Abstract
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understanding of bugs in open-source router software is a first step towards addressing these problems. In this paper, we study router bugs found in two widely-used open-source router implementations. We evaluate the root cause of bugs, ease of diagnosis and detectability, ease of prevention and avoidance, and their effect on network behavior.
- Coverity prevent.http://www.coverity.com/html/coverity-prevent.html.Google Scholar
- The internet outage and attacks of october 2002. http://www.isoc-chicago.org/internetoutage.pdf.Google Scholar
- Linux kernel tracker. http://bugzilla.kernel.org/.Google Scholar
- Quagga software. http://www.quagga.net.Google Scholar
- Reckless driving on the internet. http://www.renesys.com/blog/2009/02/the-flap-heard-around-the-worl.shtml.Google Scholar
- Vyatta (open-source router vendor). www.vyatta.com.Google Scholar
- C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra. Routing policy specification language (rpsl). June 1999.Google Scholar
- E. D. Berger and B. G. Zorn. Diehard: probabilistic memory safety for unsafe languages. In PLDI, June 2006. Google ScholarDigital Library
- J. Boney. Cisco IOS in a Nutshell. O'Reilly Media, Inc., 2005. Google ScholarDigital Library
- A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In SOSP, October 2001. Google ScholarDigital Library
- J. V. der Merwe, A. Cepleanu, K. D'Souza, B. Freeman, and A. Greenberg. Dynamic connectivity management with an intelligent route service control point. In SIGCOMM Workshop on Internet Network Management(INM), September 2006. Google ScholarDigital Library
- J. Duffy. BGP bug bites juniper software. In Network World, December 2007.Google Scholar
- N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, May 2005. Google ScholarDigital Library
- T. G. Griffin and J. L. Sobrinho. Metarouting. In SIGCOMM, August 2005. Google ScholarDigital Library
- M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov. Designing extensible IP router software. In NSDI, May 2005. Google ScholarDigital Library
- S. Hangal and M. Lam. Tracking down software bugs using automatic anomaly detection. In ICSE, May 2002. Google ScholarDigital Library
- R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Usenix, 1992.Google Scholar
- E. Keller, M. Yu, M. Caesar, and J. Rexford. Virtually eliminating router bugs. In CONEXT, December 2009. Google ScholarDigital Library
- F. Le, G. Xie, D. Pei, J. Wang, and H. Zhang. Shedding light on the glue logic of the internet routing architecture. In SIGCOMM, August 2008. Google ScholarDigital Library
- Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI, December 2004. Google ScholarDigital Library
- Z. Li, L. Tan, X. Wang, S. Lu, Y. Zhou, and C. Zhai. Have things changed now? An empirical study of bug characteristics in modern open source software. In ASID, October 2006. Google ScholarDigital Library
- S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. Popa, and Y. Zhou. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In SOSP, October 2007. Google ScholarDigital Library
- S. Lu, S. Park, E. Seo, and Y. Zhou. Learning from mistakes -a comprehensive study on real world concurrency bug characteristics. In ASPLOS, March 2008. Google ScholarDigital Library
- F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies -- a safe method to survive software failures. In SOSP, October 2005. Google ScholarDigital Library
- M. Sullivan and R. Chillarege. A comparison of software defects in database management systems and operating systems. In International Symposium on Fault-Tolerant Computing, 1992.Google ScholarCross Ref
- M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In SOSP'03. Google ScholarDigital Library
- R. Teixeira, A. Shaikh, T. Griffin, and G. M. Voelker. Network sensitivity to hot-potato disruptions. In SIGCOMM, August 2004. Google ScholarDigital Library
Index Terms
- Towards understanding bugs in open source router software
Recommendations
Studying the fix-time for bugs in large open source projects
Promise '11: Proceedings of the 7th International Conference on Predictive Models in Software EngineeringBackground: Bug fixing lies at the core of most software maintenance efforts. Most prior studies examine the effort needed to fix a bug (fix-effort). However, the effort needed to fix a bug may not correlate with the calendar time needed to fix it (fix-...
Revisiting reopened bugs in open source software systems
AbstractReopened bugs can degrade the overall quality of a software system since they require unnecessary rework by developers. Moreover, reopened bugs also lead to a loss of trust in the end-users regarding the quality of the software. Thus, predicting ...
Analysis of Internet multicast traffic performance considering multicast routing protocol
ICNP '00: Proceedings of the 2000 International Conference on Network ProtocolsRecently audio and video delivery services are widely spread in the Internet. In order to deliver these data to multiple receivers at the same time, the multicast technologies are indispensable. In such a situation, the performance analysis of multicast ...
Comments