[Taps] Analysis of the socket APIs in the wild
Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be> Sat, 22 April 2017 10:46 UTC
Return-Path: <olivier.bonaventure@uclouvain.be>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE5CE129416 for <taps@ietfa.amsl.com>; Sat, 22 Apr 2017 03:46:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.422
X-Spam-Level:
X-Spam-Status: No, score=-2.422 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=uclouvain.be
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kg52M2OZgEwY for <taps@ietfa.amsl.com>; Sat, 22 Apr 2017 03:46:25 -0700 (PDT)
Received: from smtp5.sgsi.ucl.ac.be (smtp.sgsi.ucl.ac.be [130.104.5.67]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6381A129483 for <taps@ietf.org>; Sat, 22 Apr 2017 03:46:25 -0700 (PDT)
Received: from [192.168.1.6] (unknown [87.66.240.251]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: obonaventure@smtp5.sgsi.ucl.ac.be) by smtp5.sgsi.ucl.ac.be (Postfix) with ESMTPSA id A1B7D67DCF0; Sat, 22 Apr 2017 12:46:14 +0200 (CEST)
DKIM-Filter: OpenDKIM Filter v2.9.2 smtp5.sgsi.ucl.ac.be A1B7D67DCF0
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uclouvain.be; s=selucl; t=1492857974; bh=RB8hyguWg7xkN1HNmcKBxMCEuAelHMNBNAhjQo6qs0c=; h=Reply-To:Cc:From:Subject:To:Date; b=qxSObPWbX95F12wS21Ptgwx2lCq5OgZutjZivWrp4uo88WigAAmAtQIDl4M09aJfZ UcOwkOapLGHGXr5FJNVH7E3Zagc/PIozs0JDeYZZ06uJPyXL6nMKpFsAh8YeQ4u+AM 8OCOQrHM4U+ANd36cPZM5Xfz7KFlFV483KL/iV8o=
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.99.2 at smtp-5
Reply-To: Olivier.Bonaventure@uclouvain.be
Cc: Gregory Vander Schueren <gregory.vanderschueren@student.uclouvain.be>
From: Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>
To: taps@ietf.org
Message-ID: <7ed865f2-8dec-dba0-10fe-ecf567327978@uclouvain.be>
Date: Sat, 22 Apr 2017 12:46:14 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Sgsi-Spamcheck: SASL authenticated,
X-SGSI-Information:
X-SGSI-MailScanner-ID: A1B7D67DCF0.A56BB
X-SGSI-MailScanner: Found to be clean
X-SGSI-From: olivier.bonaventure@uclouvain.be
X-SGSI-Spam-Status: No
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/Zzi3u-3GhzVJfw9jSIcqN5HReX4>
Subject: [Taps] Analysis of the socket APIs in the wild
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Transport Services <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Apr 2017 10:46:28 -0000
Hello, I haven't followed the discussions within the TAPS working group closely, but I think that you could be interested by some ongoing work from one of our students, Gregory Cander Schueren. He has developped an open-source application, tcpsnitch, that allows to collect lots of statistics about how real networked applications use the socket and related APIs to interact with the underlying network stack. The software runs on Linux and Android and currently collects mainly information about the interactions with UDP, IP and TCP. You can download it from https://github.com/GregoryVds/tcpsnitch and use it with your favorite applications on Linux or Android. All the data collected by the software is available on https://tcpsnitch.org and this website provides a first set of statistics and graphs about the collected dataset. I think that information about how real applications interact with the underlying TCP/IP stack could be valuable for the work performed within this working group. If you have ideas or suggestions for additional analysis, feel free to contact Gregory directly Best regards, Olivier
- [Taps] Analysis of the socket APIs in the wild Olivier Bonaventure