{"id":108,"date":"2001-12-02T19:43:00","date_gmt":"2001-12-03T03:43:00","guid":{"rendered":"http:\/\/www.netjeff.com\/wp\/?p=108"},"modified":"2007-12-30T22:49:19","modified_gmt":"2007-12-31T06:49:19","slug":"sneaky-calculations-aka-parasitic-computing","status":"publish","type":"post","link":"https:\/\/www.netjeff.com\/wp\/?p=108","title":{"rendered":"Sneaky calculations (aka Parasitic Computing)"},"content":{"rendered":"<p>The short version: Some computer scientists have found a way to get web servers to do calculations  based on the error detection features of the TCP\/IP protocol.  There's  no need to hack the web server or take advantage of some kind of bug or misconfiguration  in the server.  Simply because of the way the TCP\/IP protocol works,  the web server's error detection calculations will give a client information  about a problem the client is trying to solve.<\/p>\n<p>You can read the <a href=\"http:\/\/www.sciencenews.org\/20011117\/bob18.asp\"> full article<\/a> in the  17 Nov 2001 issue of Science News.  Below is an edited\/condensed version of the article.  The full article also has as short description of how the TCP protocol does error detection.<\/p>\n<p><!--more--><\/p>\n<hr align=\"center\" width=\"30%\" \/>Physicists Albert-L\u00c3\u00a1szl\u00c3\u00b3 Barab\u00c3\u00a1si and Hawoong Jeong   and computer scientists Jay B. Brockman and Vincent W. Freeh of the University   of Notre Dame in Indiana describe their scheme in the Aug. 30 <em>Nature<\/em>  . They call it parasitic computing. \"The target computers are unaware that   they have performed computation for the benefit of a commanding node,\" the   researchers remark.The fact that the target computers are unwitting participants in a computation  differentiates this scheme from other efforts to use the processing power  of thousands of computers distributed throughout the world for massive data  crunching. In the SETI@home project, for instance, users must install special  software that enables their computers, when otherwise idle, to download  and scan data from radiotelescopes for signals that might point to the existence  of extraterrestrial life.\"If parasitic computing imitates nature by not killing the parasite's  host, it could be an interesting technology,\" Bauer observes. However, like  parasitism in biology, parasitic computing can have deleterious effects.  It could slightly slow a co-opted computer, but on a larger scale, it might  clog or even bring down the Internet.When a computer [like a web server] receives a packet of information, it  checks for errors by performing a calculation and comparing the result with  the numerical value in the packet's header (see \"How TCP error detection   works,\" at the end of the <a href=\"http:\/\/www.sciencenews.org\/20011117\/bob18.asp\">  original article<\/a>). Such a calculation would detect, for example, the   change of one bit from 0 to 1 or 1 to 0. Packets found to be corrupted are   discarded. In that case, the interrogating [client] computer receives  nothing   [back from the server] and eventually displays, \"The server is not responding\"   or something similar.To obtain \"experimental evidence of the principle of parasitic computing,\"  Barab\u00c3\u00a1si and his colleagues embedded potential solutions to a particular  mathematical question (see \"Getting satisfaction,\" at the end of the <a href=\"http:\/\/www.sciencenews.org\/20011117\/bob18.asp\">  original article<\/a>) in Web request messages sent from their own computers.   When other computers [running HTTP servers] linked to the Internet received   the messages and put them through the standard TCP error-detecting routine,   they also incidentally relayed information about the validity of the embedded   answers [back to the client computer].If a message incorporated a correct answer, it survived the target [web   server's] computer's error check, and the target computer replied to the interrogating  [client] computer. Otherwise, the target computer dropped the message and  sent nothing back to the interrogator. Hence, each reply would signal a  correct solution [to the client].<\/p>\n<p>\"Parasitic computing does not compromise the security of the targeted  servers,\" the researchers insist. It \"accesses only those parts of the servers  that have been made explicitly available for Internet communication.\"<\/p>\n<p>The example chosen and implemented by Barab\u00c3\u00a1si and his collaborators  in their parasitic computing experiments poses no threat. Their primary  goal was simply to prove the idea that the communications protocol of the  Internet could be used to carry out computations. Indeed, the mathematical  problem they used as a test for parasitic computing could have been solved  much more practically and in less time on a desktop computer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The short version: Some computer scientists have found a way to get web servers to do calculations based on the error detection features of the TCP\/IP protocol. There's no need to hack the web server or take advantage of some kind of bug or misconfiguration <a class=\"more-link\" href=\"https:\/\/www.netjeff.com\/wp\/?p=108\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-108","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=108"}],"version-history":[{"count":0,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/108\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.netjeff.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}