Nonce injection and observation system for detecting eavesdroppers

ABSTRACT

An entity can disseminate nonces by introducing them into various aspects of network traffic, and then listening for them, thereby detecting eavesdroppers on the Internet. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to how they are disseminated. Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, intelligence about who is eavesdropping on what portions of the Internet can be derived. Such intelligence can be put to many uses, including reporting on eavesdroppers, routing traffic around eavesdroppers, developing reputation scores, and adopting enhanced obfuscation/privacy/security techniques.

BACKGROUND Technical Field

This document relates generally to information privacy and security; more particularly it relates to methods and system for detecting eavesdroppers of network traffic.

Brief Description of the Related Art

The Internet has poor privacy in that it allows users' traffic to be inspected or classified trivially by examining clear-text portions of DNS and HTTP/HTTPS traffic, or by leveraging knowledge of IP address use in WWW infrastructure. Unfortunately, this allows a man in the middle to know which site(s) a user is visiting. A number of works in the research literature leverage these privacy vulnerabilities, and some are even available for use in commercial products such as traffic analyzers and other middle-boxes.

In the future, it is likely that the Internet traffic will be subject to classification using packet metadata: that is, IP addresses, DNS information, and SNI strings. Two reasons for that are the growing volume of HTTP-based application protocols, and the rapid adoption of HTTP encryption (through HTTPS, HTTP/2, and QUIC). Due to encryption, Deep Packet Inspection becomes decreasingly effective (except for the TLS handshake).

It is an objective of the teachings hereof to increase privacy and enhance security for internet users and website operators, as well as for Internet platform operators, such as ISPs and CDNs. Many things could be done to further this aim, including making protocol and infrastructure modifications and adopting privacy and security best practices, such as dynamic network address assignment and minimizing use of cleartext. However, a fundamental issue is to understand who or what may be watching traffic. The teachings hereof are directed to techniques to detect network eavesdroppers. This knowledge is a foundation for enhanced intelligence, privacy enhanced transport and routing, and of privacy as a service offering.

The teachings hereof address these and other needs that will become apparent in view of the teachings hereof.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention will be more fully understood from the following detailed description taken in conjunction with the accompanying drawings, in which:

FIG. 1 is a block diagram illustrating one embodiment of a system in accordance with the teachings hereof;

FIG. 2 is a block diagram illustrating the system of FIG. 1 with nonce injection;

FIG. 3 is a block diagram illustrating another embodiment of a system in accordance with the teachings hereof;

FIG. 4 is a block diagram illustrating the system of FIG. 3 with nonce injection;

FIG. 5 is a block diagram illustrating an alternate embodiment to FIG. 2 ;

FIG. 6 is a diagram of a content delivery network, in one embodiment;

FIG. 7 is a block diagram illustrating hardware in a computer system that may be used to implement the teachings hereof.

DETAILED DESCRIPTION

The following description sets forth embodiments of the invention to provide an overall understanding of the principles of the structure, function, manufacture, and use of the methods and apparatus disclosed herein. The systems, methods and apparatus described in this application and illustrated in the accompanying drawings are non-limiting examples; the claims alone define the scope of protection that is sought. The features described or illustrated in connection with one exemplary embodiment may be combined with the features of other embodiments. Such modifications and variations are intended to be included within the scope of the present invention. All patents, patent application publications, other publications, and references cited anywhere in this document are expressly incorporated herein by reference in their entirety, and for all purposes. The term “e.g.” used throughout is used as an abbreviation for the non-limiting phrase “for example.”

The teachings hereof may be realized in a variety of systems, methods, apparatus, and non-transitory computer-readable media. It should also be noted that the allocation of functions to particular machines is not limiting, as the functions recited herein may be combined or split amongst different machines in a variety of ways.

Any description of advantages or benefits refer to potential advantages and benefits that may be obtained through practice of the teachings hereof. It is not necessary to obtain such advantages and benefits in order to practice the teachings hereof.

Basic familiarity with well-known web page, streaming, and networking technologies and terms, such as HTML, URL, XML, AJAX, CSS, HTTP versions 1.1 and 2, DNS, TCP/IP, TLS, and UDP, is assumed. The term “server” is used herein to refer to hardware (a computer configured as a server, also referred to as a “server machine”) with server software running on such hardware (e.g., a web server). In addition, the term “origin” is used to refer to an origin server. Likewise, the terms “client” and “client device” is used herein to refer to hardware in combination with software (e.g., a browser or player application). While context may indicate the hardware or the software exclusively, should such distinction be appropriate, the teachings hereof can be implemented in any combination of hardware and software.

Overview

A platform operator such as a CDN service provider can disseminate nonces by introducing them into various aspects of network traffic emanating from (or advertised from) its platform, and then listening for them, thereby detecting eavesdroppers on the Internet.

As used in this document, “nonces” are values that are disseminated into a network in order to detect eavesdroppers. The term “nonce” as used in this document is broader than “a number used once”. A nonce may be numeric, alphanumeric, or otherwise; nonces are contextually appropriate to the network identifier or message in which they are disseminated. A nonce may be used just once, such that is it unique in an absolute sense (e.g., nonces are never re-used). Preferably, however, a nonce may be re-used, infrequently. This means that the nonce is unique in a relative sense: nonces may not be re-used within a particular time period, or may not re-used within a particular time period for the same type of network message or network identifier.

Nonces can be constructed by generating a value randomly or pseudo randomly. In a preferred embodiment, nonces are constructed to be unique within a particular time period; in a multi-tenant platform (where the teachings hereof are provided as a service to customers), a nonce can be constructed to be unique to a tenant. More details about nonce construction will be provided later in this document.

Preferably, a nonce is disseminated by incorporating it into some aspect of network traffic. For example, a nonce can be placed in a network identifier such as an IP address or domain name label. Such nonce-laden network identifiers are referred to in this document as “ephemeral identifiers” or equivalently as “short lived identifiers”, due to the aforementioned limited re-use (or no re-use) of a given nonce. As mentioned above, the form of a nonce is appropriate to its context, e.g., a nonce might be a 64-bit suffix in an IPv6 address, but might be a string of alphanumeric and other permissible characters in a domain name.

Given the great variety of network identifiers, protocols, and message types, there are a wide variety of ways to disseminate nonces. In TLS encrypted traffic, for example, nonces can be embedded in identifiers such as IP addresses or hostnames, or in the TLS server name indication (SNI) field. Nonces also can be embedded in encrypted fields (e.g., to assess whether an eavesdropper has managed to obtain the nonce via decryption of the message). In clear text use cases, nonce-laden identifiers might be inserted into URLs, the headers or bodies of HTTP messages, or into any content in an application layer message, including in markup language (e.g., HTML) documents, Javascripts, JSON data, hidden or non-operational content (like comments in HTML or scripts), or the like.

Nonces can also be disseminated by incorporating them into aspects of network traffic other than network identifiers. For example, a nonce could be inserted into an unused transport layer, network layer, or other protocol fields. The teachings hereof prefer incorporation of a nonce into a network identifier, as this is particularly useful, but the teachings are not limited to this approach.

A nonce-laden identifier (the “ephemeral identifier”) is preferably disseminated for a limited period of time by the CDN or other platform. It may be disseminated just once (in one packet), or for the duration of one transaction (a set of related packets), or for some fixed time such as an hour, or the duration that a service is made live on a given address. Then, the ephemeral network identifiers are not disseminated again for some longer window of time (e.g., a year or “forever”), while the platform “waits” and listens for those ephemeral identifiers, ostensibly propagated by an eavesdropper.

The nonce may “return” to the platform because an eavesdropper observes a nonce in an ephemeral identifier and decides to actively probe and/or query that identifier—or more specifically, a network endpoint associated therewith. While nonces may not correspond to real hosts or services, an eavesdropper will not know that. As will be apparent from the discussion above, the nonces can be embedded in traffic in such a way that eavesdropper nonce probes are likely to be directed to the platform. The transmission of a nonce by an eavesdropper—and indeed anyone other than the disseminating entity—is referred to herein as “propagating” the nonce. Propagation includes, without limitation, probing or querying an ephemeral identifier.

The dissemination of a nonce by the platform is stored with “nonce metadata” reflecting circumstances under which the nonce was disseminated. For example, a log might include the nonce, the ephemeral identifier, the network device and/or the service that sent the nonce, and/or the destination address to which the nonce was sent. A log could also contain additional information collected at the time of nonce dissemination, such as the results of a traceroute to the destination IP address, or the results of other tests.

Information about an eavesdropper's probe is captured and (similarly) logged with nonce metadata regarding those circumstances. Correlating the circumstances under which the nonce was disseminated and under which it was observed to “propagate”, a set of intelligence about who is eavesdropping on what portions of the Internet can be derived. Because of the limited-time dissemination of a given nonce, it can be established with a high degree of confidence that an eavesdropper possessing a given nonce must have obtained it from listening in on the prior dissemination of that given nonce.

Preferably, a platform detects propagation of not only the ephemeral identifier(s) that were disseminated but also related ones. For instance, if the platform disseminates the nonce-laden ephemeral identifier 2001:db8::dead:beef as source address (where 0xdeadbeef is a 64-bit nonce and the preceding portion is dictated by the context, i.e., IPv6 address), then platform devices can listen for that ephemeral identifier in various forms:

-   -   (1) as an IPv6 destination address (binary 128-bit network         ordered number)     -   (2) as a series of DNS labels in a query or answer, e.g.,         “f.e.e.b.d.a.e.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa”     -   (3) as a text string, i.e., “2001:db8::dead:beef,” in a database         or log, e.g., google search, Passive DNS, etc.

In the latter two cases, one can detect the presence of the ephemeral identifier and/or its nonce in identifiers of other form.

Collected intelligence on eavesdroppers can be put to a variety of uses. One example is to avoid placing cleartext or non-obfuscated data into fields for which eavesdropping was detected. In another embodiment, the intelligence can be used to route traffic around the network infrastructure of eavesdroppers, or to encapsulate (e.g., as an encrypted payload) traffic that must flow through eavesdropper plagued network links. In yet another embodiment, the intelligence can be used to determine a reputation for eavesdropper equipment, e.g., their hosts or networks—and treat traffic involving them differently when interacting with real (not nonce-laden) services. Such different treatments may involve denying or rate-limiting access if terms of service disallow eavesdropping as an invasion of privacy.

With the foregoing by way of overview, detailed examples are provided below.

It is noted that the notion of a ‘platform’ here is broad and not limited to CDNs. The techniques herein can be advantageously applied by large platforms such as ISPs, CDNs and overlay networks and the like. Due to their pervasive scale, applying the techniques hereof is easier as a practical matter. However, smaller entities can still benefit from the teachings hereof. An individual website operator, for example, could introduce nonces in certain traffic and then observe if and how those nonces were observed returning in messages directed to their network deployments.

Example of Nonce Dissemination in DNS and WWW Traffic

As mentioned above, there are a variety of ways to introduce nonces into network traffic. FIG. 1 is an diagram showing the potential points for injection of nonces into a DNS query and answer process and a WWW client-server message exchange.

At the outset, it is notable that FIG. 1 illustrates several points at which an eavesdropper can glean information about the WWW client's 100 network activity. The traffic (represented by the arrows) typically travels over the ‘public’ Internet, traversing any number of networks and peering points and associated gateways, deep packet inspection devices, firewalls, routers, or other network devices. The traffic between the WWW client 100 and the recursive resolver 102 a is sometimes confined to the user's ISP or to a corporate LAN, but with public (open) DNS services becoming more popular, even this traffic is increasingly traveling over the public Internet.

An eavesdropper on one of the network links (which are indicated by the arrows in FIG. 1 ), or within the 102 a recursive DNS service, is able to see DNS queries and thus cleartext portions of those queries. They may be able to see the hostname that the user wants to resolve, the client's IP address or EDNS0 subnet, as well as the DNS responses and thus the IP address(es) associated with that hostname. An eavesdropper can also see the SNI field accompanying the HTTP request from the client 100 to the WWW host 104 and thus the hostname that the user is visiting, along with the IP address of the WWW host 104 in the destination IP address field.

With reference to FIG. 2 , assume, for example, that an entity controls the client 100, the authoritative DNS 102 b, and the WWW host 104. This is referred to generically as the “platform”. This is practical for many internet infrastructure providers, without limitation, including CDNs.

A hostname with a nonce embedded therein is configured in the platform. The nonce could be placed in any subdomain label(s) of the hostname or spanning subdomain labels, for example. In FIG. 2 , the example is given as <nonce1>.example.com, where the nonce is any set of characters permitted in DNS. This hostname is what was described before as the ephemeral identifier. A DNS query for this hostname will by normal operation of the domain name system come to the platform's authoritative server 102 b as authority for the example.com domain. Of course, the nonce could be placed in the fourth level domain name or any lower level name, alternatively. If the platform is a registrar, then it could even register a second level domain name with the nonce.

As shown in FIG. 2 , the client 100 resolves the nonce-carrying hostname by contacting its recursive DNS 102 a with a DNS query. The client 100 records the nonce that was sent and nonce metadata, e.g., information about the circumstances surrounding its dissemination, such as the date/time, recipient entity (IP address or other). In some embodiments, the client 100 can (at the time of using the nonce) perform certain network tests, such as a traceroute or reverse traceroute to the intended recipient. This information can also be recorded, as it indicates the network path that the client expects the nonce 100 to take.

The nonce-carrying hostname is received at DNS 102 a and a normal DNS resolution process occurs. The DNS query will come to the platform's authoritative DNS 102 b. The platform configures its authoritative DNS 102 b to respond to the nonce-carrying hostname with a nonce-carrying DNS response. This means that the DNS response carries an IP address unique to this DNS response. Preferably, an IPv6 address can contain a unique nonce in the IPv6 interface identifier. FIG. 2 illustrates this example as “IPv6: 2001:db8:ff9::<nonce2>”. This is another ephemeral identifier. (A nonce could be embedded in an IPv4 address, although the increasingly limited availability of IPv4 addresses makes this increasingly less preferred.)

As did the client 100, the authoritative DNS 102 b of the platform records nonce metadata for this nonce, including the date/time, recipient, the nonce-carrying hostname that was queried, results of network tests, etc.

The nonce-laden DNS response travels back to recursive DNS 102 a and to the client 100, which uses it to make, generate, and send a HTTP request for service to the WWW host 104, also controlled in this example by the platform. In the HTTP request, which is preferably encrypted using the well-known TLS protocol, the client 100 includes the nonce-laden hostname into the SNI field, meaning that the hostname will be carried in cleartext to the WWW host 104. Again, the client 100 records nonce metadata for this nonce.

As those skilled in the art will appreciate, there are a wide variety of different message fields and/or identifiers in which the platform can embed a nonce in the system of FIG. 2 for dissemination in the network. A non-exhaustive list of examples includes:

-   -   IP addresses     -   Domain name labels     -   IPv6 headers (destination service, source client)     -   TLS SNI     -   HTTP Host header     -   HTTP redir header     -   Peer-to-peer directories (e.g., Distributed Hash Tables)     -   DNS query names     -   DNS answers     -   ip6.arpa and in-addr.arpa reverse DNS queries or answers     -   URLs     -   HTML documents (e.g., HREF)     -   SMTP headers, e.g., received header host names or IP addresses

In some embodiments, the client 100 could make a non-encrypted HTTP request to the WWW host 104 so that the nonce-laden hostname is in the clear in the HTTP host header. In such a cleartext HTTP request, an additional nonce (not shown in FIG. 2 ) could be injected into another HTTP header (e.g., the user-agent) or an HTTP POST body; cleartext HTTP would also mean that the WWW host 104 could embed yet another nonce in the WWW response (e.g., as part of the HTTP headers, or in HTML markup).

Generalizing, any transport endpoint can be specified with an embedded nonce. Any of the foregoing examples of places to embed a nonce can be disseminated independently or in any desired combination.

Nonce Observation

The platform now waits for an eavesdropper to propagate the nonces that were disseminated in FIG. 2 . This is a matter of observing the logs on the platform's devices to find the nonce (or more specifically, the ephemeral identifier carrying the nonce). For example, a platform monitoring system can periodically search in the aggregated logs of the DNS 102 b, WWW host 104, and/or other platform devices and/or services.

Some places in which the nonce-laden hostname may appear include: a DNS request, a whois query. Some places in which the nonce-laden IP address of the host 104 may show up include: a reverse-DNS lookup, packets addressed to that IP address 104 received at the host, a ping or other network probe targeting that IP address. These are referred to herein as potential nonce observation endpoints. Generalizing, nonce observation endpoints include any and all places where a nonce-laden identifiers could be stored or propagated. Further examples of nonce observation endpoints include, without limitation: application and systems access logs, CDN logs, middleboxes (e.g., firewalls), databases (e.g., those sold by security firms to track activity or determine reputation of network actors over time), Internet search databases (e.g., Google search), social and messaging networks (e.g., those frequented by malicious actors that exchange or sell host and network information), packet traces (by other eavesdroppers), network element (e.g. router, proxies) configurations or caches, and end hosts that may have their security compromised and are storing or unusually reusing nonce-laden identifiers.

If and when the nonce is observed in the logs, the system matches the records about how and with whom the nonce was disseminated with the observations. Given the limited dissemination of a unique nonce, subsequent use (re-use) of the nonce can indicate that an eavesdropper was present on one or more of the network links on which the nonce was carried. Hence, because the nonce was disseminated only once, the entity who was observed to inquire about the nonce can be identified with high probability as being (i) an eavesdropper on one or more of those network links, or (ii) an entity who is receiving information (e.g., by data feed, contractual arrangement or otherwise) from such an eavesdropper.

Example of Nonce Dissemination in RUM Traffic

RUM refers to real user monitoring, which is a performance measurement technique that relies on an end user client (e.g., a browser) making certain performance measurements as it loads a web page and reporting those measurements back to the page owner or their designee for performance analysis. Today, RUM typically leverages the W3C's Navigation Timing and Resource Timing interfaces. Javascript code in a web page invokes these APIs to cause the browser to gather timestamps marking the occurrence of certain important processes, such as DNS lookups, download times, and rendering times, including browser events such as the page onLoad event. More information about RUM systems can be learned by consulting U.S. Pat. No. 9,736,258, the teachings of which are hereby incorporated by reference for all purposes.

FIGS. 3 and 4 illustrate how a CDN or other similarly situated platform can embed nonces in a RUM traffic flow. FIG. 3 shows a basic RUM system for a website that is being delivered by the proxy servers (e.g., 300) of a CDN on behalf of WWW host 304. The client 100 requests a web page (or more specifically, an HTML document defining the presentation layer of a web page) from the proxy 300. The proxy 300 retrieves the HTML document from an origin server (WWW host 304) in a well-known forward request operation. Before serving the document to the client 100, however, the proxy inserts a RUM script into the HTML, preferably as a Javascript object. The modified HTML is sent to the client 100, which loads the page, executes the Javascript, which causes it to send a beacon with the RUM performance information to a designated endpoint 302. The endpoint 302 will gather beacons from many clients and aggregate them into performance statistics suitable for visualization or other other reporting to the website owner.

FIG. 4 illustrates the same message flow but with nonces. In this case, the proxy 300 modifies the HTML document with the RUM script. The RUM script includes a hostname pointing to the beacon endpoint 302, e.g., <nonce4>.beaconhost.com, the ephemeral identifier. The client 100 will need to resolve this hostname and thus an eavesdropper may see it as part of name resolution in the DNS system. The client 100 can also put the nonce-laden beacon hostname in an SNI field when using the beacon to host 302; this is additional traffic that an eavesdropper may see. If acceptable, the proxy 300 to client 100 and client 100 to host 302 could be unencrypted, providing more opportunities to embed a nonce. For example, a nonce could be inserted into the HTML markup itself—e.g., in a comment, hidden link, or other field—for an eavesdropper to find. A nonce could be placed in the body of the unencrypted beacon, as well (i.e., the RUM script could direct the client to generate a beacon with a nonce therein).

As with prior examples, after nonce injection, the RUM platform owner waits to see if nonces are returned, as in subsequent use (re-use) or propagated, e.g., to a database or data feed. Nonces may be observed at any one of the nonce observation endpoints mentioned previously.

Example of Nonce Injection in Transport or Network Protocols

As mentioned previously, It is possible to insert nonces into any of a wide variety of fields defined in transport layer or network layer protocols. These may include (without limitation) fields that are otherwise designated as “future use” or “optional” in a protocol specification, or that are not meaningful in the context of the particular message being sent. A distributed platform with many Internet points of presence can insert, from time to time, nonces into network messages between its servers, in order to see if an eavesdropper picks them up. Examples of fields in which nonces could be carried include any of the fields identified earlier:

-   -   IP addresses     -   Domain name labels     -   IPv6 headers (destination service, source client)     -   TLS SNI     -   HTTP Host header     -   HTTP redir header     -   Peer-to-peer directories (e.g., Distributed Hash Tables)     -   DNS query names     -   DNS answers     -   ip6.arpa and in-addr.arpa reverse DNS queries or answers     -   URLs     -   HTML documents (e.g., HREF)     -   SMTP headers, e.g., received header host names or IP addresses

Nonce observation endpoints for this kind of nonce injection include any and all places where a nonce-laden identifier could be stored or propagated, and include any of the prior examples given for nonce observation endpoints. The nonce observation endpoint need not be tied to the same type of network message or application layer function in which the nonce was disseminated.

Privacy as a Service

A CDN or other platform can offer privacy as a service based on the intelligence gleaned from nonce dissemination and observation.

One example is an intelligence gathering service. A given CDN customer may opt to have nonces inserted into its traffic so as to detect and identify eavesdroppers on its traffic. This means that the CDN would configure its servers to place nonces into hostnames, IP addresses, RUM beacons or otherwise for traffic associated with that given customer. The CDN could do so insofar as it handles the HTTP traffic for the customer, or to the extent it handles the DNS traffic for the customer. The CDN would then provide reports to the customer indicating how its nonces had been injected (disseminated), and how the nonces had been observed to return (propagated) from eavesdroppers.

FIG. 5 is a modified version of FIG. 2 illustrating how the CDN can disseminate nonces into the customer's traffic. In FIG. 5 , the CDN provides the proxy 503 and DNS services (502 b) for the customer. The customer operates its origin server 504. The recursive DNS server 502 is operated by an ISP and the client 500 is an individual end user's client. In addition to those places identified earlier, FIG. 5 illustrates yet another place that a nonce can be injected; in the CNAME handed out by a DNS system controlled by the CDN.

A second example of privacy as a service is privacy enhanced routing. A CDN functions as an overlay network and utilizes many techniques to route traffic in improved ways over the Internet, as known in the art. A CDN can incorporate nonce-derived intelligence to affect this routing for customers. Assume that nonce intelligence shows that an eavesdropper is active on certain links on the Internet, or in certain networks, countries, or geographies. The CDN can use this information to route traffic on alternate paths around the eavesdroppers. The re-routed traffic may be any traffic that the CDN handles for the customer. Such re-routing can be accomplished by, among others things: (i) adjusting DNS answers to direct an end user client to a CDN proxy server that is not in path with an eavesdropper; (ii) encapsulating packets into the CDN's overlay network and routing them across the overlay and around the eavesdropper (for more background on overlays, see U.S. Pat. Nos. 7,660,296 and 6,820,133, the teachings of which are hereby incorporated by reference for all purposes), (iii) tunneling packets to a controlled endpoint across a network/geography/country with eavesdroppers, e.g., encrypting the customer packet as payload. This can be done using GRE or other known techniques.

A third example is to block or limit contact with the network links, hosts, or services identified as being associated with an eavesdropper. For example, a cloud-based web application firewall (see, U.S. Pat. No. 8,458,769, the contents of which are incorporated by reference herein) could be configured prevent end user clients from connecting to specific servers or cloud services that seem to indiscriminately collect and store or propagate, e.g., in a database, records of arbitrary connections, say beyond what is required by law.

Nonce Construction; Tamper Detection

A nonce can be constructed in wide variety of ways. Preferably, nonce construction is performed in accord with the principles and guidelines set forth below.

A random value can be used as appropriate for the field and/or message where the nonce will be disseminated. In one embodiment, construction of nonces is such that they are opaque to eavesdroppers and such that no pertinent information is clearly represented within them, e.g., pseudorandom or encoded in such a way that they are practically indifferentiable from random, i.e., unlikely to be predictable and thus unlikely to be disseminated by an actor other than an eavesdropper.

In a preferred embodiment, a nonce is constructed so as to be unique within a specified (user-configured) time period. Using this approach, it is difficult for actors (eavesdroppers or otherwise) to predict a nonce, even if that actor has knowledge of the algorithm/method employed to generate them or knowledge of nonces previously disseminated, i.e., the nonces are plausibly pseudo random or semantically opaque, e.g., constructed by encryption with a private key.

In some embodiments, certain information can be encoded into the nonce. For example, a nonce could be generated by hashing the information about the circumstances under which the nonce was disseminated into the network. This hash could be performed under a system wide private key, if desired. It is possible an eavesdropper could modify the nonce, particularly if trying to evade or investigate the nonce-observation system. The platform could maintain an independent record of what was encoded into the nonce, and by comparison with a nonce received from an eavesdropper, detect a mismatch and thereby detect the eavesdropper's tampering, or at least that the nonce represented bad data.

In addition, a nonce may be constructed using known hashing or other structured encoding techniques in a way that might entice an eavesdropper to alter or construct other examples, again enabling detection by their variation. In this way, the detection might, e.g., use pattern-based recognition of propagation or subsequent use. For example, one might disseminate the nonce-laden source IP address 2001:db8::feed:dead:beef:cafe then listen and subsequently receive a packet for the destination address 2001:db8::feed:dead:beef:caff, that is, the original address plus 1. As this value shares the structure of the original nonce-laden address, differing by one bit, it makes it likely that the latter propagated address was constructed with knowledge of the disseminated (nonce-laden) address and, thus, enables eavesdropping detection. Put another way, nonces can be constructed and analyzed to detect an eavesdropper's use of an algorithm that synthesizes addresses based on nonce-laden “seed” addresses.

Nonce Metadata with TTL Limited Nonces

Mentioned previously was the option that a platform device disseminating the nonce could perform network tests and record this information in nonce metadata. Such network tests can include traceroutes, reverse traceroutes, probes of various types.

In one embodiment, the nonce can be disseminated with limited lifetime, i.e., forwarding limited, packets so as to better identify an eavesdropper's location, and this fact can be recorded in nonce metadata. When disseminating a nonce-laden network message, a device can set the “time to live” (TTL, also known as “hop count”) of the IP packet to a particular value of interest. The TTL is recorded in the nonce metadata. This limits the number of “hops” that the IP packet will take, because routers decrement the TTL as they relay a packet and stop forwarding when it decrements to zero. In effect, controlling the TTL controls the number of devices that will have an opportunity to see the nonce in the network message. If and when the nonce (used only in the limited lifetime packets) is observed to return to the system, it is known that the eavesdropper is within a certain hop count of the disseminating device. Performing this kind of analysis from multiple points on the Internet and receiving nonces from the same eavesdropper (and thus establishing network hop counts from multiple points) may allow one to uniquely identify an eavesdropper's network location.

Content Delivery Networks

As the teachings hereof can be applied in the context of a CDN, a general overview of CDN components and operation is now provided.

A CDN is a distributed computer system and it can be (but does not have to be) operated and managed by a service provider. A “distributed system” of this type typically refers to a collection of autonomous computers linked by a network or networks, together with the software, systems, protocols and techniques designed to facilitate various services, such as content delivery or the support of site infrastructure. The infrastructure can be shared by multiple tenants, typically referred to as the content providers. The infrastructure is generally used for the storage, caching, or transmission of content—such as web pages, streaming media and applications—on behalf of such content providers or other tenants. The platform may also provide ancillary technologies used therewith including, without limitation, DNS query handling, provisioning, data monitoring and reporting, content targeting, personalization, and business intelligence. The CDN processes may be located at nodes that are publicly-routable on the Internet, within or adjacent to nodes that are located in mobile networks, in or adjacent to enterprise-based private networks, or in any combination thereof.

In a known system such as that shown in FIG. 6 , a distributed computer system 600 is configured as a content delivery network (CDN) and is assumed to have a set of machines 602 distributed around the Internet. The machines 602 are servers can be reverse proxy servers and can be the proxy servers 300, 503 shown in FIGS. 3, 4, 5 .

A network operations command center (NOCC) 604 may be used to administer and manage operations of the various machines in the system. Third party sites affiliated with content providers, such as web site 606, offload delivery of content (e.g., HTML or other markup language files, embedded page objects, streaming media, software downloads, and the like) to the distributed computer system 600 and, in particular, to the servers 602 (which are sometimes referred to as content servers, or sometimes as “edge” servers in light of the possibility that they are near an “edge” of the Internet). Such servers may be grouped together into a point of presence (POP) 607.

Typically, content providers offload their content delivery by aliasing (e.g., by a DNS CNAME) given content provider domains or sub-domains to domains that are managed by the service provider's authoritative domain name service. End user client machines 622 that desire such content may be directed to the distributed computer system to obtain that content more reliably and efficiently. The CDN servers respond to the client requests, for example by obtaining requested content from a local cache, from another CDN server, from the origin server 106, or other source.

Although not shown in detail in FIG. 6 , the distributed computer system may also include other infrastructure, such as a distributed data collection system 608 that collects usage and other data from the CDN servers, aggregates that data across a region or set of regions, and passes that data to other back-end systems 610, 612, 614 and 616 to facilitate monitoring, logging, alerts, billing, management and other operational and administrative functions. Distributed network agents 618 monitor the network as well as the server loads and provide network, traffic and load data to a DNS query handling mechanism 615, which is authoritative for content domains being managed by the CDN. A distributed data transport mechanism 520 may be used to distribute control information (e.g., metadata to manage content, to facilitate load balancing, and the like) to the CDN servers.

A given server in the CDN comprises commodity hardware (e.g., a microprocessor) running an operating system kernel (such as Linux® or variant) that supports one or more applications. To facilitate content delivery services, for example, given machines typically run a set of applications, such as an HTTP proxy, a name server, a local monitoring process, a distributed data collection process, and the like. The HTTP proxy (sometimes referred to herein as a global host or “ghost”) typically includes a manager process for managing a cache and delivery of content from the machine. For streaming media, the machine typically includes one or more media servers, as required by the supported media formats.

A given CDN server 602 may be configured to provide one or more extended content delivery features, preferably on a domain-specific, content-provider-specific basis, preferably using configuration files that are distributed to the CDN servers using a configuration system. A given configuration file preferably is XML-based and includes a set of content handling rules and directives that facilitate one or more advanced content handling features. The configuration file may be delivered to the CDN server via the data transport mechanism. U.S. Pat. No. 7,240,100, the contents of which are hereby incorporated by reference, describe a useful infrastructure for delivering and managing CDN server content control information and this and other control information (sometimes referred to as “metadata”) can be provisioned by the CDN service provider itself, or (via an extranet or the like) the content provider customer who operates the origin server. U.S. Pat. No. 7,111,057, incorporated herein by reference, describes an architecture for purging content from the CDN.

In a typical operation, a content provider identifies a content provider domain or sub-domain that it desires to have served by the CDN. The CDN service provider associates (e.g., via a canonical name, or CNAME, or other aliasing technique) the content provider domain with a CDN hostname, and the CDN provider then provides that CDN hostname to the content provider. When a DNS query to the content provider domain or sub-domain is received at the content provider's domain name servers, those servers respond by returning the CDN hostname. That network hostname points to the CDN, and that hostname is then resolved through the CDN name service. To that end, the CDN name service returns one or more IP addresses. The requesting client application (e.g., browser) then makes a content request (e.g., via HTTP or HTTPS) to a CDN server associated with the IP address. The request includes a Host header that includes the original content provider domain or sub-domain. Upon receipt of the request with the Host header, the CDN server checks its configuration file to determine whether the content domain or sub-domain requested is actually being handled by the CDN. If so, the CDN server applies its content handling rules and directives for that domain or sub-domain as specified in the configuration. These content handling rules and directives may be located within an XML-based “metadata” configuration file, as described previously. Thus, the domain name or subdomain name in the request is bound to (associated with) a particular configuration file, which contains the rules, settings, etc., that the CDN server should use for that request.

As an overlay, the CDN resources may be used to facilitate wide area network (WAN) acceleration services between enterprise data centers (which may be privately managed) and to/from third party software-as-a-service (SaaS) providers.

CDN customers may subscribe to a “behind the firewall” managed service product to accelerate Intranet web applications that are hosted behind the customer's enterprise firewall, as well as to accelerate web applications that bridge between their users behind the firewall to an application hosted in the internet cloud (e.g., from a SaaS provider). To accomplish these two use cases, CDN software may execute on machines (potentially in virtual machines running on customer hardware) hosted in one or more customer data centers, and on machines hosted in remote “branch offices.” The CDN software executing in the customer data center typically provides service configuration, service management, service reporting, remote management access, customer SSL certificate management, as well as other functions for configured web applications. The software executing in the branch offices provides last mile web acceleration for users located there. The CDN itself typically provides CDN hardware hosted in CDN data centers to provide a gateway between the nodes running behind the customer firewall and the CDN service provider's other infrastructure (e.g., network and operations facilities). This type of managed solution provides an enterprise with the opportunity to take advantage of CDN technologies with respect to their company's intranet, providing a wide-area-network optimization solution. This kind of solution extends acceleration for the enterprise to applications served anywhere on the Internet. By bridging an enterprise's CDN-based private overlay network with the existing CDN public internet overlay network, an end user at a remote branch office obtains an accelerated application end-to-end.

The CDN may have a variety of other features and adjunct components. For example the CDN may include a network storage subsystem (sometimes referred to herein as “NetStorage”) which may be located in a network datacenter accessible to the CDN servers, such as described in U.S. Pat. No. 7,472,178, the disclosure of which is incorporated herein by reference. The CDN may operate a server cache hierarchy to provide intermediate caching of customer content; one such cache hierarchy subsystem is described in U.S. Pat. No. 7,376,716, the disclosure of which is incorporated herein by reference. Communications between CDN servers and/or across the overlay may be enhanced or improved using techniques such as described in U.S. Pat. Nos. 6,820,133, 7,274,658, 7,660,296, the disclosures of which are incorporated herein by reference.

For live streaming delivery, the CDN may include a live delivery subsystem, such as described in U.S. Pat. No. 7,296,082, and U.S. Publication No. 2011/0173345, the disclosures of which are incorporated herein by reference.

Computer Based Implementation

The teachings hereof may be implemented using conventional computer systems, but modified by the teachings hereof, with the functional characteristics described above realized in special-purpose hardware, general-purpose hardware configured by software stored therein for special purposes, or a combination thereof.

Software may include one or several discrete programs. Any given function may comprise part of any given module, process, execution thread, or other such programming construct. Generalizing, each function described above may be implemented as computer code, namely, as a set of computer instructions, executable in one or more microprocessors to provide a special purpose machine. The code may be executed using an apparatus—such as a microprocessor in a computer, digital data processing device, or other computing apparatus—as modified by the teachings hereof. In one embodiment, such software may be implemented in a programming language that runs in conjunction with a proxy on a standard Intel hardware platform running an operating system such as Linux. The functionality may be built into the proxy code, or it may be executed as an adjunct to that code.

While in some cases above a particular order of operations performed by certain embodiments is set forth, it should be understood that such order is exemplary and that they may be performed in a different order, combined, or the like. Moreover, some of the functions may be combined or shared in given instructions, program sequences, code portions, and the like. References in the specification to a given embodiment indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic.

FIG. 7 is a block diagram that illustrates hardware in a computer system 700 upon which such software may run in order to implement embodiments of the invention. The computer system 700 may be embodied in a client device, server, personal computer, workstation, tablet computer, mobile or wireless device such as a smartphone, network device, router, hub, gateway, or other device. Representative machines on which the subject matter herein is provided may be Intel-processor based computers running a Linux or Linux-variant operating system and one or more applications to carry out the described functionality.

Computer system 700 includes a microprocessor 704 coupled to bus 701. In some systems, multiple processor and/or processor cores may be employed. Computer system 700 further includes a main memory 710, such as a random access memory (RAM) or other storage device, coupled to the bus 701 for storing information and instructions to be executed by processor 704. A read only memory (ROM) 708 is coupled to the bus 701 for storing information and instructions for processor 704. A non-volatile storage device 706, such as a magnetic disk, solid state memory (e.g., flash memory), or optical disk, is provided and coupled to bus 701 for storing information and instructions. Other application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs) or circuitry may be included in the computer system 700 to perform functions described herein.

A peripheral interface 712 communicatively couples computer system 700 to a user display 714 that displays the output of software executing on the computer system, and an input device 715 (e.g., a keyboard, mouse, trackpad, touchscreen) that communicates user input and instructions to the computer system 700. The peripheral interface 712 may include interface circuitry, control and/or level-shifting logic for local buses such as RS-485, Universal Serial Bus (USB), IEEE 1394, or other communication links.

Computer system 700 is coupled to a communication interface 716 that provides a link (e.g., at a physical layer, data link layer,) between the system bus 701 and an external communication link. The communication interface 716 provides a network link 718. The communication interface 716 may represent a Ethernet or other network interface card (NIC), a wireless interface, modem, an optical interface, or other kind of input/output interface.

Network link 718 provides data communication through one or more networks to other devices. Such devices include other computer systems that are part of a local area network (LAN) 726. Furthermore, the network link 718 provides a link, via an internet service provider (ISP) 720, to the Internet 722. In turn, the Internet 722 may provide a link to other computing systems such as a remote server 730 and/or a remote client 731. Network link 718 and such networks may transmit data using packet-switched, circuit-switched, or other data-transmission approaches.

In operation, the computer system 700 may implement the functionality described herein as a result of the processor executing code. Such code may be read from or stored on a non-transitory computer-readable medium, such as memory 710, ROM 708, or storage device 706. Other forms of non-transitory computer-readable media include disks, tapes, magnetic media, CD-ROMs, optical media, RAM, PROM, EPROM, and EEPROM. Any other non-transitory computer-readable medium may be employed. Executing code may also be read from network link 718 (e.g., following storage in an interface buffer, local memory, or other circuitry).

It should be understood that the foregoing has presented certain embodiments of the invention that should not be construed as limiting. For example, certain language, syntax, and instructions have been presented above for illustrative purposes, and they should not be construed as limiting. It is contemplated that those skilled in the art will recognize other possible implementations in view of this disclosure and in accordance with its scope and spirit. The appended claims define the subject matter for which protection is sought.

It is noted that trademarks appearing herein are the property of their respective owners and used for identification and descriptive purposes only, given the nature of the subject matter at issue, and not to imply endorsement or affiliation in any way. 

The invention claimed is:
 1. A method, comprising: modifying an outbound network message, at least by: generating a nonce, and, inserting the nonce into a network identifier in the outbound network message; sending the modified outbound network message to a first device, via one or more network links; recording information about the sending of the modified outbound network message in a nonce record; subsequent to the sending of the modified outbound network message, receiving an inbound network message from a second device, the inbound network message comprising at least one of: (i) a query about the network identifier with the nonce, and (ii) a probe about the network identifier with the nonce; recording information about the inbound network message in a log entry; and, determining, based at least in part on the nonce record and the log entry, that the second device is associated with an eavesdropper on at least one of: (a) the one or more network links over which the modified outbound network message was sent to the first device, and (b) the first device.
 2. The method of claim 1, further comprising: sending the modified outbound network message to the first device from a server, responsive to a client request for a service.
 3. The method of claim 1, wherein the network identifier comprises at least one of: an IP address and a hostname.
 4. The method of claim 1, wherein the generation of the nonce comprises: generating any of a random and a pseudo-random value to include in the nonce.
 5. The method of claim 1, wherein: the modified outbound network message is sent from a first system providing a first service to clients; and, the receiving of the inbound network message from the second device occurs at a second system providing a second service to clients.
 6. The method of claim 1, the first device comprising any of a first client and a first server, and the second device comprising any of a second client and a second server.
 7. A system comprising circuitry forming at least one processor and memory holding computer program instructions for execution on the at least one processor to cause the system to: modify an outbound network message, at least by: generating a nonce, and, inserting the nonce into a network identifier in the outbound network message; send the modified outbound network message to a first device, via one or more network links; record information about the sending of the modified outbound network message in a nonce record; subsequent to the sending of the modified outbound network message, receive an inbound network message from a second device, the inbound network message comprising at least one of: (i) a query about the network identifier with the nonce, and (ii) a probe about the network identifier with the nonce; record information about the inbound network message in a log entry; and, determine, based at least in part on the nonce record and the log entry, that the second device is associated with an eavesdropper on at least one of: (a) the one or more network links over which the modified outbound network message was sent to the first device, and (b) the first device.
 8. The system of claim 7, the computer program instructions for execution on the at least one processor to further including instructions to cause the system to: send the modified outbound network message to the first device from a server, responsive to a client request for a service.
 9. The system of claim 7, wherein the network identifier comprises at least one of: an IP address and a hostname.
 10. The system of claim 7, wherein the generation of the nonce comprises: generating any of a random and a pseudo-random value to include in the nonce.
 11. The system of claim 7, wherein: the modified outbound network message is sent from a first server providing a first service to clients; and, the receiving of the inbound network message from the second device occurs at a second server providing a second service to clients.
 12. The system of claim 7, the first device comprising any of a first client and a first server, and the second device comprising any of a second client and a second server.
 13. A non-transitory computer readable medium holding computer program instructions for execution on one or more processors to operate one or more computers, the computer program instructions including instructions to: modify an outbound network message, at least by: generating a nonce, and, inserting the nonce into a network identifier in the outbound network message; send the modified outbound network message to a first device, via one or more network links; record information about the sending of the modified outbound network message in a nonce record; subsequent to the sending of the modified outbound network message, receive an inbound network message from a second device, the inbound network message comprising at least one of: (i) a query about the network identifier with the nonce, and (ii) a probe about the network identifier with the nonce; record information about the inbound network message in a log entry; and, determine, based at least in part on the nonce record and the log entry, that the second device is associated with an eavesdropper on at least one of: (a) the one or more network links over which the modified outbound network message was sent to the first device, and (b) the first device.
 14. The non-transitory computer-readable medium of claim 13, the computer program instructions further including instructions to: send the modified outbound network message to the first device from a server, responsive to a client request for a service.
 15. The non-transitory computer-readable medium of claim 13, wherein the network identifier comprises at least one of: an IP address and a hostname.
 16. The non-transitory computer-readable medium of claim 13, wherein the generation of the nonce comprises: generating any of a random and a pseudo-random value to include in the nonce.
 17. The non-transitory computer-readable medium of claim 13, wherein: the modified outbound network message is sent from a first server providing a first service to clients; and, the receiving of the inbound network message from the second device occurs at a second server providing a second service to clients.
 18. The non-transitory computer-readable medium of claim 13, the first device comprising any of a first client and a first server, and the second device comprising any of a second client and a second server.
 19. A method, comprising: modifying an outbound network message, at least by: generating a nonce, and, inserting the nonce into a portion of the outbound network message; sending the modified outbound network message to a first device, via one or more network links; recording information about the sending of the modified outbound network message in a nonce record; subsequent to the sending of the modified outbound network message, receiving an inbound network message from a second device, the inbound network message comprising at least one of: (i) a query about the portion with the nonce, and (ii) a probe about the portion with the nonce; recording information about the inbound network message in a log entry; and, determining, based at least in part on the nonce record and the log entry, that the second device is associated with an eavesdropper on at least one of: (a) the one or more network links over which the modified outbound network message was sent to the first device, and (b) the first device; wherein the portion of the outbound network message with the nonce is at least one of: an otherwise unused field in a transport layer protocol, an otherwise unused field in a network layer protocol.
 20. A system comprising circuitry forming at least one processor and memory holding computer program instructions for execution on the at least one processor to cause the system to: modify an outbound network message, at least by: generating a nonce, and, inserting the nonce into a portion of the outbound network message; send the modified outbound network message to a first device, via one or more network links; record information about the sending of the modified outbound network message in a nonce record; subsequent to the sending of the modified outbound network message, receive an inbound network message from a second device, the inbound network message comprising at least one of: (i) a query about the portion with the nonce, and (ii) a probe about the portion with the nonce; record information about the inbound network message in a log entry; and, determine, based at least in part on the nonce record and the log entry, that the second device is associated with an eavesdropper on at least one of: (a) the one or more network links over which the modified outbound network message was sent to the first device, and (b) the first device; wherein the portion of the outbound network message with the nonce is at least one of: an otherwise unused field in a transport layer protocol, an otherwise unused field in a network layer protocol.
 21. A non-transitory computer readable medium holding computer program instructions for execution on one or more processors to operate one or more computers, the computer program instructions including instructions to: modify an outbound network message, at least by: generating a nonce, and, inserting the nonce into a portion of the outbound network message; send the modified outbound network message to a first device, via one or more network links; record information about the sending of the modified outbound network message in a nonce record; subsequent to the sending of the modified outbound network message, receive an inbound network message from a second device, the inbound network message comprising at least one of: (i) a query about the portion with the nonce, and (ii) a probe about the portion with the nonce; record information about the inbound network message in a log entry; and, determine, based at least in part on the nonce record and the log entry, that the second device is associated with an eavesdropper on at least one of: (a) the one or more network links over which the modified outbound network message was sent to the first device, and (b) the first device; wherein the portion of the outbound network message with the nonce is at least one of: an otherwise unused field in a transport layer protocol, an otherwise unused field in a network layer protocol. 