Censorship Detection Techniques

35
Censorship detection Arturo `hellais` Filasto’ Sunday, September 4, 2011

description

Censorship detection techniques. Most of the credit goes to Jacob Appelbaum and this presentation was prepared last minute for the ESC2011 Italian hacker camp.

Transcript of Censorship Detection Techniques

Page 1: Censorship Detection Techniques

Censorship detectionArturo `hellais` Filasto’

Sunday, September 4, 2011

Page 3: Censorship Detection Techniques

What is Censorship?

• Internet filtering is a form of non democratic oppression on people.

• It allows those in power to subvert the reality.

Sunday, September 4, 2011

Page 4: Censorship Detection Techniques

Filternet

• It’s a distorsion of what is in reality the internet.

• Follows the subjectiveness of the authorities

• This does not help humanity

Sunday, September 4, 2011

Page 5: Censorship Detection Techniques

La soluzione a quelli che sono percepiti soggettivamente come contenuti inappropriati è

oggettivamente più contenuti

Sunday, September 4, 2011

Page 6: Censorship Detection Techniques

Tor

• Tor software downloads are currently blocked from China, Iran, Lebanon, Qatar, etc.

• Tor delivers via email, write to [email protected] and we will send you a client to bootstrap a Tor client

Sunday, September 4, 2011

Page 7: Censorship Detection Techniques

Hidden Services

• They allow a server to give access to content anonymously

• This bypasses censorship in place

Sunday, September 4, 2011

Page 8: Censorship Detection Techniques

Tor Hidden Services

• am4wuhz3zifexz5u.onion

• Anonymity for the Server

• DoS protection

• End-To-End encryption

Sunday, September 4, 2011

Page 9: Censorship Detection Techniques

How HS work

Hidden ServerIP

IP

IP

Client

Sunday, September 4, 2011

Page 10: Censorship Detection Techniques

How HS work

Hidden ServerIP

IP

IP

Client

RP

Sunday, September 4, 2011

Page 11: Censorship Detection Techniques

Why use HS

• Avoid retaliation for what you publish

• Securely host and serve content

• Stealth Hidden Service

Sunday, September 4, 2011

Page 12: Censorship Detection Techniques

How filtering is performed

• Depends on the location and entities performing it

• A mix of commercial products and open source software

• Lebanon ISP’s use Free Software

• Syria uses commercial Blue Coat devices

• US/NSA use commercial Narus devices

Sunday, September 4, 2011

Page 13: Censorship Detection Techniques

Filtering taxonomy

• Logging (passive)

• Network and protocol Hijacking

• Injection (modify content, 302, rst etc.)

• Dropping (packets not transmitted)

Sunday, September 4, 2011

Page 14: Censorship Detection Techniques

Filter detection techniques

• Important to classify by risk profile

• People running filter detection tools must know how invasive the technique is

Sunday, September 4, 2011

Page 15: Censorship Detection Techniques

OONI

• Open Observatory of Network Interference

• I am working on this with Jacob Appelbaum as part of The Tor Project

• An extensible and flexible tool to perform censorship detection

Sunday, September 4, 2011

Page 16: Censorship Detection Techniques

Existing testing tools

• Netalyzr, rTurtle, Herdict.

• Unfortunately either the raw data results or even the tools themselves are closed :(

• They only release reports, without the original raw data

Sunday, September 4, 2011

Page 17: Censorship Detection Techniques

Goals for OONI

• Make a something Open Source and publish the raw data collected

• Have hackers write code and sociologist write reports ;)

Sunday, September 4, 2011

Page 18: Censorship Detection Techniques

Filtering detection techniques

• High risk and Active

• request for certain “bad” resources (test censorship lists)

• keyword injection

• anything that may trigger DPI devices

• Low risk and Active

• TTL walking

• Network latency

• Passive

• In the future proxooni to proxy traffic with a SOCKS proxy and detect anomalies as the user does his normal internet activities

Sunday, September 4, 2011

Page 19: Censorship Detection Techniques

Fingerprinting of the application

• Most existing tools that we audited leak who they are

• In OONI reports will only be submitted over Tor

Sunday, September 4, 2011

Page 20: Censorship Detection Techniques

The scientific method

• Control

• What you know is a good result

• It can also be a request done over Tor

• Experiment

• Check if it matches up with the result

• If it does not there is an anomaly that must be explored

Sunday, September 4, 2011

Page 21: Censorship Detection Techniques

Brief excursus on censorship in the

World

Sunday, September 4, 2011

Page 22: Censorship Detection Techniques

Syria: BlueCoat

• They are using commerical bluecoat devices

• Anonymous Telecomix contributors produced a good analysis

Sunday, September 4, 2011

Page 23: Censorship Detection Techniques

Syria: BlueCoat

• SERVER is located outside Syria

• CLIENT1 is located inside Syria

• CLIENT connects to SERVER port 5060, no connection

• CLIENT connects to SERVER port 443, connection works

• CLIENT connects to SERVER port 80, the headers in the response are rewritten

Sunday, September 4, 2011

Page 24: Censorship Detection Techniques

Syria: BlueCoatGET /HTTP/1.1Host: SERVER

User-Agent: Standard-browser-User-AgentAccept: text/html,etc.

Accept-Encoding: gzip,deflate,sdchAccept-Language: en-US,en;q=0.8

Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3X-Forwarded-For: CLIENTCache-Control: max-stale=0

Connection: Keep-AliveX-BlueCoat-Via: 2C044BEC00210EB6

Sunday, September 4, 2011

Page 25: Censorship Detection Techniques

Syria: BlueCoat

• More details and funness to come in the following days ;)

Sunday, September 4, 2011

Page 26: Censorship Detection Techniques

Funny ⅖ Off Topic discovery

• Who has ever used a captive portal?

• Skype makes you pay access with it’s credit

• It has problems doing login

• It uses a captive portal

Sunday, September 4, 2011

Page 27: Censorship Detection Techniques

Sunday, September 4, 2011

Page 28: Censorship Detection Techniques

Iran

Sunday, September 4, 2011

Page 29: Censorship Detection Techniques

Iran

• Nokia has reportedly sold equipment to the Iranian government. It helps wiretap, track, and crush dissenting members of Iranian society. Nokia claims that this is ethical because they were forced to put legal intercepts into their products by the West.

Sunday, September 4, 2011

Page 30: Censorship Detection Techniques

Italy

• Currently two methods are being used:

• DNS based

• ISP level blacklisting

Sunday, September 4, 2011

Page 31: Censorship Detection Techniques

Sunday, September 4, 2011

Page 32: Censorship Detection Techniques

libero.it

Sunday, September 4, 2011

Page 33: Censorship Detection Techniques

Free communications

• Are something that is important to the progress of humanity.

Sunday, September 4, 2011

Page 34: Censorship Detection Techniques

Questions?

Sunday, September 4, 2011

Page 35: Censorship Detection Techniques

Sunday, September 4, 2011