skip to main content
10.1145/2535828.2535830acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Are TCP extensions middlebox-proof?

Published:09 December 2013Publication History

ABSTRACT

Besides the traditional routers and switches, middleboxes such as NATs, firewalls, IDS or proxies have a growing importance in many networks, notably in entreprise and wireless access networks. Many of these middleboxes modify the packets that they process. For this, they to implement (a subset of) protocols like TCP. Despite the deployment of these middleboxes, TCP continues to evolve on the endhosts and little is known about the interactions between TCP extensions and the middleboxes.

In this paper, we experimentally evaluate the interference between middleboxes and the Linux TCP stack. For this, we first propose MBtest, a set of Click elements that model middlebox behavior. We use it to experimentally evaluate how three TCP extensions interact with middleboxes. We also analyzes measurements of the interference between Multipath TCP and middleboxes in fifty different networks.

References

  1. Virtualbox. https://www.virtualbox.org.Google ScholarGoogle Scholar
  2. G. Detal, B. Hesmans, O. Bonaventure, Y. Vanaubel, and B. Donnet. Revealing Middlebox Interference with Tracebox. In ACM/USENIX Internet measurement conference (IMC), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Duke, R. Braden, W. Eddy, and E. Blanton. A Roadmap for Transmission Control Protocol (TCP). RFC4614, Sept. 2006.Google ScholarGoogle Scholar
  4. A. Ford, C. Raiciu, M. Handley, and O. Bonaventure. TCP Extensions for Multipath Operation with Multiple Addresses. RFC6824, Jan. 2013.Google ScholarGoogle Scholar
  5. B. Hesmans. Mbtest. Technical report, 2013.Google ScholarGoogle Scholar
  6. M. Honda, Y. Nishida, C. Raiciu, A. Greenhalgh, M. Handley, and H. Tokuda. Is it still possible to extend TCP? In ACM/USENIX Internet measurement conference (IMC), pages 181--194. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. V. Jacobson, B. Braden, and D. Borman. TCP Extensions for High Performance. RFC1323, May 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Mathis, J. Mahdavi, S. Floyd, and R. Ally. TCP Selective Acknowledgment Options. RFC2018, Oct. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Medina, M. Allman, and S. Floyd. Measuring Interactions between Transport Protocols and Middleboxes. In SIGCOMM'04, pages 336--341. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Padhye and S. Floyd. Identifying the TCP behavior of web servers. In ACM SIGCOMM'00, 2000.Google ScholarGoogle Scholar
  11. C. Raiciu, J. Iyengar, and O. Bonaventure. Recent advances in reliable transport protocols. In SIGCOMM ebook on Recent Advances in Networking, 2013.Google ScholarGoogle Scholar
  12. C. Raiciu, C. Paasch, S. Barre, A. Ford, M. Honda, F. Duchene, O. Bonaventure, and M. Handley. How hard can it be? Designing and Implementing a Deployable Multipath TCP. In USENIX Networked Systems Design and Implementation (NSDI), 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-End Arguments in System Design. ACM Transactions on Computer Systems (TOCS), 2(4):277--288, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service. In SIGCOMM'12, pages 13--24, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Z. Wang, Z. Qian, Q. Xu, Z. Mao, and M. Zhang. An Untold Story of Middleboxes in Cellular Networks. In SIGCOMM'11, pages 374--385, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Are TCP extensions middlebox-proof?

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          HotMiddlebox '13: Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization
          December 2013
          66 pages
          ISBN:9781450325745
          DOI:10.1145/2535828

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 December 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          HotMiddlebox '13 Paper Acceptance Rate8of20submissions,40%Overall Acceptance Rate29of80submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader