this post was submitted on 07 Oct 2025
633 points (98.8% liked)

Mildly Interesting

23152 readers
87 users here now

This is for strictly mildly interesting material. If it's too interesting, it doesn't belong. If it's not interesting, it doesn't belong.

This is obviously an objective criteria, so the mods are always right. Or maybe mildly right? Ahh.. what do we know?

Just post some stuff and don't spam.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] comador@lemmy.world 6 points 1 week ago* (last edited 1 week ago) (1 children)

100% of all P2P protocols, literally are blocked by our University F5 BigIP by rule.

All of them (including certain Lemmy features).

https://en.m.wikipedia.org/wiki/List_of_P2P_protocols

When your IT has a small budget, you do what you need to do in order to mitigate the actions of the few.

[–] fxdave@lemmy.ml 2 points 1 week ago* (last edited 1 week ago) (1 children)

Sorry I still don't understand. Did you just block typical ports?

[–] comador@lemmy.world 2 points 1 week ago* (last edited 1 week ago)

No, there's no direct port blocking involved because P2P can work on all ports.

As such, the F5 BigIP identifies the packets themselves with the p2p protocol in them and blocks the packets themselves that are identified as P2P.

This way, the only torrent traffic that may get through is the kind running inside a VPN. Even then though, we can identify encrypted torrents by other means (Deep Flow Inspection, trace the VPN traffic or directly monitor the student machines that are owned by the university).