Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Communications The Internet Network Hardware Technology

Middleboxes vs. the Internet's End-to-End Principle 90

arglebargle_xiv writes "The Internet was designed around the end-to-end principle, which says that functionality should be provided by end hosts rather than in the network itself. A new study of the effect of vast numbers of middleboxes on the Internet (PDF) indicates that this is no longer the case, since far too many devices on the Internet interfere with traffic in some way. This has serious implications for network (protocol) neutrality (as well as future IPv6 deployment) since only the particular variations of TCP that they know about will pass through them."
This discussion has been archived. No new comments can be posted.

Middleboxes vs. the Internet's End-to-End Principle

Comments Filter:
  • Re:Too true (Score:4, Insightful)

    by adolf ( 21054 ) <flodadolf@gmail.com> on Tuesday August 02, 2011 @04:49AM (#36957186) Journal

    most worms cannot spread because my computers cannot receive a packet from any machine without software on my machine actively establishing a connection first. No exceptions.

    No exceptions, except for laptops, netbooks, and other various-and-sundry gear which travels between networks.

    Your walled garden may, indeed, have walls. But it also has unguarded gates through which anything may pass.

  • What (Score:5, Insightful)

    by ledow ( 319597 ) on Tuesday August 02, 2011 @05:58AM (#36957442) Homepage

    The "end-to-end" nature of the Internet ended with the first firewall. Not to mention NAT, proxies, etc. To get to the point where I have a transparent squid proxy protecting my workplace (a school) is only a teensy, tiny step.

    "End-to-end" is a pipedream and can't possibly work because of the sheer security and scale of such a network (i.e. there would be nobody on the path able to stop a DDoS against you!). It wouldn't work, and that's why other solutions exist.

    Hell, virtually every device ever sold that handles IP traffic modifies it in some way that defeats this "end-to-end" crap. They have firewalls. They may offer NAT. They might offer ping-blocking. Hell, the first thing any decent firewall does is turn off most of the unsolicited packet access that it receives, whether that be ICMP messages, or packets with fake origin. Without that, you'd have chaos.

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...