We consider the problem of detecting deliberate traffic discrimination on the Internet. Given the complex nature of the Internet, detection of deliberate discrimination is not easy to detect, and tools developed so far suffer from various limitations. We study challenges in detecting the violations (focusing on the HTTPS traffic) and discuss possible mitigation approaches. We focus on `Wehe,' the most recent tool developed to detect net-neutrality violations. Wehe hosts traffic from all services of interest in a common server and replays them to mimic the behavior of the traffic from original servers. Despite Wehe's vast utility and possible influences over policy decisions, its mechanisms are not yet validated by others. In this work, we highlight critical weaknesses in Wehe where its replay traffic is not being correctly classified as intended services by the network middleboxes. We validate this observation using a commercial traffic shaper. We propose a new method in which the SNI parameter is set appropriately in the initial TLS handshake to overcome this weakness. Using commercial traffic shapers, we validate that SNI makes the replay traffic gets correctly classified as the intended traffic by the middleboxes. Our new approach thus provides a more realistic method for detecting neutrality violations of HTTPS traffic.
翻译:我们考虑在互联网上发现蓄意交通歧视的问题。鉴于互联网的复杂性,发现蓄意歧视并非易事,而且迄今开发的工具也存在各种限制。我们研究在发现违规行为方面的挑战(侧重于HTTPS交通),并讨论可能的缓解办法。我们注重“Wehe”,这是最近开发的用来检测净中性违规行为的工具。我们从所有感兴趣的服务机构接收共同服务器的交通,并重用它们模仿原服务器的交通行为。尽管Wehe的用途巨大,对政策决定可能产生影响,但其机制尚未被其他单位验证。我们在此工作中,我们强调在网络中间箱没有正确地将重新播放的交通归类为预定服务方面的关键弱点。我们用商业交通元件来验证这一观察。我们提出了一个新的方法,即SNI参数在最初的TLS握手中设置得当,以克服这一弱点。我们利用商业交通元件来验证SNI使重新播放流量被正确归类为中间箱预定交通的正确分类。我们的新办法提供了一种更现实的交通中性交通中性探测方法。