Pollution in 1/8
The recent allocation of the 188.8.131.52/8 and 184.108.40.206/8 not only triggered a lot of media attention due to IPv4 exhaustion exceeding the 90% mark, it also sparked the curiosity of many technical folks. Specifically the NANOG mailing list triggered quite a lively discussion about the allocation of 220.127.116.11/8 ( http://mailman.nanog.org/pipermail/nanog/2010-January/017402.html ).
18.104.22.168/8 (1/8) was reserved by IANA since 1981. Since then is has been used unofficially as example addresses, default configuration parameters or pseudo-private address space.
The most prominent unauthorised use of 1/8 is anoNet. anoNet is a decentralised peer-to-peer network that allows users to anonymously share content. It uses 1/8 in order to hide the real IP address of its users. Up until 22 January 2010 an article about anoNet on Wikipedia stated:
"To avoid addressing conflict with the internet itself, the range 22.214.171.124/8 is used. This is to avoid conflicting with internal networks such as 10/8, 172.16/12 and 192.168/16, as well as assigned Internet ranges. In the event that 126.96.36.199/8 is assigned by IANA, anoNet could move to the next unassigned /8, though such an event is unlikely, as 188.8.131.52/8 has been reserved since September 1981." ( http://en.wikipedia.org/wiki/AnoNet )
Only recently, in 2008, 1/8 was moved from "the IANA reserved" to the "IANA unallocated" pool of addresses. In January 2010 it was finally allocated to APNIC in order to be distributed to Local Internet Registries in the Asia-Pacific region.
Announcing in 1/8
As part of APNIC's debogonising effort , carried out by the RIPE NCC upon their request, a number of prefixes out of the 1/8 range were announced from one of the RIS Remote Route Collectors (rrc03.ripe.net):
Of course 1/8 was never expected to be a "clean" prefix. In fact various prefixes out of 1/8 have been announced in the past 3 months, as seen by the RIPE NCC RIS tools . For instance, 184.108.40.206/24 was withdrawn just a few days before the RIS announced it as part of the debogonising effort.
Nevertheless, what we saw just minutes after 220.127.116.11/24 was announced on the morning of 27 January, 2010 was more than surprising:
The RIS RRC from which we announced 18.104.22.168/24 has connections to AMS-IX , NL-IX and GN-IX . The above image shows the incoming traffic on the AMS-IX port (10 MBit), which was instantly maxed out, mostly by traffic coming towards 22.214.171.124. The AMS-IX sflow graphs suggested that all together our peers were trying to send us more than 50 MBit/s of traffic. Most of this traffic was dropped due to the 10 MBit limit of our AMS-IX port:
# ping 126.96.36.199 PING 188.8.131.52 (184.108.40.206): 56 data bytes Request timeout for icmp_seq 0 Request timeout for icmp_seq 1 Request timeout for icmp_seq 2 64 bytes from 220.127.116.11: icmp_seq=3 ttl=62 time=19.267 ms Request timeout for icmp_seq 4 64 bytes from 18.104.22.168: icmp_seq=5 ttl=62 time=20.503 ms Request timeout for icmp_seq 6
(Note: We are not announcing 22.214.171.124/24 anymore. Therfore 126.96.36.199 is not pingable at the moment!)
The NL-IX port (100 Mbit) also showed some excess traffic (about 3 MBit on average). The GN-IX port did not see any significant increase. The outbound traffic is routed through the RIPE NCC networks and showed an increase of 5-6 MBit.
The network run on the RRC is designed to collect BGP routing data rather than actually route any traffic. Therefore these numbers are just an indication of what might happen when these prefixes are announced in a high capacity network with multiple transit providers.
Although the AMS-IX port of the RRC was already maxed out by announcing 188.8.131.52/24, we still decided to do some traffic analysis. These measurements have to be taken with a grain of salt since we had no way of telling what kind of traffic was dropped before it could reach the RRC. For that reason we also decided not to include transfer rates in these measurements. We can however present a good indication of what kind of traffic is generated in the 1/8 space.
To get an idea of the stability of the traffic pattern we collected 100,000 packets every 30 minutes over a period of 12 hours on 28 January 2010. We found that the distribution is fairly stable over time, with UDP being the predominant type of traffic.
Furthermore we analysed a sample of 100,000 packets collected at 10:00 on 28. January 2010 in more detail.
Almost 90% of the packets that we analysed were sent towards 184.108.40.206. Approximately 4% was sent towards 220.127.116.11. Other addresses out of 18.104.22.168/24 are following.
We found that almost 60% of the UDP packets are sent towards the IP address 22.214.171.124 on port 15206 which makes up the largest amount of packets seen by our RRC. Most of these packets start their data section with 0x80, continue with seemingly random data and are padded to 172 bytes with an (again seemingly random) 2 byte value. Some sources ( http://www.proxyblind.org/trojan.shtml ) list the port as being used by a trojan called "KiLo", however information about it seem sparse.
Another big portion of the packets sent towards 126.96.36.199 uses UDP port 2427 and 2727, which are part of the "Media Gateway Protocol". All of these packets seems to originate from one telecommunications provider and can probably be attributed to misconfigured VoIP equipment.
Almost 50% of the TCP packets were attempted HTTP connections on port 80. A small proportion of those packets, however, was seen as "established" HTTP connections, in particular HTTP POST requests. Some research showed that those requests looked very similar to the ones used by an Asian online game. Since the RRC is not running a webserver and should therefore not see any established HTTP connections, this can most likely be attributed to a bug in an HTTP client.
Withdrawing 188.8.131.52/24 and 184.108.40.206/24
Since the traffic patterns seemed to be stable we decided to withdraw the announcement of 220.127.116.11/24 and 18.104.22.168/24 on 2 February 2010. This was necessary in order to keep the debogon addresses pingable and to ensure overall smooth operation of the RRC. Shortly after withdrawing the announcements the traffic at our AMS-IX port dropped to the regular 2 Mbit again.
We can certainly conclude from this that specific blocks in 1/8 such as 22.214.171.124/24 and 126.96.36.199/24 are extremely polluted. Unless the traffic sent towards those blocks is significantly reduced they might be unusable in a production environment.
Although the limited capacity in our setup did not allow us to record accurate real-world numbers in terms of transfer rates and traffic-types, we were able to get a good indication of where the largest problems lie.
In order to collect real-world data the experiment would have to be repeated on a high-capacity network that more accurately resembles real-world scenarios in terms of transit providers and peering agreements.
We would like to hear your opinion on this subject: Do you have any experience with this kind of traffic? What should be done to reduce it? Would further research on this subject be useful? Please leave a comment after the break!