[Taps] Analysis of the socket APIs in the wild

Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be> Sat, 22 April 2017 10:46 UTC

Return-Path: <olivier.bonaventure@uclouvain.be>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE5CE129416 for <taps@ietfa.amsl.com>; Sat, 22 Apr 2017 03:46:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.422
X-Spam-Level:
X-Spam-Status: No, score=-2.422 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=uclouvain.be
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kg52M2OZgEwY for <taps@ietfa.amsl.com>; Sat, 22 Apr 2017 03:46:25 -0700 (PDT)
Received: from smtp5.sgsi.ucl.ac.be (smtp.sgsi.ucl.ac.be [130.104.5.67]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6381A129483 for <taps@ietf.org>; Sat, 22 Apr 2017 03:46:25 -0700 (PDT)
Received: from [192.168.1.6] (unknown [87.66.240.251]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: obonaventure@smtp5.sgsi.ucl.ac.be) by smtp5.sgsi.ucl.ac.be (Postfix) with ESMTPSA id A1B7D67DCF0; Sat, 22 Apr 2017 12:46:14 +0200 (CEST)
DKIM-Filter: OpenDKIM Filter v2.9.2 smtp5.sgsi.ucl.ac.be A1B7D67DCF0
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=uclouvain.be; s=selucl; t=1492857974; bh=RB8hyguWg7xkN1HNmcKBxMCEuAelHMNBNAhjQo6qs0c=; h=Reply-To:Cc:From:Subject:To:Date; b=qxSObPWbX95F12wS21Ptgwx2lCq5OgZutjZivWrp4uo88WigAAmAtQIDl4M09aJfZ UcOwkOapLGHGXr5FJNVH7E3Zagc/PIozs0JDeYZZ06uJPyXL6nMKpFsAh8YeQ4u+AM 8OCOQrHM4U+ANd36cPZM5Xfz7KFlFV483KL/iV8o=
X-Virus-Status: Clean
X-Virus-Scanned: clamav-milter 0.99.2 at smtp-5
Reply-To: Olivier.Bonaventure@uclouvain.be
Cc: Gregory Vander Schueren <gregory.vanderschueren@student.uclouvain.be>
From: Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>
To: taps@ietf.org
Message-ID: <7ed865f2-8dec-dba0-10fe-ecf567327978@uclouvain.be>
Date: Sat, 22 Apr 2017 12:46:14 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Sgsi-Spamcheck: SASL authenticated,
X-SGSI-Information:
X-SGSI-MailScanner-ID: A1B7D67DCF0.A56BB
X-SGSI-MailScanner: Found to be clean
X-SGSI-From: olivier.bonaventure@uclouvain.be
X-SGSI-Spam-Status: No
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/Zzi3u-3GhzVJfw9jSIcqN5HReX4>
Subject: [Taps] Analysis of the socket APIs in the wild
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Discussions on Transport Services <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Apr 2017 10:46:28 -0000

Hello,

I haven't followed the discussions within the TAPS working group 
closely, but I think that you could be interested by some ongoing work 
from one of our students, Gregory Cander Schueren. He has developped an 
open-source application, tcpsnitch, that allows to collect lots of 
statistics about how real networked applications use the socket and 
related APIs to interact with the underlying network stack. The software 
runs on Linux and Android and currently collects mainly information 
about the interactions with UDP, IP and TCP.

You can download it from https://github.com/GregoryVds/tcpsnitch
and use it with your favorite applications on Linux or Android.

All the data collected by the software is available on 
https://tcpsnitch.org and this website provides a first set of 
statistics and graphs about the collected dataset. I think that 
information about how real applications interact with the underlying 
TCP/IP stack could be valuable for the work performed within this 
working group. If you have ideas or suggestions for additional analysis, 
feel free to contact Gregory directly

Best regards,


Olivier