NNSquad - Network Neutrality Squad
[ NNSquad ] Re: New P2P Privacy System from Univ. of Washington
DPI is good when we use it to:*Blocking* is not technically feasible, contrary to claims. In order to block such content, one would have to buffer many sequential packets in a flow, holding all packets in a buffer, and only deliver packets when a unit of application data (such as an email) is complete. While programes like driftnet and etherpeek can sometimes copy such systems, a DPI based system that observed TCP packets *while buffering them* would so seriously disrupt the TCP flow control that the end system would experience disruption. As Vint Cerf said, this can only be done by higher level protocols at endpoints.
* Inspect content to detect and block virus or malware signatures
* Inspect content to detect and block denial of service payloadsDenial of service typically involves large numbers of packets, not specific payloads. Packet counting based on destination is not "deep packet inspection" - it's inspecting IP headers, which routers can do because it's outtside the envelope.
* Inspect content to detect and block spamAnalysis is same as viruses above, plus the important issue that spam is marketing material, and the recipient may not want a censorious ISP deciding that marketing of perfectly legal things via email is "bad". Let the recipient route his/her mail through a spam filter, where it is less costly to do the filtering than it is at the packet level, and the filtering can be chosen by the user based on his/her definition of "unwanted" in the official spam definition: bulk, unwanted, commercial email.
* Inspect content to detect replicate data to cache data so that unicastTaking end-to-end traffic streams apart after buffering them to reassemble the entire stream, to do a "diff" to determine that the data is the same is also infeasible. Today every kind of media is capable of being personalized - in a web browser you don't see the same page view that everyone else does, because the source personalizes the data for each customer (ad insertion, if nothing else, is done at the source server). This is also true of video media, the dandy of "multicast" aficionados who think people watch video live in a 1950's 3 network model.
audio/video delivery scales
* Inspect explicit DiffServ labels to properly prioritize trafficDiffserv labels are not deep packet inspection. They are IP protocol labels, and standardized independent of application. They are on the envvelope.
* Inspect protocol headers to determine implicit prioritization label in theThere is no technical term: "implicit prioritization label". The idea that one can infer priority required by end user from random inputs like port numbers is out there in the culture, but there are no studies that show psychological intent can be inferred by reading protocol headers. This like reading entrails.
absence of explicit priority labels
* Inspect content to offer targeted advertising to pay for free wirelessSince one cannot do this in real time, it depends on an assumption: that a single user shares the IP address, and therefore can be understood by the stream of all packets coming from that address. Advertisers (maybe not ISPs?) want to know people or context, not IP addresses. Google is in a good place because one search query, coupled with a cookie that tracks the particular personal computer being used, provides strong targeting. The DPI approach is costly and less targeted. Financially a weak proposition.
broadband
* Inspect content to offer targeted advertising to pay for free cloud emailSame as above. App services can do it better, user knows they do it, and user chooses.
e.g., Gmail
* Inspect content to offer targeted advertising when user explicitly agreesUser has an easy way to let this happen, as with Gmail, just buy your content services ion the form of an server-based application, from a vendor who adds that "feature". Technically easy, no DPI required.
to terms and conditions
The disclosure/permission issue is real. But the technical issues are the same.
DPI is bad when we use it to:
* Inspect content to offer targeted advertising to users without disclosure
or permission from user