Censor-free Publishing Topics in Computer Security - - PowerPoint PPT Presentation

censor free publishing
SMART_READER_LITE
LIVE PREVIEW

Censor-free Publishing Topics in Computer Security - - PowerPoint PPT Presentation

Censor-free Publishing Topics in Computer Security philipp.winter@kau.se Apr 26, 2012 Introduction to Censorship Freedom of Opinion and Expression The Universal Declaration of Human Rights states in Article 19 : Everyone has the right to


slide-1
SLIDE 1

Censor-free Publishing

Topics in Computer Security philipp.winter@kau.se Apr 26, 2012

slide-2
SLIDE 2

Introduction to Censorship

slide-3
SLIDE 3

Freedom of Opinion and Expression

The Universal Declaration of Human Rights states in Article 19 : Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

slide-4
SLIDE 4

The Internet and Censorship

John Gilmore, one of the founders of the EFF and the cypherpunks mailing list: The Net interprets censorship as damage and routes around it.

slide-5
SLIDE 5

State of the Art

Many countries conduct pervasive political and social Internet censorship: http://map.opennet.net/

slide-6
SLIDE 6

Different Forms of Censorship

◮ Technical

◮ IP blacklisting ◮ DNS blacklisting ◮ Deep packet inspection ◮ Search engine manipulation

◮ Social

◮ Threatening ◮ Self-censorship (Panopticon effect) ◮ Censorship by law

slide-7
SLIDE 7

Technical Forms of Censorship

◮ IP blocks/Port blocks

◮ E.g.: Tor directory authorities in China ◮ Usually unflexible and easy to circumvent

◮ DNS blacklisting

◮ Effective for majority of users ◮ For more knowledgeable users trivial to circumvent

◮ Deep packet inspection (DPI) & dynamic blocking

◮ Flexible and precise but expensive ◮ Circumvention becomes harder ◮ State of the art

◮ Search engine manipulation

◮ Search engines in China conduct self-censorship ◮ Aggressive filtering for pornography ◮ Cf. “An Analysis of Chinese Search Engine Filtering” by Zhu

et al.

slide-8
SLIDE 8

Tor Bridges

slide-9
SLIDE 9

From Anonymity to Censorship

◮ Tor was originally designed as an anonymity network only ◮ However, it is frequently used as a censorship

circumvention tool

◮ “I don’t care about anonymity as long as I can access

facebook!”

◮ Problem: Tor is very easy to block for censors

slide-10
SLIDE 10

Presentations on Tor and Censorship

28C3 : How governments have tried to block Tor 26C3 : Tor and censorship: lessons learned

slide-11
SLIDE 11

The Birth of Bridges

◮ Back in 2006 : Design for a blocking-resistant anonymity

system: The birth of bridges

◮ Bridges are simply relays which are not listed in the public

consensus

◮ Censored users can use them as an “undocumented entrance”

to the Tor network

◮ At the moment: ∼60.000 daily bridge users (almost 10.000

  • nly from Syria)
slide-12
SLIDE 12

How it Works

◮ Volunteers configure bridges which report their existance to

the central BridgeDB

◮ From there, bridges are distributed to censored users

◮ Via HTTP: https://bridges.torproject.org ◮ Via E-mail: bridges@torproject.org ◮ Via (physical) social networks

◮ Fundamental problem : Bridges can not be distributed to

users without the censor learning about them, too

◮ “Solution”: Make it easy to get a few bridges but hard to get

many of them

slide-13
SLIDE 13
slide-14
SLIDE 14

Strategies to Block Bridges

◮ Obtain bridges over the official distribution channels and

block them

◮ Dynamically identify Tor usage in network traffic and block

suspected bridge

◮ Both attacks quite feasible for country-level adversary

slide-15
SLIDE 15

Obtaining Bridge Addresses and Blocking Them

◮ Demonstrated by Ling et al. ◮ Getting bridges via e-mail

◮ Semi-automatically create hundreds of e-mail accounts at

Gmail and/or Yahoo

◮ Getting bridges via HTTPS

◮ Use Tor exit nodes and PlanetLab to have enough unique IP

addresses

◮ Getting bridges via Tor middle relays

◮ Bridges connect to middle relays as their first hop (bridge →

middle relay→ exit relay)

slide-16
SLIDE 16

China: Dynamically Blocking Tor

◮ Chinese DPI boxes look for the unique TLS cipher list sent

inside the TLS client hello

◮ If detected:

active scan of (i.e. speak Tor to) suspected bridge is triggered

◮ If suspected bridge answers in Torish:

blocked

◮ Highly effective because bridges can be blocked dynamically

slide-17
SLIDE 17

Tor user Tor bridge

Scanners

DPI box

1 2 3

slide-18
SLIDE 18

Details about Chinese Tor Block

◮ Apparently only egress traffic subject to Tor DPI ◮ Great Firewall of China does not seem to conduct TCP

stream reassembly

◮ → packet fragmentation successfully evades DPI boxes for

now

slide-19
SLIDE 19

Server-side fragmentation

slide-20
SLIDE 20

Evading DPI: Obfsproxy & Pluggable Transport

slide-21
SLIDE 21
  • bfsproxy

Tor bridge

  • bfsproxy

?

Tor client

slide-22
SLIDE 22

What it does

◮ Implements pluggable transport ◮ Allows the creation of modules to obfuscate traffic between

  • bfsproxy client and server

◮ Deployed shortly before Iranian elections ◮ Can be used with other software as well

slide-23
SLIDE 23

The Current Situation

◮ Main purpose : Evading DPI boxes ◮ Arms race might shift back to discovering bridges over the

  • fficial distribution channels

◮ In China : The few hard-coded obfsproxy bridges are already

blocked, private bridges work

slide-24
SLIDE 24

Telex: Circumvention in the Backbone

slide-25
SLIDE 25

How it Works

◮ Main idea : Let backbone routers “hijack” marked network

connections

◮ Censored users install Telex on their machines ◮ They seemingly surf to https://www.notcensored.org and

embed a steganographic token inside their connection

◮ Backbone routers recognize token, decrypt HTTPS session

and hijack connection

◮ Censor-boxes inside the country don’t know that the traffic

is being hijacked

◮ URL with illustrations and research paper: https://telex.cc/

slide-26
SLIDE 26

How it Works

◮ Very messy (breaks with end-to-end principle), yet

effective concept

◮ Requires cooperation with backbone network providers :-( ◮ So far : In early alpha state ◮ Very similar concepts proposed at the same time:

Cirripede (CCS’11) and decoy routing (FOCI’11)

slide-27
SLIDE 27

AS-Level Structure and Censorship

slide-28
SLIDE 28

Censorship on the AS-Level

◮ Every country manages a set of Autonomous Systems

(ASes)

◮ Internet basically: Connected ASes + BGP for routing ◮ Also: ASes choke point for censorship ◮ “Mapping Local Internet Control” by Roberts et al. ◮ Observation : Countries with centralized AS structure have

more censorship than countries with rather decentralized AS-level structure

slide-29
SLIDE 29

The Data Set

http://cyber.law.harvard.edu/netmaps/geo map home.php

slide-30
SLIDE 30

Censorship Circumvention in Practice

slide-31
SLIDE 31

Many Unsafe Tools Used

◮ Activists and journalists mostly don’t have expertise and/or

time to “get it right”

◮ Most people can’t tell whether a tool is designed sanely and

safe to use

◮ They end up using tools which work but are unsafe ◮ Result : People get tracked down, jailed, ...

slide-32
SLIDE 32

What is Actually Used?

According to the circumvention tool usage report 2010 written by the Berkman Center:

◮ Simple web proxies much more popular than sophisticated

circumvention tools

◮ Most popular tools are Freegate, UltraSurf, Tor, Hotspot

Shield and web proxies

◮ Most users mereley search for “proxy” to find tools

slide-33
SLIDE 33

How to Advertise Evasion Tools

Important for programmers :

◮ Don’t advertise snake oil → users will believe it! ◮ No pretentious claims and misleading information ◮ Clear and precise documentation of what the tool offers

and what not