The Parrot is Dead: Observing Unobservable Network Communications - - PowerPoint PPT Presentation

the parrot is dead observing unobservable network
SMART_READER_LITE
LIVE PREVIEW

The Parrot is Dead: Observing Unobservable Network Communications - - PowerPoint PPT Presentation

The Parrot is Dead: Observing Unobservable Network Communications Amir Houmansadr Chad Brubaker Vitaly Shmatikov Internet Censorship The Internet is a big threat to repressive regimes! Repressive regimes censor the Internet:


slide-1
SLIDE 1

The Parrot is Dead: Observing Unobservable Network Communications

Amir Houmansadr Chad Brubaker Vitaly Shmatikov

slide-2
SLIDE 2

Internet Censorship

— The Internet is a big threat to repressive regimes! — Repressive regimes censor the Internet:

— IP filtering, DNS hijacking, Deep packet-inspection,

etc.

— Circumvention systems

2

slide-3
SLIDE 3

Censorship Region The Internet

X

Allowed Destination Blocked Destination

slide-4
SLIDE 4

Censorship Region The Internet

X

Blocked Destination DPI

slide-5
SLIDE 5

We need unobservable circumvention Censors should not be able to identify circumvention traffic or end-hosts through passive, active, or proactive techniques

slide-6
SLIDE 6

Censorship Region The Internet

Let’s hide!

slide-7
SLIDE 7

Parrot systems

— Imitate a popular protocol

— SkypeMorph (CCS’12) — StegoTorus (CCS’12) — CensorSpoofer (CCS’12)

slide-8
SLIDE 8

'E's dead, that's what's wrong with it! What's, uh... What's wrong with it?

slide-9
SLIDE 9

Censorship Region The Internet

SkypeMorph

A Tor node SkypeMorph Bridge Traffic Shaping SkypeMorph Client

slide-10
SLIDE 10

SoM header

— The start of message (SoM) header field is MISSING! — Single-packet identifier, instead of sophisticated

statistical traffic analysis

slide-11
SLIDE 11

Censorship Region The Internet

SkypeMorph

A Tor node SkypeMorph Bridge TCP control SkypeMorph Client

slide-12
SLIDE 12

No, no.....No, 'e's stunned!

slide-13
SLIDE 13

SkypeMorph+

Let’s imitate the missing!

— Hard to mimic dynamic behavior

— Active/proactive tests

slide-14
SLIDE 14

Dropping UDP packets

slide-15
SLIDE 15

Other tests

Test Skype SkypeMorph+ Flush Supernode cache Serves as a SN Rejects all Skype messages Drop UDP packets Burst of packets in TCP control No reaction Close TCP channel Ends the UDP stream No reaction Delay TCP packets Reacts depending on the type of message No reaction Close TCP connection to a SN Initiates UDP probes No reaction Block the default TCP port Connects to TCP ports 80 and 443 No reaction

slide-16
SLIDE 16

Now that's what I call a dead parrot.

slide-17
SLIDE 17

StegoTorus Client Censorship Region The Internet

StegoTorus

A Tor node StegoTorus Bridge HTTP HTTP Skype Ventrilo HTTP

slide-18
SLIDE 18

StegoTorus chopper

— Dependencies between links

slide-19
SLIDE 19

StegoTorus-Skype

— The same attacks as SkypeMorph

— Even more attacks!

slide-20
SLIDE 20

StegoTorus-HTTP

— Does not look like a typical HTTP server! — Most HTTP methods not supported!

HTTP request Real HTTP server StegoTorus’s HTTP module GET existing Returns “200 OK” and sets Connection to keep-alive Arbitrarily sets Connection to either keep-alive or Close GET long request Returns “404 Not Found” since URI does not exist No response GET non-existing Returns “404 Not Found” Returns “200 OK” GET wrong protocol Most servers produce an error message, e.g., “400 Bad Request” Returns “200 OK” HEAD existing Returns the common HTTP headers No response OPTIONS common Returns the supported methods in the Allow line No response DELETE existing Most servers have this method not activated and produce an error message No response TEST method Returns an error message, e.g., “405 Method Not Allowed” and sets Connection=Close No response Attack request Returns an error message, e.g., “404 Not Found” No response

slide-21
SLIDE 21

Dummy host Censorship Region The Internet

CensorSpoofer

Censored destination Spoofer RTP upstream RTP downstream SIP server CensorSpoofer Client

slide-22
SLIDE 22

Dummy host Censorship Region The Internet

CensorSpoofer

Censored destination Spoofer RTP upstream RTP downstream SIP server CensorSpoofer Client

slide-23
SLIDE 23

Dummy host Censorship Region The Internet

SIP probing

Censored destination Spoofer RTP upstream RTP downstream SIP server CensorSpoofer Client

slide-24
SLIDE 24

'E's not pinin'! 'E's expired and gone to meet 'is maker! No no! 'E's pining!

slide-25
SLIDE 25

Lesson 1

Unobservability by imitation is fundamentally flawed!

slide-26
SLIDE 26

Imitation Requirements

Correct SideProtocols IntraDepend InterDepend Err Network Content Patterns Users Geo Soft OS

slide-27
SLIDE 27

Lesson 2

Partial imitation is worse than no imitation!

slide-28
SLIDE 28

Alternative

— Do not imitate, but Run the target protocol Ø IP over Voice-over-IP [NDSS’13] u Challenge: efficiency

slide-29
SLIDE 29

Thanks