Internet services leverage transport protocol port numbers to specify the source and destination application layer protocols. While using port 0 is not allowed in most transport protocols, we see a non-negligible share of traffic using port 0 in the Internet. In this study, we dissect port 0 traffic to infer its possible origins and causes using five complementing flow-level and packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP traffic, most of which we identify as an artifact of packet fragmentation. In our packet-level datasets, most traffic is originated from a small number of hosts and while most of the packets have no payload, a major fraction of packets containing payload belong to the BitTorrent protocol. Moreover, we find unique traffic patterns commonly seen in scanning. In addition to analyzing passive traces, we also conduct an active measurement campaign to study how different networks react to port 0 traffic. We find an unexpectedly high response rate for TCP port 0 probes in IPv4, with very low response rates with other protocol types. Finally, we will be running continuous port 0 measurements and providing the results to the measurement community.
翻译:互联网服务利用运输协议的港口号码来指定源和目的地应用层协议。 虽然大多数运输协议不允许使用港口0, 但多数运输协议都不允许使用港口0, 但我们看到,使用互联网中的港口0的运输量比例是不可忽略的。 在本研究中,我们分解了港口0的运输量,以推断其可能的起源,并使用5个补充的流量水平和包级数据集造成原因。 在IXP交通的一周中,我们观测了73GB的港口0交通量,其中多数被我们确定为包件碎裂的文物。 在我们的包级数据集中,大多数的运输量来自少数的东道主,而大部分包装没有有效载荷,而大部分有效载荷是BitTorrent协议的。 此外,我们发现在扫描中通常看到独特的运输模式。 除了分析被动痕迹外,我们还开展了一项积极的测量运动,以研究不同网络对港口0交通的反应如何。 我们发现,在IPv4中,TCP港口0探测器的响应率出乎预料的高。 与其他协议类型反应率非常低。 最后,我们将持续进行港口0的测量,并向测量界提供结果。