.

views
     
SUSspanker
post Apr 27 2008, 05:06 PM, updated 18y ago

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


So I was really fed up of the lies thrown at me by Streamyx call center (VADS), but the last straw came when TM tech support themselves lied to me about blocking my traffic, so I have no choice but to get proof. This is how I did it:

1) Download Ethereal Network Analyzer

2) Install Ethereal along with the WinPcap driver that comes with it.
2a) Alternatively you can download the latest version of WinPcap instead of using the one packaged in Ethereal

3) Run Ethereal


4) Click to configure snooping
user posted image


5) Configure the interface, which port you want to monitor, protocols, yada yada
user posted image


6) After you've started capturing, remember to stop.
user posted image



7) This is roughly what things will look like after you are done. If you are sniffing your BT traffic Look for the RST packet (as described in this thread.
user posted image


What it actually means is that the client (you being the host) has acknowledged your request to reset the connection. However, if you check your entire TCP stream you will find that you have NOT sent out a RST packet. Meaning Streamyx screwed you.


Alternatively, if you are having problem with non-BT connection (perhaps you are downloading ahems from IRC), like how I am facing very slow traffic with my paid NNTP news service, you see this:
user posted image

This proves that somehow part of your TCP sequence (usually the binary part) has been dropped by someone, so your entire sequence cannot be used by the application and has to be requested again. In short, you're still screwed by streamyx.

When I used a friend's streamyx account to log in(this dude has much lower traffic than I do), all these errors miraculously dissappeared and I am getting full speed.

I have decided to documented my findings because 2 days back after I made a complaint to Streamyx to escalate my case to level 2, someone from TM Technical Support said "international traffic is not our problem", and decided to close my case. He even challenged me to go to the SS13 TM office to prove my case, which I will do tomorrow, along with my documentations. I made another follow-up call to Streamyx today to inform them my findings, and viola, miraculously all those errors dissappeared.

Anyway, I'm going to visit TM tomorrow, and if it happens again, I'm going to complain to MCMC.

Hope it helps you people.

This post has been edited by spanker: Apr 27 2008, 05:27 PM
SUSspanker
post Apr 27 2008, 05:25 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


At this point, I'm not concerned about correcting Streamyx's misguided ways. I just want to get what I paid for.

That's why I've put up this crappy documentation to help prove how Streamyx is manipulating network packets to deny you service.
SUSspanker
post Apr 27 2008, 09:17 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


QUOTE(MX510 @ Apr 27 2008, 08:12 PM)
Good job but i don't think u will win with them they already make it official to throttled p2p connections
*
I don't care if they throttled P2P, but they are blocking my NNTP connections, a service which I pay premium dollars for.
SUSspanker
post Apr 28 2008, 06:34 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


Went to the office at SS13 today. Branch supervisor by the name of Encik Hussein said he has no knowledge of such blocking since he is only managing hardware between phone trunks to DSLAM exchange. Took my number. Told him about the attitude of his staff regarding the "not our problem" attitude, he defended his staff. I said "as a customer I don't care what you are in charge of, I just know TM and Streamyx, and your staff told me to come to the SS13 office, now I'm here. And you should not say it's not your problem because my logs said it is your problem". Showed him the logs, he said he will pass it onto other departments.

Sounds like this will be buried under a mountain of other cases. Looks like the people managing the network packets are the "untouchables" part of the TM org chart. Told him if it happens again, my next visit is to MCMC.

This post has been edited by spanker: Apr 28 2008, 06:36 PM
SUSspanker
post Apr 29 2008, 04:29 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


QUOTE(wKkaY @ Apr 28 2008, 06:58 PM)
The problem with your results is that any part in the path between you and 75.158.91.220 could have spoofed the RST, not just TMNet. You need to come up with a more solid experiment that isolates these 3rd parties from being a possible factor.
*
Well if someone other than Streamyx is spoofing them, I'd get RST packets from sources between Streamyx and 75.158.91.220 only (i.e. any relay servers connecting the 2 points). However, I get them on different channels, which does suggest someone much closer to home is spoofing the RST.

Nice catch though smile.gif
SUSspanker
post May 8 2008, 05:08 PM

Custom Made e-Penis
*******
Senior Member
7,606 posts

Joined: Dec 2004
From: Subang


QUOTE(wKkaY @ Apr 29 2008, 05:46 PM)
The faith is weak in you tongue.gif

That guy doesn't know what he's talking about

QUOTE(wKkaY @ Apr 29 2008, 05:46 PM)
What do you mean by "channels"? TCP/IP has no notion of that.

"Channels" as in peers/seeders. If the RST packets are coming in from various sources, it'll be much closer to me than it is to the seeders/peers.

QUOTE(wKkaY @ Apr 29 2008, 05:46 PM)
The source IP in IP packets is very spoofable (not just in theory, in practice too) due to the design of IP. Plain TCP/IP while it adds some protection from blind spoofing cannot prevent these man-in-the-middle RST spoofs. Now, if you can believe that TMNet is able to spoof a RST packet from you to 75.158.91.220, then by transitivity you will also accept that any party in between (including 75.158.91.220's ISP) is also able to.
*
If it is ONLY to 75.158.91.220, then yes you have a point. Plus, it doesn't explain my NNTP traffic being dropped tongue.gif

QUOTE(kons @ Apr 29 2008, 06:25 PM)
Out of everything available in IP protocols, I wonder why TM wanted to tease your NNTP traffic?
Teasing your HTTP traffic would be more frustrating, I guess.

Furthermore, if they are doing shaping, I'm sure they would shape something more than just a mere NNTP right?
My NNTP traffic exceeds 50GB a month smile.gif

This post has been edited by spanker: May 8 2008, 05:09 PM

 

Change to:
| Lo-Fi Version
0.0183sec    0.38    6 queries    GZIP Disabled
Time is now: 8th December 2025 - 10:34 PM