Results 1 - 10
of
10
Encore: Lightweight measurement of web censorship with cross-origin requests
- In ACM SIGCOMM
, 2015
"... Despite the pervasiveness of Internet censorship, we have scant data on its extent, mechanisms, and evolution. Mea-suring censorship is challenging: it requires continual measurement of reachability to many target sites from diverse vantage points. Amassing suitable vantage points for longitudinal m ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
(Show Context)
Despite the pervasiveness of Internet censorship, we have scant data on its extent, mechanisms, and evolution. Mea-suring censorship is challenging: it requires continual measurement of reachability to many target sites from diverse vantage points. Amassing suitable vantage points for longitudinal measurement is difficult; existing systems have achieved only small, short-lived deployments. We observe, however, that most Internet users access content via Web browsers, and the very nature of Web site design allows browsers to make requests to domains with differ-ent origins than the main Web page. We present Encore, a system that harnesses cross-origin requests to measure Web filtering from a diverse set of vantage points with-out requiring users to install custom software, enabling longitudinal measurements from many vantage points. We explain how Encore induces Web clients to perform cross-origin requests that measure Web filtering, design a distributed platform for scheduling and collecting these measurements, show the feasibility of a global-scale de-ployment with a pilot study and an analysis of potentially censored Web content, identify several cases of filtering in six months of measurements, and discuss ethical concerns that would arise with widespread deployment. 1
TapDance: End-to-Middle Anticensorship without Flow Blocking
"... In response to increasingly sophisticated state-sponsored Internet censorship, recent work has proposed a new approach to censorship resistance: end-to-middle proxying. This concept, developed in systems such as Telex, Decoy Routing, and Cirripede, moves anticensorship technology into the core of th ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
(Show Context)
In response to increasingly sophisticated state-sponsored Internet censorship, recent work has proposed a new approach to censorship resistance: end-to-middle proxying. This concept, developed in systems such as Telex, Decoy Routing, and Cirripede, moves anticensorship technology into the core of the network, at large ISPs outside the censoring country. In this paper, we focus on two technical obstacles to the deployment of certain end-to-middle schemes: the need to selectively block flows and the need to observe both directions of a connection. We propose a new construction, TapDance, that removes these requirements. TapDance employs a novel TCP-level technique that allows the anticensorship station at an ISP to function as a passive network tap, without an inline blocking component. We also apply a novel steganographic encoding to embed control messages in TLS ciphertext, allowing us to operate on HTTPS connections even under asymmetric routing. We implement and evaluate a TapDance prototype that demonstrates how the system could function with minimal impact on an ISP’s network operations. 1
CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
"... Abstract. Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recog-nize and block, and once the censors identify network servers (e.g., Tor bridges) assis ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(Show Context)
Abstract. Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recog-nize and block, and once the censors identify network servers (e.g., Tor bridges) assisting in circumvention, they can locate all of their users. CloudTransport is a new censorship-resistant communication system that hides users ’ network traffic by tunneling it through a cloud storage ser-vice such as Amazon S3. The goal of CloudTransport is to increase the censors ’ economic and social costs by forcing them to use more expen-sive forms of network filtering, such as large-scale traffic analysis, or else risk disrupting normal cloud-based services and thus causing collateral damage even to the users who are not engaging in circumvention. Cloud-Transport’s novel passive-rendezvous protocol ensures that there are no direct connections between a CloudTransport client and a CloudTrans-port bridge. Therefore, even if the censors identify a CloudTransport connection or the IP address of a CloudTransport bridge, this does not help them block the bridge or identify other connections. CloudTransport can be used as a standalone service, a gateway to an anonymity network like Tor, or a pluggable transport for Tor. It does not require any modifications to the existing cloud storage, is compatible with multiple cloud providers, and hides the user’s Internet destinations even if the provider is compromised. 1
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
"... Abstract Encryption schemes where the ciphertext must abide by a specified format have diverse applications, ranging from in-place encryption in databases to per-message encryption of network traffic for censorship circumvention. Despite this, a unifying framework for deploying such encryption sche ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
(Show Context)
Abstract Encryption schemes where the ciphertext must abide by a specified format have diverse applications, ranging from in-place encryption in databases to per-message encryption of network traffic for censorship circumvention. Despite this, a unifying framework for deploying such encryption schemes has not been developed. One consequence of this is that current schemes are ad-hoc; another is a requirement for expert knowledge that can disuade one from using encryption at all. We present a general-purpose library (called libfte) that aids engineers in the development and deployment of format-preserving encryption (FPE) and formattransforming encryption (FTE) schemes. It incorporates a new algorithmic approach for performing FPE/FTE using the nondeterministic finite-state automata (NFA) representation of a regular expression when specifying formats. This approach was previously considered unworkable, and our approach closes this open problem. We evaluate libfte and show that, compared to other encryption solutions, it introduces negligible latency overhead, and can decrease diskspace usage by as much as 62.5% when used for simultaneous encryption and compression in a PostgreSQL database (both relative to conventional encryption mechanisms). In the censorship circumvention setting we show that, using regularexpression formats lifted from the Snort IDS, libfte can reduce client/server memory requirements by as much as 30%.
1Systemization of Pluggable Transports for Censorship Resistance
"... Abstract—An increasing number of countries implement In-ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen-sorship due to the ease with which a nation-state censor ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract—An increasing number of countries implement In-ternet censorship at different levels and for a variety of reasons. The link between the censored client and entry point to the uncensored communication system is a frequent target of cen-sorship due to the ease with which a nation-state censor can control this. The diversity of a censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of censorship resistance schemes (CRSs) (we note that at least six CRSs have been written in 2014 so far). Despite the inherent complexity of CRSs and the breadth of work in this area, there is no principled way to evaluate individual systems and compare them against each other. In this paper, we (i) sketch an attack model to comprehensively explore a censor’s capabilities, (ii) present an abstract model of a Pluggable Transport (PT)–a system that helps a censored client communicate with a server over the Internet while resisting censorship, (iii) describe an evaluation stack that presents a layered approach to evaluate PT, and (iv) survey 34 existing PTs and present a detailed evaluation of 6 of these corresponding to our attack model and evaluation framework. We highlight the inflexibility of current PTs to lend themselves to feature sharability for broader defense coverage. To address this, we present Tweakable Transports-PTs built out of re-usable compo-nents following the evaluation stack architecture with a view to flexibly combine complementary PT features. We also list a set of challenges to guide future work on Tweakable Transports. I.
USENIX Association 23rd USENIX Security Symposium 159 TapDance: End-to-Middle Anticensorship without Flow Blocking
, 2014
"... is sponsored by USENIX ..."
(Show Context)
Seeing through Network-Protocol Obfuscation
"... ABSTRACT Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors to detect circumvention tools, activists and researchers have responded by developing network protocol obfuscat ..."
Abstract
- Add to MetaCart
(Show Context)
ABSTRACT Censorship-circumvention systems are designed to help users bypass Internet censorship. As more sophisticated deep-packetinspection (DPI) mechanisms have been deployed by censors to detect circumvention tools, activists and researchers have responded by developing network protocol obfuscation tools. These have proved to be effective in practice against existing DPI and are now distributed with systems such as Tor. In this work, we provide the first in-depth investigation of the detectability of in-use protocol obfuscators by DPI. We build a framework for evaluation that uses real network traffic captures to evaluate detectability, based on metrics such as the false-positive rate against background (i.e., non obfuscated) traffic. We first exercise our framework to show that some previously proposed attacks from the literature are not as effective as a censor might like. We go on to develop new attacks against five obfuscation tools as they are configured in Tor, including: two variants of obfsproxy, FTE, and two variants of meek. We conclude by using our framework to show that all of these obfuscation mechanisms could be reliably detected by a determined censor with sufficiently low false-positive rates for use in many censorship settings.
Enhancing Censorship Resistance in the Tor Anonymity Network Enhancing Censorship Resistance in the Tor Anonymity Network WWW.KAU.SE iii Enhancing Censorship Resistance in the Tor Anonymity Network
"... Abstract The Tor network was originally designed as low-latency anonymity network. ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract The Tor network was originally designed as low-latency anonymity network.
Proceedings on Privacy Enhancing Technologies 2015; 2015 (2):1–19
"... Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting, ” a versatile censorship circumvention technique that hides the re-mote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to com-municate with a forbidden host whi ..."
Abstract
- Add to MetaCart
(Show Context)
Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting, ” a versatile censorship circumvention technique that hides the re-mote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to com-municate with a forbidden host while appearing to com-municate with some other host, permitted by the cen-sor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside ” of an HTTPS request—in the DNS re-quest and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryp-tion. A censor, unable to distinguish fronted and non-fronted traffic to a domain, must choose between allow-ing circumvention traffic and blocking the domain en-tirely, which results in expensive collateral damage. Do-main fronting is easy to deploy and use and does not re-quire special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumven-tion workhorse. We describe several months of deploy-ment experience in the Tor, Lantern, and Psiphon cir-cumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month.
Performance and Security Improvements for Tor: A Survey
"... Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals that aim to improve its performance, security, and u ..."
Abstract
- Add to MetaCart
(Show Context)
Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more than three dozen proposals that aim to improve its performance, security, and unobservability. Given the significance of this research area, our goal is to provide the reader with the state of current research directions and challenges in anonymous communication systems, focusing on the Tor network. We shed light on the design weaknesses and challenges facing the network and point out unresolved issues. 1.