Hic Sunt Proxies: Unveiling Proxy Phenomena in Mobile Networks

Over the years middleboxes have established themselves as a solution to a wide range of networking issues, progressively changing network landscape and turning the end-to-end principle into a reminder of an Arcadian age of the Internet. Among them, proxies have found breeding ground especially in mobile networks that, moreover, have become the most popular way to access the Internet.In this paper, we present Mobile Tracebox, an Android measurement tool, and describe how its methodology, coping with the lack of privileges of mobile devices, can not only detect proxies but also characterize different facets, from their transport layer behavior to their location inside the network. Data collected from a crowdsourced deployment over more than 90 carriers and 350 Wi-Fi networks contributes to describe the potential of the tool and to draw a panorama of proxies across mobile networks. Our study confirms their prevalence and reveals that their scope is not limited to HTTP but can include several TCP services and even non standard ports. We detail the different implementations observed and delve into specific aspects of their configuration, like the initial Receive Window, the Window Scale factor or the set of Options supported, to understand how proxies can affect performance or obstruct extensions. Finally, we focus on fingerprinting and attempt to draw a dividing line between packet modifications performed by proxies and those performed by other classes of middleboxes.

[1]  Yuval Shavitt,et al.  DIMES: let the internet measure itself , 2005, CCRV.

[2]  Boris Nechaev,et al.  Netalyzr: illuminating the edge network , 2010, IMC '10.

[3]  Alessio Botta,et al.  Monitoring and measuring wireless network performance in the presence of middleboxes , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.

[4]  Narseo Vallina-Rodriguez,et al.  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks , 2015, MobiSys.

[5]  Gabriel Montenegro,et al.  Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations , 2001, RFC.

[6]  Mark Handley,et al.  Is it still possible to extend TCP? , 2011, IMC '11.

[7]  Internet Architecture Board,et al.  The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture , 2004, RFC.

[8]  Ming Zhang,et al.  An untold story of middleboxes in cellular networks , 2011, SIGCOMM.

[9]  Olivier Bonaventure,et al.  Revealing middlebox interference with tracebox , 2013, Internet Measurement Conference.

[10]  Vyas Sekar,et al.  Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.

[11]  Vern Paxson,et al.  Here Be Web Proxies , 2014, PAM.

[12]  Antonio Pescapè,et al.  Hic sunt NATs: Uncovering address translation with a smart traceroute , 2017, 2017 Network Traffic Measurement and Analysis Conference (TMA).

[13]  Matthew Mathis,et al.  RFC6928 - Increasing TCP's Initial Window , 2013 .

[14]  Brian E. Carpenter,et al.  Architectural Principles of the Internet , 1996, RFC.

[15]  Jan Rüth,et al.  Large-scale scanning of TCP's initial window , 2017, Internet Measurement Conference.

[16]  Ramesh Govindan,et al.  Investigating Transparent Web Proxies in Cellular Networks , 2015, PAM.

[17]  Narseo Vallina-Rodriguez,et al.  Header Enrichment or ISP Enrichment?: Emerging Privacy Threats in Mobile Networks , 2015, HotMiddlebox@SIGCOMM.

[18]  Steve Uhlig,et al.  Middleboxes in the Internet: A HTTP perspective , 2017, 2017 Network Traffic Measurement and Analysis Conference (TMA).

[19]  Frank Fuchs-Kittowski,et al.  Architecture of Mobile Crowdsourcing Systems , 2014, CRIWG.

[20]  Moritz Steiner,et al.  Detecting Cellular Middleboxes Using Passive Measurement Techniques , 2016, PAM.

[21]  Colin Perkins,et al.  Reinterpreting the transport protocol stack to embrace ossification , 2015 .