Configure what sorts of Internet measurements are permitted on the
CAIDA Archipelago vantage point: sea3-us
Host site's firewall:
Please configure your firewall to allow the Ark
node to initiate outbound Internet communcation with all packet types to
all Internet IP address destinations.
The ark node implements an internal
firewall based on the settings you select on this web page.
If you observe unwanted network traffic from your
Ark node, please do not block it with a firewall. Instead, disconnect the
network cable (leave it powered on) and contact security@caida.org for
additional help.
Archipelago supports two types of firewalling scenarios: an open Internet
connection with a public IP address (i.e. not 192.168.x.x) or installation
behind a network address translation (NAT) firewall where it has a private
IP address. In both cases, your ark node must be able to originate packets to
the Internet without obstruction by the host site's firewall.
Obstructing the packets your Ark node originates without CAIDA's knowledge
corrupts our data when we compile it with everyone else's Ark node. So
please don't. Really. We'd prefer to have no data from your location than data
altered by your use of a firewall.
Your ark node uses the settings you select on this web page to control
what sort of measurements will be allowed. It rejects experiments which
require permission you have not granted, and enforces these restrictions on
the experiments it accepts with an internal firewall (Linux iptables).
In addition, the internal firewall
drops measurement software packets targeted at restricted addresses
(except the default router). These are: 0.0.0.0/8, 10.0.0.0/8,
169.254.0.0/16, 172.16.0.0/12, 192.168.0.0/16, 224.0.0.0/3. IPv6 destination
addresses except for 2000::/3 are also dropped.
That said, when you deploy an ark node to an
enterprise network, you should avoid placing it in the network interior.
Place it outside the firewall or in a DMZ instead.
If you observe unwanted network traffic from your
Ark node, please do not block it with a firewall. Instead, disconnect the
network cable (leave it powered on) and contact security@caida.org for help.
Bandwidth: megabits per second,
gigabytes per day.
Granting CAIDA additional bandwidth allows academics and
experimenters to do more sophisticated measurements such as bandwidth
measurements. We use rate shapers and schedule measurements to respect
the amount of network capacity you're willing to give us.
The numbers here are the maximum bandwidth we'll use. Our typical usage is
lower.
Packets allowed:
Your ark node implements an internal firewall and related controls to prevent
measurement experiments from emitting unwanted packets on your network.
For example, should an experiment accidentally emit packets to restricted
IP addresses, those packets will be dropped. Restrict addresses are:
0.0.0.0/8, 10.0.0.0/8, 169.254.0.0/16, 172.16.0.0/12, 192.168.0.0/16,
224.0.0.0/3 and IPv6 addresses except for 2000::/3.
No Restriction: Your ark node will emit any packets that
a measurement experiment sends.
Some Restriction: CAIDA will apply a small set of technical
restrictions to prevent an unauthorized measurement experiment from using
your ark node as an Internet virus transmitter.
Custom: Fine tune the restrictions on what measurement
experiments can do.
TCP:
The Transmission Control Protocol (TCP) is used to send most Internet
data such as web pages, email and Netflix.
Allowed: Measurements may originate TCP packets to any
IP address and TCP port.
Web: Measurements may access common Web and DNS TCP ports
including but not limited to 53, 80, and 443.
Whitelisted: Measurements may originate TCP packets to
any IP address using only TCP destination ports in the allowed list.
Administrative: The Ark node may contact addresses on
CAIDA's administrative network using TCP. General Internet access with TCP
is blocked.
Whitelisted TCP ports:
Comma separated list of TCP ports to allow. Use a hyphen
to specify a range of ports. E.g.: "80, 443, 8000-8080"
UDP:
The User Datagram Protocol (UDP) is used to send critical Internet data such
as name to IP address lookups (DNS) and Voice over IP phone calls.
Allowed: Measurements may originate UDP packets to any
IP address and UDP port.
Whitelisted: Measurements may originate UDP packets to
any IP address using only UDP destination ports in the allowed list.
Administrative: The Ark node may contact addresses on
CAIDA's administrative network using UDP. General Internet access with UDP
is blocked.
Whitelisted UDP ports:
Comma separated list of UDP ports to allow. Use a hyphen
to specify a range of ports. E.g.: "80, 443, 8000-8080"
DNS:
The Domain Name System is used to translate computer names (such as
www.google.com) to the servers' IP addresses. It operates on UDP and TCP
ports 53. The settings for the DNS here will apply regardless of what you
selected for TCP and UDP above.
Allowed: Measurements may originate DNS queries to any
IP address on the Internet requesting DNS records for any name.
Configured: Measurements may originate DNS queries to
the locally configured DNS server for any name.
Whitelist: The Ark node will fulfill DNS queries only for
queries matching a CAIDA-approved pattern of safe names using the locally
configured DNS server.
Unless this site is located in an area where the government is unusually
sesitive to the names of web sites people ask for, we urge you to set
this to Allow.
ICMP:
The Internet Control Message Protocol (ICMP) is used to convey low-level
status information between computers on the Internet.
All: Measurements may send and receive ICMP
packets. This includes uncommon message types such as Timestamp and ICMP
message types which have not been defined by the IETF.
Required: CAIDA performs a minimum set of required
measurements from Ark nodes employing ICMP messages including echo-request,
echo-reply, destination unreachable, TTL exceeded and packet too big. If you
choose to operate an Ark node, these measurements can not be disabled.
Note that except for restricted IP addresses, your ark node can send ICMP
packets to and receive them from any destination on the Internet. This is
the minimum requirement for operation of an Ark node and cannot be further
tuned. These restricted addresses are: 0.0.0.0/8, 10.0.0.0/8,
169.254.0.0/16, 172.16.0.0/12, 192.168.0.0/16, 224.0.0.0/3. IPv6 destination
addresses except for 2000::/3 are also dropped.
Other protocols:
There are dozens of additional Internet protocols besides TCP, UDP and ICMP.
For example, IPSec has its own protocol directly above IP. Few user-visible
services employ them and they are not generally compatible with NAT
firewalls.
Unless you selected "none" for Firewall above, no measurements will be
done with protocols other than ICMP, UDP and TCP regardless of what you
select here.
Spoofing:
Source address spoofing means that the ark node may send packets from an IP
address that you have not assigned it. That IP address belongs to someone
else. This is a security problem
and should not be allowed. Unfortunately, it often is allowed.
Sending packets with spoofed IP addresses is a security issue.
A diligent ISP will notice the transmission of these false packets and may,
as a result, conclude you have contracted an Internet virus.
Allowed: CAIDA may assess whether your Internet provider is
one of the ones that incorrectly allows spoofed packets by sending packets
with false source addresses to one of our collectors.
Cooperating: IP addresses
belonging to organizations which have given CAIDA explicit permission to
use them as spoofed source addresses. CAIDA will use only these addresses
and the ones you explicitly assign to your ark node.
RFC 1918: Packets sourced from "private" IP address space
including 10.0.0.0/8, 169.254.0.0/16, 172.16.0.0/12, 192.168.0.0/16 and
fc00::/7.
Blocked: The Ark node will only emit IP packets from the
addresses you assign to it.
Measurement Policies:
CAIDA endeavors to steer unusual measurement experiments to sites
willing to host them. While we will do everything practical to respect your
wishes, be aware that we cannot technically enforce these policies. Instead,
we demand experimenters respect them and respond to complaints should an
experimenter fail to. If something absolutely must not happen from your site,
please make use of the technical packet restrictions above.
Hacky: Measurement experiments which generate invalid
packets for the purpose of assessing their routability on the general
Internet.
Censorship studies: Measurement experiments which assess the
reachability of commonly banned Internet sites.
Security studies: Measurement experiments which assess the
usability of network protocols with security issues.
Innocuous: Measurements like pings and traceroutes which
pose little or no risk of offending anybody.
Authorized experimenters:
CAIDA only: individuals operating under direct CAIDA
supervision.
Non-profit: third parties vetted by CAIDA who design
measurement experiments and write software CAIDA has not directly reviewed.
This may include professors and graduate students at universities around
the world.
All: third parties vetted by CAIDA who design measurement
experiments CAIDA has not directly reviewed. This may include for-profit
third parties who sell the information they compile from the collected
data. They generally agree to share the collected raw data with CAIDA in
exchange for access to the Ark infrastructure.
We strongly encourage you to at least allow academics to design and run
measurement experiments on your ark node. CAIDA applies hard security limits
to all such experiements, based on the permissions you've granted above.
Note that the above is predicated on the implementation of the
ark framework described here, not the
existing depolyed ark system.