Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V Krishnamurthy University of California, Riverside
1
Your State is Not Mine: A Closer Look at Evading Stateful Internet - - PowerPoint PPT Presentation
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Zhongjie Wang , Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V Krishnamurthy University of California, Riverside 1 Internet Censorship Key technology: Deep Packet
Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V Krishnamurthy University of California, Riverside
1
GET /badword HTTP/1.1\r\nHost: … Alice Web Server AS AS AS IP TCP HTTP (Stateful)
Connection State Client SEQ num Payload Data …
TCB
2
inherently vulnerable:
GET /badword HTTP/1.1\r\nHost: … Alice Web Server AS AS AS IP TCP HTTP (Stateful)
Connection State Client SEQ num Payload Data …
TCB RST RST
3
HTTP/DNS/IMAP/Tor/etc
connection upon detection of sensitive keyword
evasion techniques on the GFW in practical situation
4
Intrusion Detection. Ptacek et al. 1998.
Facilitate Evasion. Khattak et al. 2013.
5
technique on the GFW
tested effective with HTTP/DNS/VPN/Tor traffic
6
7
by the server
the GFW
8
TCB Creation TCB Teardown
(bad SEQ)
Creating false TCB Creating false TCB
9
10
Beijing Shanghai Guangzhou Shenzhen
11
12
13
Read Inject Win Linux macOS
Interference on Insertion Packets
Client-side Middlebox Server-side Middlebox Server Accept Failure 1 (No resp. from svr) Failure 1 (No resp. from svr) Failure 1 (No resp. from svr) Drop Failure 2 (RST from GFW) No Interference No Interference
14
15
16
SYN 1.1.1.1:5555 2.2.2.2:6666
Client: 1.1.1.1:5555 Server: 2.2.2.2:6666 Client SEQ: 123 …
TCB Prior SEQ:123, ACK:456 SYN/ACK
Client: 2.2.2.2:6666 Server: 1.1.1.1:5555 Client SEQ: 456 …
TCB 1.1.1.1:5555 2.2.2.2:6666 New SEQ:123, ACK:456
17
18
num using the next
Data SYN/ACK
19
20
21
22
differential testing with the GFW
change any TCP related states, i.e. packet ignored. e.g. wrong checksum
could be an insertion packet
23
candidate insertion packets
24
25
INTANG and its components UDP DNS <-> TCP DNS
26
INTANG and its components
Callbacks for each strategy:
27
rate due to close distance between server and GFW
based on historical results, success rate 98%
(Outbound) (Inbound)
28
bypassed with INTANG when censored
29
30
data reassembly strategies
to blackbox nature of the GFW
31
and find most of them are no longer working
interference on the insertion packets
evasion strategies that can bypass these behaviors
success rate of 95%+
32
33