lostvicking said:
Sim :
"The only way to get around that sort of shaping is to use a SSH tunnel, that way you only ever have one connection as far as iburst is concerned AND all communication is encrypted so it cannot be packet shaped"
can you elaborate on the SSH thing please?
yeah mate, its pretty simple, you connect to a server you have a secure shell on (ssh) and then you can use port forwarding rules to tunnel through that connection so that your data flows like this
application -> SSH -> destination
everything is encrypted at your box so by the time it gets to the packet shaper it doesnt look like bad traffic, theres a number of techniques but what you probably want to do is get a ssh program to make a fake proxy on localhost then send all your data to the localhost proxy and then have it forwarded to the destination by the server.
If that sounds a bit funny to you then go read the tutorial i did in the technical help section about bypassing the WBS SMTP server with SSH tunneling, take the same principles and apply it to p2p data.
It is important to note that the traffic is port shaped on the default SSH port (22), so a theoretical limit of 8KB/s will always be in effect, but theres 2 things to remember, firstly with something like say bittorrent you can have that 8KB/s multiple times over for each connection, so if you had 15 peers giving 8KB/s each you get 120KB/s total speed, the second thing to remember is if you can change the port SSH listens on to a priority port you can get full speed on one thread.
You wont get 120KB/s just because of the TCP overhead and the encryption/decryption but you can expect 100KB/s - 110KB/s