Measurement and Analysis for Protocols Research Group (maprg) Agenda at IETF-103 (Bangkok)

Date: Tuesday Nov 6, 16:10-18:10 (Afternoon session II)
Room: Chitlada 1

Intro & Overview

Mirja Kühlewind
10 min

Heads-up talk: Privacy and Security Issues in IPv6 Deployment

Tobias Fiebig
5 mins

A Tale of Two Checksums

Gorry Fairhurst
10 mins + 5 mins

QUIC performance over a satellite public Internet access

Nicolas Kuhn
20 min

Service Provisioning in Vehicular Networks through Edge and Cloud: an Empirical Analysis

Jaime Jimenez
20 min

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem

Matthias Wählisch
20 min


Abstracts

A Tale of Two Checksums (Gorry Fairhurst, Tom Jones, Raffaele Zullo (University of Aberdeen))

draft-ietf-tsvwg-udp-options proposes adding options to UDP in the same way that TCP provides options. UDP Options are carried in the space beyond the end of the UDP Datagram unto the IP Payload length. This extra space carries TLV-formatted transport options.
In TSVWG at IETF-101 we presented a single slide showing a UDP checksum bug in the FreeBSD UDP output code. We fixed that bug upstream and thought that was the end of checksum issues! Little did we know the trials we were to face in implementing and testing UDP Options. We started measuring whether Internet paths transparently support UDP Options datagrams and were met by a whole mess of issues, one was the innocuously little checksum bug that we fixed in FreeBSD. There are still opportunities to miscalculate the checksum, causing datagrams to fail to reach the remote endpoint.
So, we asked, “What would happen if the options space itself carried a value that magically improved ability to work across the Internet?” We found such a value in what we call the checksum compensation option (CCO). An endpoint that receives a UDP-Options datagram containing a CCO, can compute a valid UDP checksum using either the UDP Length, or the length deduced from the IP header information. The CCO not only dramatically improves the chance of successful transmission, and the same checksum also protects the integrity of the UDP options space.
Our presentation will take a fast trip through this story, using measurement data from paths to 400K IPv4 addresses (17K ASes) and 30K IPv6 addresses (200 ASes) to assess the range of pathologies that result, and whether the CCO improves the probability of successful use of UDP Options. The targets list included 200K authoritative DNS servers and 100K HTTP servers from the Top-1m Alexa and about 70K STUN servers from a full IPv4 range scan.

Refs:
draft-ietf-tsvwg-udp-options
draft-fairhurst-cco (to be submitted before IETF-103)

QUIC performance over a satellite public Internet access (Nicolas Kuhn)

We analyze QUIC transport protocol behavior over a satellite communication system. Such systems usually split end-to-end protocols to improve end users’ quality of experience while fully encrypted QUIC might jeopardize this solution. Using a real satellite public access, we observe that heavy page load time is approximately twice longer with QUIC than with TLS over TCP. Although faster, QUIC connection establishment does not compensate an inappropriate congestion control.

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem (Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch)

Paper: https://arxiv.org/abs/1809.08325
In this paper, we analyze the evolution of Certificate Transparency (CT) over time and explore the implications of exposing certificate DNS names from the perspective of security and privacy. We find that certificates in CT logs have seen exponential growth. Website support for CT has also constantly increased, with now 33% of established connections supporting CT. With the increasing deployment of CT, there are also concerns of information leakage due to all certificates being visible in CT logs. To understand this threat, we introduce a CT honeypot and show that data from CT logs is being used to identify targets for scanning campaigns only minutes after certificate issuance. We present and evaluate a methodology to learn and validate new subdomains from the vast number of domains extracted from CT logged certificates.

In: Proc. of ACM Internet Measurement Conference (IMC), New York: ACM, 2018. accepted for publication