Internet Protocol - Research by Kirils Solovjovs
Internet Protocol - Research by Kirils Solovjovs
Internet Protocol - Research by Kirils Solovjovs
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Skype protocol 80<br />
Packet compression<br />
Packets can be compressed. The algorithm is a variation of arithmetic compression that uses reals instead of bits.<br />
Legal issues<br />
Reverse engineering of the Skype protocol <strong>by</strong> inspecting/disassembling binaries is prohibited <strong>by</strong> the terms and<br />
conditions of Skype's license agreement. However there are legal precedents when the reverse-engineering is aimed<br />
at interoperability of file formats and protocols. [9][10][11] In the United States, the Digital Millennium Copyright Act<br />
grants a safe harbor to reverse engineer software for the purposes of interoperability with other software. [12][13] In<br />
addition, many countries specifically permit a program to be copied for the purposes of reverse engineering. [14]<br />
Notes<br />
[1] Skype for Asterisk – Production Released! (http:/ / blogs. digium. com/ 2009/ 08/ 31/ skype-for-asterisk-production-released/ ), By pengler,<br />
August 31st, 2009, Digium - The Asterisk Company<br />
[2] Page 11 in Salman A. Baset; Henning Schulzrinne (2004). "An analysis of the Skype peer-to-peer <strong>Internet</strong> telephony protocol".<br />
arXiv:cs/0412017v1 [cs.NI].<br />
[3] Skype "3.3 Utilization of Your Computer" (http:/ / www. skype. com/ intl/ en/ legal/ eula/ #you_expect), End User License Agreement,<br />
August 2010<br />
[4] Introduction Skype analysis Enforcing anti-Skype policies (http:/ / www. ossir. org/ windows/ supports/ 2005/ 2005-11-07/<br />
EADS-CCR_Fabrice_Skype. pdf), Skype uncovered Security study of Skype, Desclaux Fabrice, 7/11/2005, EADS CCR/STI/C<br />
[5] http:/ / support. skype. com/ en_US/ faq/ FA153/ Which-protocols-does-Skype-use<br />
[6] http:/ / www. oklabs. net/ category/ skype-reverse/<br />
[7] Dario Bonfiglio et al. “Revealing Skype Traffic: When Randomness Plays with You,” ACM SIGCOMM Computer Communication Review,<br />
Volume 37:4 (SIGCOMM 2007), p. 37-48 (https:/ / www. dpacket. org/ articles/ revealing-skype-traffic-when-randomness-plays-you)<br />
[8] Fabrice Desclaux, Kostya Kortchinsky (2006-06-17). "Vanilla Skype part 2" (http:/ / www. recon. cx/ en/ f/ vskype-part2. pdf). RECON2006.<br />
.<br />
[9] Sega vs Accolade, 1992<br />
[10] Sony vs Connectix, 2000<br />
[11] Pamela Samuelson and Suzanne Scotchmer, "The Law and Economics of Reverse Engineering", 111 Yale Law Journal 1575-1663 (May<br />
2002) (http:/ / www. yalelawjournal. org/ pdf/ 111-7/ SamuelsonFINAL. pdf)<br />
[12] 17 U.S.C. Sec. 1201(f).<br />
[13] WIPO Copyright and Performances and Phonograms Treaties Implementation Act<br />
[14] In the French "intellectual property" law set, there is an exception that allows any software user to reverse engineer it. See code de la<br />
propriété intellectuelle (http:/ / legifrance. gouv. fr/ affichCodeArticle. do?cidTexte=LEGITEXT000006069414&<br />
idArticle=LEGIARTI000006278920& dateTexte=20080329& categorieLien=cid) (French). This law is the national implementation of a<br />
piece of EU legislation: Council Directive 91/250/EEC (http:/ / eur-lex. europa. eu/ LexUriServ/ LexUriServ.<br />
do?uri=CELEX:31991L0250:EN:NOT), since then repealed <strong>by</strong> Directive 2009/24/EC of the European Parliament and of the Council of 23<br />
April 2009 on the legal protection of computer programs (http:/ / eur-lex. europa. eu/ LexUriServ/ LexUriServ.<br />
do?uri=CELEX:32009L0024:EN:NOT) which also has a very similar provision allowing reverse engineering/decompilation for the purposes<br />
of development and testing of independent but inter-operating programs).<br />
References<br />
• Salman A. Baset; Henning Schulzrinne (2004). "An analysis of the Skype peer-to-peer <strong>Internet</strong> telephony<br />
protocol". arXiv:cs/0412017v1 [cs.NI].<br />
• P. Biondi and F. Desclaux (March 3, 2006). "Silver Needle in the Skype" (http:/ / www. blackhat. com/<br />
presentations/ bh-europe-06/ bh-eu-06-biondi/ bh-eu-06-biondi-up. pdf).<br />
• F. Desclaux and K. Kortchinsky (June 6, 2006). "Vanilla Skype - part 1" (http:/ / www. recon. cx/ en/ f/<br />
vskype-part1. pdf).<br />
• F. Desclaux and K. Kortchinsky (June 17, 2006). "Vanilla Skype - part 2" (http:/ / www. recon. cx/ en/ f/<br />
vskype-part2. pdf).<br />
• L. De Cicco, S. Mascolo, V. Palmisano (May 2007). "An Experimental Investigation of the Congestion Control<br />
Used <strong>by</strong> Skype VoIP." (http:/ / c3lab. poliba. it/ images/ d/ d2/ Skype_wwic07. pdf). WWIC 07. Springer.