skip to main content
research-article
Open Access

Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns

Published:28 November 2023Publication History
Skip Abstract Section

Abstract

Internet-wide scans are an important tool to evaluate the deployment of services. To enable large-scale application layer scans, a fast, stateless port scan (e.g., using ZMap) is often performed ahead of time to collect responsive targets. It is a common expectation that port scans on the entire IPv4 address space provide a relatively unbiased view as they cover the complete address space. Previous work, however, has found prefixes where all addresses share particular properties. In IPv6, aliased prefixes and fully responsive prefixes, i.e., prefixes where all addresses are responsive, are a well-known phenomenon. However, there is no such in-depth analysis for prefixes with these responsiveness patterns in IPv4.

This paper delves into the underlying factors of this phenomenon in the context of IPv4 and evaluates port scans on a total of 161 ports (142 TCP & 19 UDP ports) from three different vantage points. To account for packet loss and other scanning artifacts, we propose the notion of a new category of prefixes, which we call highly responsive prefixes (HRPs). Our findings show that the share of HRPs can make up 70% of responsive addresses on selected ports. Regarding specific ports, we observe that CDNs contribute to the largest fraction of HRPs on TCP/80 and TCP/443, while TCP proxies emerge as the primary cause of HRPs on other ports. Our analysis also reveals that application layer handshakes to targets outside HRPs are, depending on the chosen service, up to three times more likely to be successful compared to handshakes with targets located in HRPs. To improve future scanning campaigns conducted by the research community, we make our study's data publicly available and provide a tool for detecting HRPs. Furthermore, we propose an approach for a more efficient, ethical, and sustainable application layer target selection. We demonstrate that our approach has the potential to reduce the number of TLS handshakes by up to 75% during an Internet-wide scan while successfully obtaining 99 % of all unique certificates.

References

  1. Lance Alt, Robert Beverly, and Alberto Dainotti. 2014. Uncovering Network Tarpits with Degreaser. In Proceedings of the 30th Annual Computer Security Applications Conference (New Orleans, Louisiana, USA).Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Shehar Bano, Philipp Richter, Mobin Javed, Srikanth Sundaresan, Zakir Durumeric, Steven J. Murdoch, Richard Mortier, and Vern Paxson. 2018. Scanning the Internet for Liveness. ACM SIGCOMM Computer Communication Review (2018).Google ScholarGoogle Scholar
  3. Robert Beverly, William Brinkmeyer, Matthew Luckie, and Justin P. Rohrer. 2013. IPv6 Alias Resolution via Induced Fragmentation. In Proc. Passive and Active Measurement (PAM).Google ScholarGoogle Scholar
  4. Cloudflare. 2019. It's crowded in here! https://blog.cloudflare.com/its-crowded-in-here/Google ScholarGoogle Scholar
  5. Cloudflare. 2021. Unbuckling the narrow waist of IP: Addressing Agility for Names and Web Services. https://blog.cloudflare.com/addressing-agility/Google ScholarGoogle Scholar
  6. Cloudflare. 2023. Cloudflare Spectrum. https://www.cloudflare.com/products/cloudflare-spectrum/Google ScholarGoogle Scholar
  7. Cloudflare. 2023. Cloudflare Spectrum - Network ports. https://developers.cloudflare.com/fundamentals/get-started/reference/network-ports/Google ScholarGoogle Scholar
  8. Andrei Costin, Jonas Zaddach, Aurélien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 95--110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. David Dittrich, Erin Kenneally, et al. 2012. The Menlo Report: Ethical principles guiding information and communication technology research. US Department of Homeland Security (2012).Google ScholarGoogle Scholar
  10. J. Durand, I. Pepelnjak, and G. Doering. 2015. BGP Operations and Security. RFC 7454 (Best Current Practice). https://doi.org/10.17487/RFC7454Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. 2015. A Search Engine Backed by Internet-Wide Scanning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Denver, Colorado, USA) (CCS '15). Association for Computing Machinery, New York, NY, USA, 542--553.Google ScholarGoogle Scholar
  12. Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro Beekman, Mathias Payer, Nicolas Weaver, David Adrian, Vern Paxson, Michael Bailey, and J. Alex Halderman. 2014. The Matter of Heartbleed. In Proceedings of the 2014 Conference on Internet Measurement Conference (Vancouver, BC, Canada) (IMC '14). Association for Computing Machinery, New York, NY, USA, 475--488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Zakir Durumeric, Eric Wustrow, and J. Alex Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications. In Proc. USENIX Security Symposium. Washington, D.C., USA.Google ScholarGoogle Scholar
  14. Marwan Fayed, Lorenz Bauer, Vasileios Giotsas, Sami Kerola, Marek Majkowski, Pavel Odintsov, Jakub Sitnicki, Taejoong Chung, Dave Levin, Alan Mislove, Christopher A. Wood, and Nick Sullivan. 2021. The Ties That Un-Bind: Decoupling IP from Web Services and Sockets for Robust Addressing Agility at CDN-Scale. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference (SIGCOMM '21). Association for Computing Machinery, New York, NY, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, and Georg Carle. 2018. In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements. In Passive and Active Measurement Conference 2018.Google ScholarGoogle Scholar
  16. Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle. 2018. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In Proc. ACM Int. Measurement Conference (IMC) (Boston, MA, USA).Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. 2016. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In Proc. 8th Int. Workshop on Traffic Monitoring and Analysis. Louvain-la-Neuve, Belgium.Google ScholarGoogle Scholar
  18. Oliver Gasser, Markus Sosnowski, Patrick Sattler, and Johannes Zirngibl. 2023. Goscanner. Retrieved 2023-03--24 from https://github.com/tumi8/goscannerGoogle ScholarGoogle Scholar
  19. Robert Graham. [n. d.]. MASSCAN: Mass IP port scanner. https://github.com/robertdavidgraham/masscanGoogle ScholarGoogle Scholar
  20. Marcia Hofmann. 2013. Legal Considerations for Widespread Scanning. Retrieved 2023-09--26 from https://www.rapid7.com/blog/post/2013/10/30/legal-considerations-for-widespread-scanning/Google ScholarGoogle Scholar
  21. https://csirt.divd.nl/. 2023. Making the internet safer through Coordinated Vulnerability Disclosure. Retrieved 2023-03--24 from https://csirt.divd.nl/Google ScholarGoogle Scholar
  22. ICANN. 2023. CZDS - Centralized Zone Data Service. Retrieved 2023--10-05 from https://czds.icann.org/Google ScholarGoogle Scholar
  23. Liz Izhikevich, Renata Teixeira, and Zakir Durumeric. 2021. LZR: Identifying Unexpected Internet Services. In Proc. USENIX Security Symposium. https://www.usenix.org/conference/usenixsecurity21/presentation/izhikevichGoogle ScholarGoogle Scholar
  24. Liz Izhikevich, Renata Teixeira, and Zakir Durumeric. 2022. Predicting IPv4 Services across All Ports. In Proceedings of the ACM SIGCOMM 2022 Conference (Amsterdam, Netherlands) (SIGCOMM '22). Association for Computing Machinery, New York, NY, USA, 503--515. https://doi.org/10.1145/3544216.3544249Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Johannes Klick, Stephan Lau, Matthias Wählisch, and Volker Roth. 2016. Towards Better Internet Citizenship: Reducing the Footprint of Internet-Wide Scans by Topology Aware Prefix Selection. In Proc. ACM Int. Measurement Conference (IMC) (Santa Monica, California, USA). Association for Computing Machinery, New York, NY, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Matthew Luckie, Robert Beverly, William Brinkmeyer, and kc claffy. 2013. Speedtrap: Internet-Scale IPv6 Alias Resolution. In Proc. ACM Int. Measurement Conference (IMC) (Barcelona, Spain).Google ScholarGoogle Scholar
  27. MANRS. 2021. Prefix filter configuration tools. https://www.manrs.org/isps/guide/filtering/Google ScholarGoogle Scholar
  28. Austin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, and Vern Paxson. 2017. Target Generation for Internet-Wide IPv6 Scanning. In Proc. ACM Int. Measurement Conference (IMC) (London, United Kingdom).Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. University of Oregon. 2023. University of Oregon Route Views Project. http://www.routeviews.org/routeviews/Google ScholarGoogle Scholar
  30. Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, and Neil Spring. 2015. UAv6: Alias Resolution in IPv6 Using Unused Addresses. In Proc. Passive and Active Measurement (PAM).Google ScholarGoogle ScholarCross RefCross Ref
  31. Craig Partridge and Mark Allman. 2016. Addressing Ethical Considerations in Network Measurement Papers. Commun. ACM 59, 10 (Oct. 2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. The ZMap Project. 2023. ZGrab 2.0. Retrieved 2023-03--24 from https://github.com/zmap/zgrab2Google ScholarGoogle Scholar
  33. Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, and Ralph Holz. 2023. Data and Analysis at TUM University Library. https://mediatum.ub.tum.de/1723389 doi:10.14459/2023mp1723389.Google ScholarGoogle ScholarCross RefCross Ref
  34. Patrick Sattler, Johannes Zirngibl, Mattijs Jonker, Oliver Gasser, Georg Carle, and Ralph Holz. 2023. HRP Website with data. Retrieved 2023--10-05 from https://hrp-stats.github.io/Google ScholarGoogle Scholar
  35. Khwaja Zubair Sediqi, Lars Prehn, and Oliver Gasser. 2022. Hyper-Specific Prefixes: Gotta Enjoy the Little Things in Interdomain Routing. ACM SIGCOMM Computer Communication Review 52 (June 2022). Issue 2. https://doi.org/10.1145/3544912.3544916Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Shadowserver. 2023. Shadowserver - Lighting the way to a more secure Internet. Retrieved 2023-03--24 from https://www.shadowserver.org/Google ScholarGoogle Scholar
  37. Shodan. 2023. Shodan Dashboard. Retrieved 2023-03--24 from https://www.shodan.io/dashboardGoogle ScholarGoogle Scholar
  38. Rapid7 Project Sonar. 2023. Open Data. Retrieved 2023-03--24 from https://opendata.rapid7.com/Google ScholarGoogle Scholar
  39. Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, and Aiko Pras. 2016. A high-performance, scalable infrastructure for large-scale active DNS measurements. IEEE journal on selected areas in communications 34, 6 (2016), 1877--1888.Google ScholarGoogle ScholarCross RefCross Ref
  40. Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, and Zakir Durumeric. 2020. On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. In Proceedings of the ACM Internet Measurement Conference (Virtual Event, USA) (IMC '20). Association for Computing Machinery, New York, NY, USA, 662--679. https://doi.org/10.1145/3419394.3424214Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Johannes Zirngibl, Steffen Deusch, Patrick Sattler, Juliane Aulbach, Georg Carle, and Mattijs Jonker. 2022. Domain Parking: Largely Present, Rarely Considered!. In Proc. Network Traffic Measurement and Analysis Conference (TMA) 2022.Google ScholarGoogle Scholar
  42. Johannes Zirngibl, Patrick Sattler, and Georg Carle. 2023. A First Look at SVCB and HTTPS DNS Resource Records in the Wild. In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 470--474.Google ScholarGoogle ScholarCross RefCross Ref
  43. Johannes Zirngibl, Lion Steger, Patrick Sattler, Oliver Gasser, and Georg Carle. 2022. Rusty Clusters? Dusting an IPv6 Research Foundation. In Proc. ACM Int. Measurement Conference (IMC) (Nice, France).Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Packed to the Brim: Investigating the Impact of Highly Responsive Prefixes on Internet-wide Measurement Campaigns

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Networking
          Proceedings of the ACM on Networking  Volume 1, Issue CoNEXT3
          PACMNET
          December 2023
          446 pages
          EISSN:2834-5509
          DOI:10.1145/3635164
          Issue’s Table of Contents

          Copyright © 2023 Owner/Author

          This work is licensed under a Creative Commons Attribution International 4.0 License.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 November 2023
          Published in pacmnet Volume 1, Issue CoNEXT3

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)173
          • Downloads (Last 6 weeks)26

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader