Examining How The Great Firewall Discovers Hidden Circumvention Servers
Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson Oct 29, 2015
1
Examining How The Great Firewall Discovers Hidden Circumvention - - PowerPoint PPT Presentation
Examining How The Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi , David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson Oct 29, 2015 1 Circumventing Internet Censorship Using Proxies Web servers
1
Internet
Web servers
2
Web servers
DPI 3
Internet
Internet
Web servers
DPI
Proxy server
4
Internet
Web servers
DPI
Proxy server
5
Web servers Internet
DPI
Proxy server
6
7
Use public Tor network to circumvent GFW
8
Use public Tor network to circumvent GFW Download consensus and block relays
9
Use public Tor network to circumvent GFW Download consensus and block relays Introduce private bridges, whose distribution is rate-limited
10
Use public Tor network to circumvent GFW Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Use DPI to detect Tor TLS handshake
11
○ X.509 certificate life times ○ Cipher suites ○ Randomly generated server name indication (e.g., www.6qgoz6epdi6im5rvxnlx. com)
12
Use public Tor network to circumvent GFW Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Introduce pluggable transports to hide the handshake such as obfs2, obfs3 Use DPI to detect Tor TLS handshake
13
○
■ First 20 bytes can be used to detect Tor traffic with high confidence. ○
■ Makes Tor traffic look like a uniformly random byte stream
14
Use public Tor network to circumvent GFW Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Introduce pluggable transports to hide the handshake such as obfs2, obfs3 Use DPI to detect Tor TLS handshake, then probe and block bridges
15
Use public Tor network to circumvent GFW Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Introduce pluggable transports to hide the handshake such as obfs2, obfs3 Use DPI to detect Tor TLS handshake, then probe and block bridges
16
17
Use public Tor network to circumvent GFW Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Introduce pluggable transports to hide the handshake such as obfs2, obfs3 Use DPI to detect Tor TLS handshake
18
Use DPI + Active probing
○ Implementation, i.e., how does it block? ○ Architecture, i.e., how is a system added to China’s backbone? ○ Policy, i.e., what kind of protocols does it block? ○ Effectiveness, i.e., what’s the degree of success at discovering Tor bridges?
19
20
EC2-Vanilla Unicom ISP
Clients in China
EC2-Obfs2 EC2-Obfs3 EC2-Vanilla EC2-Obfs2 EC2-Obfs3
Amazon AWS
CERNET Network
21
30000
. .
30300
. .
30600 Vanilla Tor Client in China
Forwarding 600 ports to Tor port
EC2-Vanilla Unicom ISP
Clients in China
EC2-Obfs2 EC2-Obfs3 EC2-Vanilla EC2-Obfs2 EC2-Obfs3
Amazon AWS
CERNET Network
22
Server Log Analysis Application logs of a web server that also runs a Tor bridge since 2010.
EC2-Vanilla Unicom ISP
Clients in China
EC2-Obfs2 EC2-Obfs3 EC2-Vanilla EC2-Obfs2 EC2-Obfs3
Amazon AWS
CERNET Network
30000
. .
30300
. .
30600 Vanilla Tor Client in China
Forwarding 600 ports to Tor port
○ We had pcap files of both the clients and the bridges.
23
Shadow Dec 2014 -- Feb 2015 (3 months) Sybil Jan 29, 2015 -- Jan 30, 2015 (20 hours) Log Jan 2010 -- Aug 2015 (5 years)
24
○ Visited our vanilla Tor bridge after our client established connections ○ Originated from China
25
○ Visited our vanilla Tor bridge after our client established connections ○ Originated from China
○ If the cipher suites is in the TLS client hello => Vanilla bridge probes ○ If the first 20 bytes can reveal Obfs2 => Obfs2 bridges probers ○ ...
26
27
○ In total, we collected 16,083 unique prober IP addresses
28
(Over 5 years)
(3 months)
(22 hours)
GFW’s famous IP: 202.108.181.70
29
○ TSval slope: timestamp clock rate ○ TSval intercept: (rough) system uptime ○ GFW likely operate a handful of physical probing systems
30
Shadow exp. with 158 Prober IPs Sybil exp. with 1,182 Prober IPs Log dataset with
14,912 Prober IPs
○ Striking pattern in initial sequence numbers (derived from time) of 1,182 probes ○ Shared pattern in TSval for all three datasets
31
Initial sequence number
○ ISNs, TSval, source ports, ...
32
33
○ Median delay between Tor connection and subsequent probing connection is ~500ms ○ 1,182 distinct probes showed up in 22 hours
34
35
36
○ Might reflect implementation artifact of GFW
37
○ Might reflect implementation artifact of GFW
○ Surprising because GFW can probe and block obfs2 and obfs3
38
39
40
○ SYN, followed by ACK, then Tor’s TLS client hello) => trigger probe.
○ The fragmented data did not trigger an active probe, which differs from the GFW
○ Unicom’s sensor appears to operate on the same link as the GFW ○ CERNET sensor appears one hop closer to our server
41