[NNagain] upgrading old routers to modern, secure FOSS
Jack Haverty
jack at 3kitty.org
Mon Oct 23 14:53:09 EDT 2023
On 10/23/23 10:58, Dave Taht via Nnagain wrote:
> I wish that the city-dwellers of BEAD so in love with fiber would
> insert 70ms of rural delay into all their testing.
FYI, in case someone wants to pursue such real-world testing....
When we were testing TCP/IP software about 40 years ago there was a
similar problem of how to do tests in a lab which realistically
simulated real-world conditions. We created a software tool called
"Flakeway" which enable traffic flows to be delayed, duplicated,
re-ordered, deleted or mangled. That enabled realistic testing even
when the machines being tested were all in a lab connected to the same LAN.
That software is long gone, but might be easily rewritten today. It was
literally a weekend hack. Here's how it worked.
The basic design took advantage of a "feature" of the IP protocols. When
an IP datagram is to be sent to another computer on the same Ethernet,
the IP address isn't big enough to encode the Ethernet address. So the
ARP mechanism is used to get the appropriate mapping between an IP
address and the required Ethernet address for the destination host. The
sender issues an ARP request that says "Where is IP address x.x.x.x"?
The computer which is configured as that IP address responds with "It's
me, and my Ethernet address is xx:xx:xx:xx:xx:xx"
When the Flakeway, running on some other computer on the same LAN, saw
such an ARP exchange for a traffic flow it was supposed to manipulate,
it would immediately send it's own ARP response, saying "No, it's me,
and my Ethernet address is..."
We discovered that most computers simply believed the latest ARP
information it received. So it was easy for the Flakeway to insert
itself into any IP traffic flow and do its work, without any changes to
software in any other computer. It was handy not only for testing but
also for diagnosing all sorts of problems, simply capturing the traffic
flows for later analysis (similar to wireshark).
That was all done in the IPV4 world, 40+ years ago, so I'm not sure how
it might relate to today's Internet. We reported this "feature" to
IETF and some IEEE 802.x committee as a likely vulnerability, but I'm
not sure if anything changed.
But something similar might be possible in today's world to improve
real-world testing?
Jack Haverty
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.bufferbloat.net/pipermail/nnagain/attachments/20231023/82c40a6c/attachment.html>
More information about the Nnagain
mailing list