Feeds

Boffins birth uber 'net neutrality' dowser

Eye on your ISP

Boost IT visibility and business value

Researchers with the International Computer Science Institute in Berkeley, California have unveiled a completed version of their Netalyzr service, a tool designed to detect when your ISP is interfering with your net connection.

The web-based service has been available as a beta since the middle of last year, but it's now set to collect mountains of data for a National Science Foundation-funded project that seeks to determine the state of so-called net neutrality.

"There is all this discussion about network neutrality flying around, and there is fairly little in terms of hard research to show what the reality is - what ISPs really do," Christian Kreibich, a research scientist with the not-for-profit computer science lab, tells The Reg.

"We decided we could build something that normal people could use to better understand what they're facing with their internet use, and as researchers, we also get a data set that lets us analyze this stuff."

Netalyzr - available here - runs inside your browser, but it requires Java. It can't rely on pure JavaScript, Kreibich says, because JavaScript doesn't let the browser create arbitrary network connections. But it does use some JavaScript to detect things such as cookies or framing.

Part of the setup is hosted on Amazon's EC2 service, and Amazon has given the Institute an unspecified amount of money to supplement its use of EC2, but most of the project's funds are provided by the National Science Foundation.

The service attempts to analyze the entire network protocol stack and determine where ISPs - for whatever reason - are actively tinkering with the "normal" flow of traffic. Some of the behavior it's looking for is fairly mundane. It will tell you, for instance, if your ISP forces you to use its own smtp server to send email. Based on preliminary data, Kreibich says, most ISPs do not block the use of personal smtp servers - though some will block smtp servers if you start sending unusually large amounts of email.

But it also looks for more subtle "network management" techniques. There are countless tests involving http proxies, for example. "We test http proxying in quite a bit of detail," Kreibich says. "The correct behavior of the http cache - caught up in most of these proxies - is crucial to your web-surfing experience. We have to be able to rely on the fact that when a content publisher pushes out new content, you aren't getting old stuff."

The service also performs extensive DNS tests - a rarity among other network-analysis services along these lines - looking at both ISP-run DNS services or third-party services such as OpenDNS. It will tell you, for instance, when your DNS service is redirecting mistyped urls or email addresses. Early tests indicate that url redirection is fairly common.

Even if you have no interest in using the service for your own benefit, Kreibich and his team are urging netizens to run the service simply so that the institute can gather additional data for its study. The study is open-ended. Krebich is unsure when the results will be publicly released. ®

Seven Steps to Software Security

More from The Register

next story
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Orange spent weekend spamming customers with TXTs
Zero, not infinity, is the Magic Number customers want
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.