1
How China Detects and Blocks Shadowsocks
Alice, Bob, Carol (GFW Report) Jan Beznazwy Amir Houmansadr (University of Massachusetts Amherst) https://gfw.report/publications/imc20/en/
ACM Internet Measurement Conference 2020
How China Detects and Blocks Shadowsocks Alice, Bob, Carol (GFW - - PowerPoint PPT Presentation
How China Detects and Blocks Shadowsocks Alice, Bob, Carol (GFW Report) Jan Beznazwy Amir Houmansadr (University of Massachusetts Amherst) https://gfw.report/publications/imc20/en/ ACM Internet Measurement Conference 2020 1 Overview The
1
ACM Internet Measurement Conference 2020
2
3
Great Firewall Shadowsocks client Shadowsocks server
4
Great Firewall Shadowsocks client Shadowsocks server
Active prober Active prober
5
6
7
8
100 101 102 103 104 105 106 Delay until replay of legitimate connection (seconds) 0% 25% 50% 75% 100% 1 second 1 minute 15 minutes 1 hour 10 hours 10 days Minimum delay: 0.28 s Maximum delay: 569.55 h First replay All replays
9
8 12 16 22 33 41 49 Probe length (bytes) 10 20 30 40 Count 2210 500 1000 1500 2000
10 Implementation & config Probe length
1 … 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 … 31 32 33 34 35 … 39 40 41 42 43 … 47 48 49 50 51 … 221
Shadowsocks-libev Stream 8 TIMEOUT RST TIMEOUT or RST or FIN/ACK 12 TIMEOUT RST TIMEOUT or RST or FIN/ACK 16 TIMEOUT RST TIMEOUT or RST or FIN/ACK AEAD 16 TIMEOUT RST OutlineVPN AEAD 32 TIMEOUT RST
FIN/ACK
11
IP address ASN count 175.42.1.21 4837 44 223.166.74.207 17621 38 113.128.105.20 4134 36 124.235.138.113 4134 36 221.213.75.88 4837 33 112.80.138.231 4837 32 116.252.2.39 4134 32 124.235.138.231 4134 32 221.213.75.126 4837 32 223.166.74.110 17621 31 …12,288 additional rows… 223.166.75.225 17621 1 223.166.75.226 17621 1
12128 21721 167 895 5 34
Tor active probes (Dunna et al. 2018) Shadowsocks active probes (this work) Various active probes (Ensafi et al. 2015)
12
Oct 27 Nov 03 Nov 10 Nov 17 231 232 TCP TSval 2 5 H z 1000 Hz Replay-based probes Non-replay probes
13
1 2 3 4 5 6 7 8 Shannon entropy of PSH/ACK packets 0.00% 0.10% 0.20% 0.30% Ratio of replay-based probes to legitimate connections
14
200 400 600 800 1000 Payload length (bytes) 0% 25% 50% 75% 100% Trigger connections N=942457 Replay-based probes N=3945 Non-replay probes N=876
15
200 400 600 800 1000 Payload length (bytes) 0% 25% 50% 75% 100% Trigger connections N=942457 Replay-based probes N=3945 Non-replay probes N=876
16 n + 9 16 n + 2
16
17
50 100 150 200 250 300 350 400 Relative time (hours) 5 10 15 20 25 Prober SYNs per hour
Brdgrd active Legitimate client connections active
18
Implementation & config Probe length
1 … 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 … 31 32 33 34 35 … 39 40 41 42 43 … 47 48 49 50 51 … 221
Shadowsocks-libev Stream 8 TIMEOUT RST TIMEOUT or RST or FIN/ACK 12 TIMEOUT RST TIMEOUT or RST or FIN/ACK 16 TIMEOUT RST TIMEOUT or RST or FIN/ACK AEAD 16 TIMEOUT RST OutlineVPN AEAD 32 TIMEOUT RST
FIN/ACK
19
Implementation & config Probe length
1 … 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 … 31 32 33 34 35 … 39 40 41 42 43 … 47 48 49 50 51 … 221
Shadowsocks-libev Stream 8 TIMEOUT TIMEOUT or RST or FIN/ACK 12 TIMEOUT TIMEOUT or RST or FIN/ACK 16 TIMEOUT TIMEOUT or RST or FIN/ACK AEAD 16 TIMEOUT OutlineVPN AEAD 32 TIMEOUT
20
passive traffic analysis and active probing.
when the packet has high entropy and certain lengths.
changing how servers respond to unauthenticated probes.