Paul Vixie On the Unevenly Distributed Intelligence of Internet Infrastructure 96
CowboyRobot writes "Writing for ACM's Queue magazine, Paul Vixie argues, "The edge of the Internet is an unruly place." By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills and budgets that something the size of the Internet deserves. Furthermore, the resiliency of the Internet means that a device or program that gets something importantly wrong about Internet communication stands a pretty good chance of working "well enough" in spite of this. Witness the endless stream of patches and vulnerability announcements from the vendors of literally every smartphone, laptop, or desktop operating system and application. Bad guys have the time, skills, and motivation to study edge devices for weaknesses, and they are finding as many weaknesses as they need to inject malicious code into our precious devices where they can then copy our data, modify our installed software, spy on us, and steal our identities."
fb (Score:1, Offtopic)
So (Score:2)
Re: (Score:2)
Re: (Score:2)
Unless you're on Android KitKat, of course. Apparently, it ignores /etc/hosts completely now.
Re: (Score:1)
Re:Benner madnes on slashban (Score:5, Insightful)
I made the mistake of trying the Slashdot Beta. What horrid shit.
Seriously. What kind of retarded fuckwad thinks that it is a good design.
Classic Slashdot (Score:4, Insightful)
I'm sorry, this is off topic, but I was getting a warning at the top of Slashdot that classic is going to be going away soon (looks like in 6 months).
How many readers are going to leave if slashdot classic is cut off completely?
Re:Classic Slashdot (Score:5, Insightful)
How many readers are going to leave if slashdot classic is cut off completely?
Good question. Maybe Timothy should set a poll?
Re: Classic Slashdot (Score:2)
You'll all tell the poll you're leaving, but come back every day to complain.
Re: (Score:2)
Re: (Score:2)
Dice's management have already made up their mind, and they are determined to kill Classic Slashdot. They may entertain some changes to the beta, but they will not kill it.
They will not setup a poll, because they have already decided. Done deal.
The part I am not sure of, is: do they know the extent of revulsion against beta? Or are they just chalking it up to a vocal minority, trolls, and whatnot?
Re: (Score:1)
You forgot developers-beta, science-beta, etc.
It's TCP/IP, baby. (Score:2, Interesting)
It's just the way TCP/IP was designed, back in the ARPANET days, you know.
Putting all the intelligence in the hosts allows for more resiliency, since it takes a lot to the bring the whole infrastructure down this way.
Mobile networks are quite the opposite, though (smarter infrastructure, a little more dumb terminals).
Software defined networks are definitely a way to bring some intelligence back in the infrastructure of IP networks.
We'll see if it will enable a smarter Internet or not.
Re:It's TCP/IP, baby. (Score:5, Insightful)
With intelligence at the edges, if you want something done, all you need is two or more endpoints with the right software and there you are. This goes for malice as well, of course, which is part of why the internet is kind of a rough neighborhood; but it's also why IP-based capabilities have changed so radically, while systems with more centralized intelligence have largely stagnated(even more impressive 'dumb endpoint' arrangements, like Minitel, have been eclipsed).
Re:SMS (Score:2)
Re:It's TCP/IP, baby. (Score:4, Interesting)
Putting all the intelligence in the hosts allows for more resiliency, since it takes a lot to the bring the whole infrastructure down this way.
It's the way to go. Any intellegence added to the core should merely be simple tweaks to enable more intelligence at the edges. For example, one might plausibly argue that making core routers select second/third most-preferred destination routes for a packet based on a TTL % on IP packets would allow end-systems to experimentally find the fastest performing route through the internet by trying different values on their TTLs/option fields. One could not reasonably argue for expecting core devices to maintain per-connection or even per-client/netblock state in an attempt to find alternate routes for each client connection.
Software defined networks are definitely a way to bring some intelligence back in the infrastructure of IP networks. We'll see if it will enable a smarter Internet or not.
From what I've seen of SDN it's a bunch of people who think they can abstract network services in a simple model, but who have no compreshension of the intrinsic differences in the heterogeneous mixture of devices employed, so they haven't even scratched the surface of being able to build a taxonomy/capabilities-enumeration for things like, for example, how many CAM entries are available for edge switch filters on a given switch model. Without that information, SDN applications have no way of doing any serious budgeting before launching a request into the network gear, and since the device might happily take the commands and provision a halfway-functional service that is dropping 5% of packets, rather than reject the request, and SDN has no real provisions for testing services before putting them in production, SDN is doomed to be confined to data centers where equipment has been carefully kept homogeneous.
Most people using SDN that I;'ve seen are doing so for enterprise (including server farm) LAN, not core internet.
Maybe, just maybe... (Score:1, Interesting)
Paul Vixie can pontificate on the Unevenly Distributed Intelligence at Dice that has resulted in this abomination known as Beta Slashdot...
Re: (Score:2, Informative)
apparently they have infinite mod points to give everybody -1 for trash talking beta
Re: (Score:2)
Paul Vixie can pontificate on the Unevenly Distributed Intelligence at Dice that has resulted in this abomination known as Beta Slashdot...
I don't think so. Beta Slashdot is a consequence of the idiot staff that Dice has hired to run Slashdot, considering that the headline and summary have nothing to do with Paul Vixie's argument. The quotes are taken from the article, but in a stupid way, like CowboyRobot is some sort of robot...
The article is actually about the need for the addition of minimal state to stateless protocols in order to thwart DDOS amplification techniques.
So don't give them anything to steal (Score:3)
We can't change the first two without destroying the Internet, but there's no reason why computers should contain so much valuable information to steal.
It is largely humans these days (Score:1)
that are the cause of breaches and insecurities of the Internet. Long ago that was not the case, because simply connecting a computer to the Internet would get it infected with malware. Computer and browser makers have learned how to largely avoid this, but no one has yet figured out a way to prevent trusting or stupid human beings from giving permission to install programs that subsequently are able to do severe damage. This is part of human nature and will never change.
Re:It is largely humans these days (Score:4, Insightful)
Those things are hardly real security(and more than a few have shipped with nasty flaws of their own); but they do tend to eat unsolicited inbound traffic pretty enthusiastically, which has really cut down on the number of totally helpless computers that end up being given a brutal taste of the open internet before they've even had time to patch.
Re: (Score:2)
Serious comments, please post to queue (Score:3, Funny)
http://queue.acm.org/detail.cfm?id=2578510
Complaints about beta go here (;-))
Welll... (Score:1)
Yes, but fuck beta?
Dumb systems can't be hacked (Score:5, Insightful)
Complexity is a vulnerability. Simplicity is a strength.
If something is just too simple to be modified or hacked or manipulated by anyone including the rightful owners then its too simple to be perverted by a hostile agent. Simplicity is frequently a virtue.
Re: (Score:2)
Don't make wide generilised sweeping statements as they are most often wrong. For example, properly implemented SAV would be complexity, yet also a strength.
Re: (Score:2, Insightful)
Wrong. It isn't impossible to hack it. And therefore it will be hacked.
Systems too simple to be hacked can't be hacked. They are secure. Everything else is second class.
People need to stop cutting security corners. This chicken shit security no longer an option.
Perfect security is possible. It requires sacrifice. You need to limit complexity. You need to limit what can and cannot be done. Do that and you leave little wiggle room for hackers to exploit. Anything short of that and you're better that you are s
Re: (Score:2)
Wrong. Hackers hack by exploiting flexibility in a system to be multiple things. If a given system is so simple it can LITERALLY only work one way then it cannot be hacked.
Effectively you have to make things that are non-programmable. Or that have their programming hardwired/hardcoded. No flexibility.
You set them up once to do a job and then leave them alone. Core systems can be set up this way and should be set up this way. They cannot get viruses. They cannot get taken over. They are what they are... end
Re: (Score:2)
I have to agree with PP in that perfect security is possible. Proveably so. You can try to hedge around this fact with sophomoric arguments that show that it is possible to use a perfectly secure system in an insecure manner. That it an excercise in semantics since exhibiting the insecurity requires abusing the system. In order to define security you have to define what it is you are attempting to be secure against. A door with a deadbolt on the inside, when locked, is perfectly secure against lockpick
Re: (Score:2)
Forgive me for oversimplifying my argument. My point stands that perfect security is possible and for backbone systems it should be required.
Re: (Score:2)
How do you hack a network hub? The hub, not the router.... and I say hub instead of switch because hubs are even more simplistic then switches.
A basic hub is unhackable. It does what it does.
Not Just Bad Guys (Score:4, Insightful)
But you know, it's funny... I would have thought the giant corporations that are behind manufacturing these devices (and in many cases the software for them) have just as much skill to look at these things from the other end.
Apparently what they have lacked is the motivation to do so. That should change.
I'm sorry, what? (Score:2, Informative)
DNS can use UDP, yes, but it can also use TCP, so as an example of "a UDP", it is quite poor.
Re: (Score:2)
DNS can use UDP, yes, but it can also use TCP, so as an example of "a UDP", it is quite poor.
He was talking about DNS reflection attacks, which is done via the primary DNS protocol, which is UDP-based. The attacker puts the victim's IP address in the source IP portion of the packet and requests a large quantity of information so that the DNS server will send it to the victim. Scale this up for DDOS on the victim. Since the attack is UDP-based, there's no requirement for the sender's IP to match the packet's sender ID.
I spent a lot of time last summer fending off that stuff, since my older machines
Re: (Score:2)
That actually could be solved with proper router configuration. For example, don't route traffic sourced from a router that has no route back to the source address. Case by case exceptions if well justified by the source.
Re: (Score:2)
That actually could be solved with proper router configuration. For example, don't route traffic sourced from a router that has no route back to the source address. Case by case exceptions if well justified by the source.
Who says there's no route back? The route back is merely bogus.
If you mean that the response address doesn't match the source address, well, it wouldn't the minute it made its first hop. Which means that every router in the world would have to be 100% trustworthy.
Re: (Score:2)
Getting a route announced is more difficult than spoofing a source address. Also, if you manage to convince the routers between the multiplying DNS server and you that there IS a route back, you will get the flood, not your victim.
Note that MOST providers already discard spoofed source packets from their customers.
Re: (Score:2)
Getting a route announced is more difficult than spoofing a source address. Also, if you manage to convince the routers between the multiplying DNS server and you that there IS a route back, you will get the flood, not your victim.
Note that MOST providers already discard spoofed source packets from their customers.
Unfortunately, as my logs amply demonstrated, on a network the size of the Internet, "most" isn't nearly enough. And if the "provider" was a military or rogue ISP installation, they would likely be part of the attack.
Re: (Score:2)
They still likely have an upstream or a transit provider. It gets more complicated at major peering points to decide who should be sending packets for what range, but it's not impossible even there.
As I said, MOST ISPs are conscientious about that, but certainly not all (or this problem wouldn't exist). It may be time to step up the game and deal with the few exceptions.
A different view. (Score:3, Interesting)
"they need to inject malicious code into our precious devices where they can then copy our data, modify our installed software, spy on us, and steal our identities."
Not on my networks, which comprise about 1 million people at the moment.
All of our infrastructure is open source and we don't have those issues. Been opeperating a standatf 3.x kernel on 25 routers with millions of people accessing them, along with the server software, also LINUX based running Apache, Tomcat Servlets, and PostGRES...OpenLDAP and TLS for the internal key management infrastructure.
so I don't see a problem with the internet as designed, works very well. It doesn't need change.
You are trying to change the internet for your own malicious purposes, in my opinion, than actually address the problem:
1) Internet security as far as functionality is concerned, works extremely well. I travel and I go to many places, and there has only been once in the past two years I couldn't access my VPN server due to a real internet outage. I say outage because the local admin at your so called "smart edge" made a few bad investment decisions, proprietary gear bankrolled with back doors.
2) Most of the problems you do see with sites, internet infrastructure is entirely not related to the internet as designed per se, but a frustration with governments who don't like what the internet is doing. That is, an obstruction to their spheres of power and political and industrial espionage which they require to gain an edge to stay in power.
The internet has a nasty habit of revealing the connections of two sets of laws that normally can't be seen by the plebs: That is the ones that say you have to spend 5 years in prison for 1 ounce of pot, complete with a criminal record so you will never be hired again vs. If you're say a Banker, and rob whole countries you get a pay raise and pat on the back or send you send the plebs to thier doom. For example, when the French found they couldn't get any of their gold back from the Fed they invaded Mali to stabilize their banks.
So I don't see any problems with the internet.
I do see a problem with governments and the internet coexisting together though, but that is not a technology problem.
As I see it, one or the other has to go and so far the internet is fighting a losing battle.
Re: (Score:2, Interesting)
Backdoors in this case of the edge network for this administrator are well know.
http://gigaom.com/2013/12/29/n... [gigaom.com]
Governments don't like the internet. They want it changed.
http://www.zdnet.com/surprise-... [zdnet.com]
So far one man, worth millions, with a great future ahead of him "decided to hang himself" over that same legislation.
http://www.globalresearch.ca/i... [globalresearch.ca]
People are seeing the connections through whistle blowers and alternative media.
http://www.infowars.com/hillar... [infowars.com]
http://www.theguardian.com/wor... [theguardian.com]
French Inva
Slashdot beta is not ready (Score:1)
"it's not ready" as you say, so can we please stop use it until it is ready?
PLEASE stop redirect us to this not ready thing
PLEASE let users themselves choose if they want to betatest this not ready thing.
Core is stupid (Score:1)
"the Internet core is stupid, and the edge is smart"
That is true on SO many levels.