skip to main content
research-article

Towards understanding bugs in open source router software

Authors Info & Claims
Published:22 June 2010Publication History
Skip Abstract Section

Abstract

Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understanding of bugs in open-source router software is a first step towards addressing these problems. In this paper, we study router bugs found in two widely-used open-source router implementations. We evaluate the root cause of bugs, ease of diagnosis and detectability, ease of prevention and avoidance, and their effect on network behavior.

References

  1. Coverity prevent.http://www.coverity.com/html/coverity-prevent.html.Google ScholarGoogle Scholar
  2. The internet outage and attacks of october 2002. http://www.isoc-chicago.org/internetoutage.pdf.Google ScholarGoogle Scholar
  3. Linux kernel tracker. http://bugzilla.kernel.org/.Google ScholarGoogle Scholar
  4. Quagga software. http://www.quagga.net.Google ScholarGoogle Scholar
  5. Reckless driving on the internet. http://www.renesys.com/blog/2009/02/the-flap-heard-around-the-worl.shtml.Google ScholarGoogle Scholar
  6. Vyatta (open-source router vendor). www.vyatta.com.Google ScholarGoogle Scholar
  7. C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra. Routing policy specification language (rpsl). June 1999.Google ScholarGoogle Scholar
  8. E. D. Berger and B. G. Zorn. Diehard: probabilistic memory safety for unsafe languages. In PLDI, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Boney. Cisco IOS in a Nutshell. O'Reilly Media, Inc., 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In SOSP, October 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. V. der Merwe, A. Cepleanu, K. D'Souza, B. Freeman, and A. Greenberg. Dynamic connectivity management with an intelligent route service control point. In SIGCOMM Workshop on Internet Network Management(INM), September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Duffy. BGP bug bites juniper software. In Network World, December 2007.Google ScholarGoogle Scholar
  13. N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. T. G. Griffin and J. L. Sobrinho. Metarouting. In SIGCOMM, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Handley, E. Kohler, A. Ghosh, O. Hodson, and P. Radoslavov. Designing extensible IP router software. In NSDI, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Hangal and M. Lam. Tracking down software bugs using automatic anomaly detection. In ICSE, May 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Usenix, 1992.Google ScholarGoogle Scholar
  18. E. Keller, M. Yu, M. Caesar, and J. Rexford. Virtually eliminating router bugs. In CONEXT, December 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. F. Le, G. Xie, D. Pei, J. Wang, and H. Zhang. Shedding light on the glue logic of the internet routing architecture. In SIGCOMM, August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A tool for finding copy-paste and related bugs in operating system code. In OSDI, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Z. Li, L. Tan, X. Wang, S. Lu, Y. Zhou, and C. Zhai. Have things changed now? An empirical study of bug characteristics in modern open source software. In ASID, October 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Lu, S. Park, C. Hu, X. Ma, W. Jiang, Z. Li, R. Popa, and Y. Zhou. MUVI: Automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. In SOSP, October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Lu, S. Park, E. Seo, and Y. Zhou. Learning from mistakes -a comprehensive study on real world concurrency bug characteristics. In ASPLOS, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies -- a safe method to survive software failures. In SOSP, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Sullivan and R. Chillarege. A comparison of software defects in database management systems and operating systems. In International Symposium on Fault-Tolerant Computing, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In SOSP'03. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Teixeira, A. Shaikh, T. Griffin, and G. M. Voelker. Network sensitivity to hot-potato disruptions. In SIGCOMM, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards understanding bugs in open source router software

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader