02.01.2013 Views

Internet Protocol - Research by Kirils Solovjovs

Internet Protocol - Research by Kirils Solovjovs

Internet Protocol - Research by Kirils Solovjovs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Skype protocol 80<br />

Packet compression<br />

Packets can be compressed. The algorithm is a variation of arithmetic compression that uses reals instead of bits.<br />

Legal issues<br />

Reverse engineering of the Skype protocol <strong>by</strong> inspecting/disassembling binaries is prohibited <strong>by</strong> the terms and<br />

conditions of Skype's license agreement. However there are legal precedents when the reverse-engineering is aimed<br />

at interoperability of file formats and protocols. [9][10][11] In the United States, the Digital Millennium Copyright Act<br />

grants a safe harbor to reverse engineer software for the purposes of interoperability with other software. [12][13] In<br />

addition, many countries specifically permit a program to be copied for the purposes of reverse engineering. [14]<br />

Notes<br />

[1] Skype for Asterisk – Production Released! (http:/ / blogs. digium. com/ 2009/ 08/ 31/ skype-for-asterisk-production-released/ ), By pengler,<br />

August 31st, 2009, Digium - The Asterisk Company<br />

[2] Page 11 in Salman A. Baset; Henning Schulzrinne (2004). "An analysis of the Skype peer-to-peer <strong>Internet</strong> telephony protocol".<br />

arXiv:cs/0412017v1 [cs.NI].<br />

[3] Skype "3.3 Utilization of Your Computer" (http:/ / www. skype. com/ intl/ en/ legal/ eula/ #you_expect), End User License Agreement,<br />

August 2010<br />

[4] Introduction Skype analysis Enforcing anti-Skype policies (http:/ / www. ossir. org/ windows/ supports/ 2005/ 2005-11-07/<br />

EADS-CCR_Fabrice_Skype. pdf), Skype uncovered Security study of Skype, Desclaux Fabrice, 7/11/2005, EADS CCR/STI/C<br />

[5] http:/ / support. skype. com/ en_US/ faq/ FA153/ Which-protocols-does-Skype-use<br />

[6] http:/ / www. oklabs. net/ category/ skype-reverse/<br />

[7] Dario Bonfiglio et al. “Revealing Skype Traffic: When Randomness Plays with You,” ACM SIGCOMM Computer Communication Review,<br />

Volume 37:4 (SIGCOMM 2007), p. 37-48 (https:/ / www. dpacket. org/ articles/ revealing-skype-traffic-when-randomness-plays-you)<br />

[8] Fabrice Desclaux, Kostya Kortchinsky (2006-06-17). "Vanilla Skype part 2" (http:/ / www. recon. cx/ en/ f/ vskype-part2. pdf). RECON2006.<br />

.<br />

[9] Sega vs Accolade, 1992<br />

[10] Sony vs Connectix, 2000<br />

[11] Pamela Samuelson and Suzanne Scotchmer, "The Law and Economics of Reverse Engineering", 111 Yale Law Journal 1575-1663 (May<br />

2002) (http:/ / www. yalelawjournal. org/ pdf/ 111-7/ SamuelsonFINAL. pdf)<br />

[12] 17 U.S.C. Sec. 1201(f).<br />

[13] WIPO Copyright and Performances and Phonograms Treaties Implementation Act<br />

[14] In the French "intellectual property" law set, there is an exception that allows any software user to reverse engineer it. See code de la<br />

propriété intellectuelle (http:/ / legifrance. gouv. fr/ affichCodeArticle. do?cidTexte=LEGITEXT000006069414&<br />

idArticle=LEGIARTI000006278920& dateTexte=20080329& categorieLien=cid) (French). This law is the national implementation of a<br />

piece of EU legislation: Council Directive 91/250/EEC (http:/ / eur-lex. europa. eu/ LexUriServ/ LexUriServ.<br />

do?uri=CELEX:31991L0250:EN:NOT), since then repealed <strong>by</strong> Directive 2009/24/EC of the European Parliament and of the Council of 23<br />

April 2009 on the legal protection of computer programs (http:/ / eur-lex. europa. eu/ LexUriServ/ LexUriServ.<br />

do?uri=CELEX:32009L0024:EN:NOT) which also has a very similar provision allowing reverse engineering/decompilation for the purposes<br />

of development and testing of independent but inter-operating programs).<br />

References<br />

• Salman A. Baset; Henning Schulzrinne (2004). "An analysis of the Skype peer-to-peer <strong>Internet</strong> telephony<br />

protocol". arXiv:cs/0412017v1 [cs.NI].<br />

• P. Biondi and F. Desclaux (March 3, 2006). "Silver Needle in the Skype" (http:/ / www. blackhat. com/<br />

presentations/ bh-europe-06/ bh-eu-06-biondi/ bh-eu-06-biondi-up. pdf).<br />

• F. Desclaux and K. Kortchinsky (June 6, 2006). "Vanilla Skype - part 1" (http:/ / www. recon. cx/ en/ f/<br />

vskype-part1. pdf).<br />

• F. Desclaux and K. Kortchinsky (June 17, 2006). "Vanilla Skype - part 2" (http:/ / www. recon. cx/ en/ f/<br />

vskype-part2. pdf).<br />

• L. De Cicco, S. Mascolo, V. Palmisano (May 2007). "An Experimental Investigation of the Congestion Control<br />

Used <strong>by</strong> Skype VoIP." (http:/ / c3lab. poliba. it/ images/ d/ d2/ Skype_wwic07. pdf). WWIC 07. Springer.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!