Skip to main content

Showing 1–7 of 7 results for author: Bush, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.04193  [pdf, other

    cs.NI

    SRv6: Is There Anybody Out There?

    Authors: Victor-Alexandru Pădurean, Oliver Gasser, Randy Bush, Anja Feldmann

    Abstract: Segment routing is a modern form of source-based routing, i.e., a routing technique where all or part of the routing decision is predetermined by the source or a hop on the path. Since initial standardization efforts in 2013, segment routing seems to have garnered substantial industry and operator support. Especially segment routing over IPv6 (SRv6) is advertised as having several advantages for e… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: Accepted at WTMC 2022

  2. Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering

    Authors: Andreas Reuter, Randy Bush, Ítalo Cunha, Ethan Katz-Bassett, Thomas C. Schmidt, Matthias Wählisch

    Abstract: A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations. While some networks now specify ROAs, little is known about whether other networks check routes they receive against these ROAs, a process known as Route Origin Validation (ROV). Which networks blindly accept invalid… ▽ More

    Submitted 5 May, 2018; v1 submitted 13 June, 2017; originally announced June 2017.

    ACM Class: C.2.2, C.2.3, C.2.5, C.4

    Journal ref: ACM SIGCOMM CCR 48(1) pp. 19--27, 2018

  3. arXiv:1706.02813  [pdf, ps, other

    cs.NI stat.AP

    Rigorous statistical analysis of HTTPS reachability

    Authors: George Michaelson, Matthew Roughan, Jonathan Tuke, Matt P. Wand, Randy Bush

    Abstract: The use of secure connections using HTTPS as the default means, or even the only means, to connect to web servers is increasing. It is being pushed from both sides: from the bottom up by client distributions and plugins, and from the top down by organisations such as Google. However, there are potential technical hurdles that might lock some clients out of the modern web. This paper seeks to measu… ▽ More

    Submitted 8 June, 2017; originally announced June 2017.

    MSC Class: 62P30 ACM Class: C.2.2; C.2.3; C.2.6

  4. arXiv:1610.05531  [pdf, other

    cs.CR

    SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment

    Authors: Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krueger, Pieter Lexis, Randy Bush, Anja Feldmann

    Abstract: Today's Internet utilizes a multitude of different protocols. While some of these protocols were first implemented and used and later documented, other were first specified and then implemented. Regardless of how protocols came to be, their definitions can contain traps that lead to insecure implementations or deployments. A classical example is insufficiently strict authentication requirements in… ▽ More

    Submitted 18 October, 2016; originally announced October 2016.

  5. A Multi-perspective Analysis of Carrier-Grade NAT Deployment

    Authors: Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson

    Abstract: As ISPs face IPv4 address scarcity they increasingly turn to network address translation (NAT) to accommodate the address needs of their customers. Recently, ISPs have moved beyond employing NATs only directly at individual customers and instead begun deploying Carrier-Grade NATs (CGNs) to apply address translation to many independent and disparate endpoints spanning physical locations, a phenomen… ▽ More

    Submitted 13 September, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    Journal ref: Proceedings of ACM IMC 2016

  6. arXiv:1605.04784  [pdf, other

    cs.NI

    Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements

    Authors: Romain Fontugne, Emile Aben, Cristel Pelsser, Randy Bush

    Abstract: Understanding network health is essential to improve Internet reliability. For instance, detecting disruptions in peer and provider networks facilitates the identification of connectivity problems. Currently this task is time consuming for network operators. It involves a fair amount of manual observation because operators have little visibility into other networks. In this paper we leverage the R… ▽ More

    Submitted 15 May, 2017; v1 submitted 16 May, 2016; originally announced May 2016.

  7. arXiv:1411.2649  [pdf, ps, other

    cs.NI

    A Primer on IPv4 Scarcity

    Authors: Philipp Richter, Mark Allman, Randy Bush, Vern Paxson

    Abstract: With the ongoing exhaustion of free address pools at the registries serving the global demand for IPv4 address space, scarcity has become reality. Networks in need of address space can no longer get more address allocations from their respective registries. In this work we frame the fundamentals of the IPv4 address exhaustion phenomena and connected issues. We elaborate on how the current ecosys… ▽ More

    Submitted 27 February, 2015; v1 submitted 10 November, 2014; originally announced November 2014.

    Comments: ACM CCR 45(2), 11 pages, editorial contribution

    ACM Class: C.2.3; C.2.2

    Journal ref: ACM Computer Communication Review 45(2), April 2015