Exposing and Evading Middlebox Policies
DAVID CHOFFNES
Exposing and Evading Middlebox Policies DAVID CHOFFNES Middleboxes - - PowerPoint PPT Presentation
Exposing and Evading Middlebox Policies DAVID CHOFFNES Middleboxes are pervasive In-network functionality can be really helpful Security (IPS) Performance (proxies) Fairness (traffic management) 2 Middleboxes are pervasive
DAVID CHOFFNES
In-network functionality can be really helpful
2
In-network functionality can be really helpful
Double-edged sword
2
Some device in the network (middlebox) uses DPI to classify traffic and apply policies accordingly
3
What is the nature of deployed middlebox policies? How do middleboxes enforce policies? What are (un)intentional consequences? What can users do about this?
4
Middleboxes are protected, undisclosed systems
5
Middleboxes are protected, undisclosed systems
Understanding policies requires targeted traffic
5
Examine (in detail) a small testbed of DPI middleboxes
6
Examine (in detail) a small testbed of DPI middleboxes
Extend to operationally deployed devices
6
Examine (in detail) a small testbed of DPI middleboxes
Extend to operationally deployed devices Use application-generated traffic to trigger policies
6
Examine (in detail) a small testbed of DPI middleboxes
Extend to operationally deployed devices Use application-generated traffic to trigger policies
Systematically violate assumptions in classifiers
6
7
m: content modified
p: translucent proxies change connection behavior
8
m: content modified
p: translucent proxies change connection behavior
8
m: content modified
p: translucent proxies change connection behavior
8
m: content modified
p: translucent proxies change connection behavior
8
DPI: It’s dumber than you think What isn’t it looking at?
9
DPI: It’s dumber than you think What isn’t it looking at?
What is it looking for?
9
10
Header Example Value User-Agent User-Agent: GalaxyWarsMultiplayer
11
Header Example Value User-Agent User-Agent: GalaxyWarsMultiplayer
11
Example Application iPlayer
Header Example Value User-Agent User-Agent: GalaxyWarsMultiplayer
11
Example Application iPlayer
Free riding on T-Mobile
12
Free riding on T-Mobile
12
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Free riding on T-Mobile
12
Get / X-Host: foo.com Host: hbogo.com
Axiom: Middleboxes necessarily infer end-to-end state using incomplete information
13
Axiom: Middleboxes necessarily infer end-to-end state using incomplete information Hypothesis: It is possible to systematically identify and violate assumptions used in inference, unilaterally at transport/network layer
13
Axiom: Middleboxes necessarily infer end-to-end state using incomplete information Hypothesis: It is possible to systematically identify and violate assumptions used in inference, unilaterally at transport/network layer Our approach: Build a system that automatically, efficiently does this, to enable user control over impact of policies
13
Lack of transparency and control over network policies Empirical, practical approach can recover these properties
Testbed, datasets, results available http://dd.meddle.mobi
14
How do I engage with policy in an impactful way?
scheduling multiple phone calls with him, agreeing on there being potentially actionable issues, and having him forward to “the commission”
Who wants to help test networks for differentiation?
Which networks should we test? Who wants to use our testbed? What do you want? …and of course any other feedback/questions from you
15