Thursday, 9 November 2023, at 17:00-18:30 Central European Time
Room: Congress Hall 1
Chair: Colin Perkins
Minutes: Colin Perkins
Recording: YouTube
Speaker: Colin Perkins, IRTF Chair
Colin Perkins introduced the meeting. He welcomed Reese Enghardt and Vidhi
Goel who join Simone Ferlin as ICCRG co-chairs. He also noted that the IRTF
is in the process of developing a code of conduct and solicited feedback on this from the group.
Nominations for the Applied Networking Research Prize 2024 are open until
19 November 2023.
Speaker: Siva Kakarla
Discussion:
Siva: The model was derived manually from the RFCs, in 2020. It's a
hard labour. We went through the RFCs, built a mathematical model,
and used the model for the test generation process.
Jim Reid: This is great work; it's good to see a more systematic way
of doing DNS testing. You found a lot of bugs in DNS software, but are
they implementation bugs rather than something that's faulty within the
RFCs?
Siva: The model is derives test cases from the RFCs, but when you run
the implementations, some respond in a different way compared to the
others; it's an RFC compliance bug.
Jim Reid: The DNS RFCs are somewhat vague, and it's difficult to use
them to some formal methods for testing. This has been a problem in many
previous cases. What problems have you had trying to develop the models,
particularly from the historical DNS RFCs?
Speaker: Dennis Trautwein
Discussion:
Dennis: This particular study didn't consider this, but there other
work that studied this and is linked from the talk
(https://dl.acm.org/doi/10.1145/3618257.3624797).
Colin Perkins: This is a content addressable system; does that have any
implications for privacy and being able to trace who's looking at what
content?
Dennis: There are big implications. When a request is sent to the
immediate neighbours in the network it gives away information about the
interests. There are efforts underway to address this using double hashing
and other techniques to obfuscate requests; work in progress.
Georgia Osborn: This is a peer to peer system, so the content is
delivered through multiple peers. Does that mean that as the content
is distributed, all peers are responsible for that content. If it is
illegal content, does that mean everyone is then responsible for that
illegal content?
Dennis: The illegal content will stay on the hosting machine. Other nodes
participating in the DHT will host provider records that point to the
content. No-one else hosts the content.
Ayoub Messous: How to explain performance gain? The increases are
surprising.
Dennis: The slides showed that the provider record is stored with a
single peer, but in reality it's stored with 20 peers to combat peer
churn. Two years ago the fraction of unreachable peers was high, giving
poor performance. Now it's significantly lower; this improves performance
because there are few timeouts.
Ayoub Messous: What is the performance impact of peer location? Do they
have to be geographically close to get good performance.
Dennis: No, the results relate to closeness in key space not peer location.
Jean Francois Querault: There are many different implementations listed,
including Filecoin which is block chain based. What's the difference in
behaviour between the different implementations?
Speaker: Ramakrishnan Sundara Raman
Paper
Slides
Discussion:
Ram: Absolutely; there's definitely value for the circumvention community.
Olivier Hureau: The slides showed only IPv4 addresses, did you try IPv6?
Ram: This study was only IPv4, but it's an easy extension to the tool.
However, some of the data used came from platforms, such as Censored
Planet, that only have IPv4 data available. Expect the results will
generalise to IPv6 if data was available.
Christopher Patton: This is great work. If you could change anything in
IETF, in TLS or HTTP or other things relevant to censorship, what would
you tell those people to do?
Ram: That's a good question. Most realistic thing is to encourage more
transparency. There's a lot of opaqueness of what's happening, both
from the people deploying censorship tools and from the people that build
such tools. Things like error messages that give reasons for blocking,
who is performing the blocking, open source block list, etc., would help
detect unwanted blocking.
Michael B.: Is there any reason why these devices should be able to hide
what's being blocked?
Colin Perkins thanked the speakers and reminded the group that nominations
for ANRP 2024 are currently open.