Skip to main content

This is a new website theme. Help me improve it and give your feedback (opens in a new tab).

Internet

IETF 104 in Prague

Thanks to support from Article 19, I was able to attend IETF 104 in Prague, Czech Republic this week. Primarily this was to present my Internet Draft which takes safe measurement principles from Tor Metrics work and the Research Safety Board and applies them to Internet Measurement in general.

My IETF badge, complete with additional tag for my nick

My IETF badge, complete with additional tag for my nick

I attended with a free one-day pass for the IETF and free hackathon registration, so more than just the draft presentation happened. During the hackathon I sat at the MAPRG table and worked on PATHspider with Mirja Kühlewind from ETH Zurich. We have the code running again with the latest libraries available in Debian testing and this may become the basis of a future Tor exit scanner (for generating exit lists, and possibly also some bad exit detection). We ran a quick measurement campaign that was reported in the hackathon presentations.

Overblocking

Last week when I found myself with my Internet connection down, I tried to use my EE LTE connection to work instead. This plan fell apart quite quickly when I discovered that *.torproject.org was blocked as 18+ content.

I found using the Open Rights Group’s tool, blocked.org.uk, that in fact a large number of UK ISPs have these wildcard blocks in place. This tool also provides a means to report misclassification and so I submitted requests to unblock the following domains:

Summer School on Internet Path Transparency Measurements


This post was originally published at the MAMI Project blog.


On June the 11th the Electronics Research Group hosted the MAMI Summer School on Internet Path Transparency Measurements in Aberdeen, Scotland. This consisted of a few hands-on workshops, with participation both on-site and remote via video conference.

The summer school started with Korian and Justin demonstrating Tracebox through a variety of topologies. The participants then worked on their own trying to uncover middleboxes and hidden topologies using a variety of tools, including tracebox and paris-traceroute.