yarrp ing the internet
play

Yarrping the Internet Robert Beverly Naval Postgraduate School - PowerPoint PPT Presentation

Yarrping the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing Years (and years) of prior work on


  1. Yarrp’ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17

  2. Motivation Active Topology Probing Years (and years) of prior work on Internet-scale topology probing e.g., Scamper, DoubleTree, iPlane It’s 2016: Why can’t we traceroute to every IPv4 destination quickly ? e.g., O ( minutes ) ? (The ZMap a and Masscan b folks can do it – why can’t we?) a Z. Durumeric et al., 2013 b R. Graham, 2013 R. Beverly (NPS) Yarrp AIMS 2016 2 / 17

  3. Motivation Active Topology Probing Years (and years) of prior work on Internet-scale topology probing e.g., Scamper, DoubleTree, iPlane It’s 2016: Why can’t we traceroute to every IPv4 destination quickly ? e.g., O ( minutes ) ? (The ZMap a and Masscan b folks can do it – why can’t we?) a Z. Durumeric et al., 2013 b R. Graham, 2013 R. Beverly (NPS) Yarrp AIMS 2016 2 / 17

  4. Motivation State-of-the-art Existing traceroute-style approaches: Maintain state over outstanding probes (identifier, origination time) Are sequential , probing all hops along the path. At best, parallelism limited to a window of outstanding destinations being probed. Implications: Concentrates load: along paths, links, routers (potentially triggering rate-limiting or IDS alarms) Production systems probe slowly R. Beverly (NPS) Yarrp AIMS 2016 3 / 17

  5. Motivation State-of-the-art Existing traceroute-style approaches: Maintain state over outstanding probes (identifier, origination time) Are sequential , probing all hops along the path. At best, parallelism limited to a window of outstanding destinations being probed. Implications: Concentrates load: along paths, links, routers (potentially triggering rate-limiting or IDS alarms) Production systems probe slowly R. Beverly (NPS) Yarrp AIMS 2016 3 / 17

  6. Methodology Yarrp “Yelling at Random Routers Progressively” Takes inspiration from ZMap: Uses a block cipher to randomly permute the < IP , TTL > space Is stateless , recovering necessary information from replies Permits fast Internet-scale active topology probing (even from a single VP) R. Beverly (NPS) Yarrp AIMS 2016 4 / 17

  7. Methodology Traditional Traceroute Example Topology T 1 T 1 T T prober prober 2 T T 3 R. Beverly (NPS) Yarrp AIMS 2016 5 / 17

  8. Methodology Traditional Traceroute T 1 T 1 2 = t l t prober prober Traditional traceroute sends probes with incrementing TTL to destination T 1 R. Beverly (NPS) Yarrp AIMS 2016 6 / 17

  9. Methodology Traditional Traceroute T 1 T 1 4 = t l t prober prober ... continuing until finished with T 1 (reach destination or gap limit). Prober must maintain state, while traffic is concentrated on prober � T 1 path R. Beverly (NPS) Yarrp AIMS 2016 7 / 17

  10. Methodology Yarrp T 1 T 1 t t l = 4 , d s t = T T prober prober t 2 2 T T 3 Yarrp iterates through randomly permuted < Target , TTL > pairs R. Beverly (NPS) Yarrp AIMS 2016 8 / 17

  11. Methodology Yarrp T 1 T 1 1 t = t s d , 2 = t l t T T prober prober 2 ttl=3,dst=t3 T T 3 Yarrp iterates through randomly permuted < Target , TTL > pairs R. Beverly (NPS) Yarrp AIMS 2016 9 / 17

  12. Methodology Yarrp Inferred Topology T 1 T 1 T T prober prober 2 T T 3 Finally, stitch together topology. Requires state and computation, but off-line after probing completes. R. Beverly (NPS) Yarrp AIMS 2016 10 / 17

  13. Methodology Challenges Encoding State 16 32 E HL Ver DSCP Len C N Send TTL IPID Frag Offset cksum(T arget IP) TTL P=TCP Header Checksum IP Source IP = prober Send Elapsed Time (ms) Destination IP = target T arget IP Source Port d_port = 80 TCP Sequence Number IPID = Probe’s TTL TCP Source Port = cksum(Target IP destination) a TCP Seq No = Probe send time (elapsed ms) Per-flow load balancing fields remain constant (ala Paris) Assume routers echo only 28B of expired packet a Malone PAM 2007: ≈ 2% of quotations contained modified destination IP R. Beverly (NPS) Yarrp AIMS 2016 11 / 17

  14. Methodology Challenges Recovering State 16 32 Send TTL cksum(T arget IP) P=ICMP IP Source IP = router interface Send Elapsed Time (ms) Destination IP = prober T arget IP type=11 code=0 ICMP IPID TTL=0 P=TCP Quote Source IP = prober Destination IP = target Source Port d_port = 80 Sequence Number ICMP TTL exceeded replies permit recovery of: target probed, originating TTL (hop), and responding router interface at that hop. R. Beverly (NPS) Yarrp AIMS 2016 12 / 17

  15. Methodology Challenges Distribution of unique interfaces discovered vs. TTL for all Ark monitors, one Ark topology probing cycle 10 5 Problem: knowing when 10 4 to stop Little Unique Interfaces 10 3 discoverable topology past 10 2 TTL=32 ⇒ limit 10 1 < IP , TTL > search space to 10 0 TTL ≤ 32 1 2 3 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 4 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3 3 Trace TTL R. Beverly (NPS) Yarrp AIMS 2016 13 / 17

  16. Results Initial Testing Speed C++ implementation w/o tuning Linux KVM (1 core, Intel L5640 @ 2.27GHz) Achieve 106K pps Proof-of-concept Sent 10M probes in ≈ 100 sec Discovered 178,453 unique router interfaces CPU: 52% R. Beverly (NPS) Yarrp AIMS 2016 14 / 17

  17. Results What’s Possible Traceroute to an address in each /24, for TTLs 1-32 2 24 ∗ 2 5 t = 100 Kpps ≃ 84min Traceroute to every routed IPv4 destination 2 31 ∗ 2 5 t = 100 Kpps ≃ 1week R. Beverly (NPS) Yarrp AIMS 2016 15 / 17

  18. Results Optimizations Base Yarrp requires no state (Must reconstruct traces, but that’s an offline local process) If we’re willing to maintain some space, we can optimize: Time Memory Trade Off Probe only routed destinations (radix trie BGP RIB) Avoiding repeated re-discovery of prober’s local neighborhood (state over small number of interfaces near prober) Distribute: only requires communicating block cipher key and offset! R. Beverly (NPS) Yarrp AIMS 2016 16 / 17

  19. Results Next Steps Yarrping the Internet Push limits on how fast we can map the entire IPv4 Internet Compare discovered topologies from e.g. Ark versus Yarrp Applications? What do two snapshots of the Internet topology separated by an hour reveal? Others? Thanks! – Questions? https://www.cmand.org R. Beverly (NPS) Yarrp AIMS 2016 17 / 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend