Two papers from CROSSING-PIs Prof. Michael Waidner and Dr. Haya Shulman have been accepted:
Practical Experience: Methodologies for Measuring Route Origin Validation
Tomas Hlavacek, Amir Herzberg, Haya Shulman and Michael Waidner
In: IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN)
Performing Route Origin Validation (ROV) to filter BGP announcements, which contradict Route Origin Authorizations (ROAs) is critical for protection against BGP prefix hijacks. Recent works quantified ROV enforcing Autonomous Systems (ASes) using control-plane experiments.
In this work we show that control-plane experiments do not provide accurate information about ROV-enforcing ASes. We devise data-plane approaches for evaluating ROV in the Internet and perform both control and data-plane experiments using different data acquisition sources. We perform simulations with the ROV-enforcing ASes that we identified, and find that their impact on the Internet security against prefix hijacks is negligible. As a countermeasure we provide recommendations how to cope with the main factor hindering wide adoption of ROV.
Path MTU Discovery Considered Harmful
Matthias Göhring, Haya Shulman and Michael Waidner
In: 38th IEEE International Conference on Distributed Computing Systems (IEEE ICDCS)
Path MTU Discovery (PMTUD) allows to optimize the performance in the Internet by identifying the maximal packet size that can be transmitted through a network. In this work we explore the benefits versus drawbacks of PMTUD in the Internet from the clients and servers perspective.
First, we examine the fraction of clients that use PMTUD. To that end we analyse ICMP PTB messages in CAIDA Internet Traces and show that the fraction of networks using PMTUD is negligible and that this number is further decreasing over the period of 2008 – 2016.
Second, we evaluate the fraction of popular web servers that support the PMTUD mechanism and show that a large number of the servers block "ICMP packet too big'' messages. On the other hand, we show easy and efficient – even though well-known – degradation of service attacks that exploit the availability of PMTUD.
Since the benefit of PMTUD is questionable, and in contrast it exposes to degradation of service attacks, we advocate to stop using it. As with any new change in the Internet, the implications of our recommendation should be carefully evaluated and gradually implemented. In the meanwhile, we provide recommendations for mitigations against the degradation of service attacks.