SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
Censorship detection
                            Arturo `hellais` Filasto’




Sunday, September 4, 2011
Whoami

                    • @hellais on twitter
                    • hellais@torproject.org
                    • art@globaleaks.org
                    • art@fuffa.org
                    • art@winstonsmith.org

Sunday, September 4, 2011
What is Censorship?

                    • Internet filtering is a form of non
                            democratic oppression on people.
                    • It allows those in power to subvert the
                            reality.




Sunday, September 4, 2011
Filternet

                    • It’s a distorsion of what is in reality the
                            internet.
                    • Follows the subjectiveness of the
                            authorities
                    • This does not help humanity

Sunday, September 4, 2011
La soluzione a quelli che sono percepiti
                 soggettivamente come contenuti inappropriati è
                           oggettivamente più contenuti




Sunday, September 4, 2011
Tor

                    • Tor software downloads are currently
                            blocked from China, Iran, Lebanon, Qatar,
                            etc.
                    • Tor delivers via email, write to
                            gettor@torproject.org and we will send
                            you a client to bootstrap a Tor client



Sunday, September 4, 2011
Hidden Services


                    • They allow a server to give access to
                            content anonymously
                    • This bypasses censorship in place


Sunday, September 4, 2011
Tor Hidden Services

                    • am4wuhz3zifexz5u.onion
                    • Anonymity for the Server
                    • DoS protection
                    • End-To-End encryption

Sunday, September 4, 2011
How HS work

                Client
                                         Hidden Server
                               IP

                               IP
                                    IP



Sunday, September 4, 2011
How HS work

                    Client
                                           Hidden Server
                                 IP

                                 IP
                                      IP
                        RP



Sunday, September 4, 2011
Why use HS

                    • Avoid retaliation for what you publish
                    • Securely host and serve content
                    • Stealth Hidden Service


Sunday, September 4, 2011
How filtering is
                                 performed
                    • Depends on the location and entities
                            performing it
                    • A mix of commercial products and open
                            source software
                            • Lebanon ISP’s use Free Software
                            • Syria uses commercial Blue Coat devices
                            • US/NSA use commercial Narus devices
Sunday, September 4, 2011
Filtering taxonomy

                    • Logging (passive)
                    • Network and protocol Hijacking
                    • Injection (modify content, 302, rst etc.)
                    • Dropping (packets not transmitted)

Sunday, September 4, 2011
Filter detection
                                   techniques

                    • Important to classify by risk profile
                    • People running filter detection tools must
                            know how invasive the technique is




Sunday, September 4, 2011
OONI

                    • Open Observatory of Network
                            Interference
                    • I am working on this with Jacob Appelbaum
                            as part of The Tor Project
                    • An extensible and flexible tool to perform
                            censorship detection



Sunday, September 4, 2011
Existing testing tools

                    • Netalyzr, rTurtle, Herdict.
                    • Unfortunately either the raw data results
                            or even the tools themselves are closed :(
                    • They only release reports, without the
                            original raw data



Sunday, September 4, 2011
Goals for OONI

                    • Make a something Open Source and publish
                            the raw data collected
                    • Have hackers write code and sociologist
                            write reports ;)




Sunday, September 4, 2011
Filtering detection
                                     techniques
                    •       High risk and Active
                            •   request for certain “bad” resources (test censorship lists)
                            •   keyword injection
                            •   anything that may trigger DPI devices
                    •       Low risk and Active
                            •   TTL walking
                            •   Network latency
                    •       Passive
                            •   In the future proxooni to proxy traffic with a SOCKS proxy and
                                detect anomalies as the user does his normal internet activities



Sunday, September 4, 2011
Fingerprinting of the
                                 application

                    • Most existing tools that we audited leak
                            who they are
                    • In OONI reports will only be submitted
                            over Tor




Sunday, September 4, 2011
The scientific method
                    • Control
                      • What you know is a good result
                      • It can also be a request done over Tor
                    • Experiment
                      • Check if it matches up with the result
                      • If it does not there is an anomaly that
                            must be explored


Sunday, September 4, 2011
Brief excursus on
                            censorship in the
                                  World


Sunday, September 4, 2011
Syria: BlueCoat

                    • They are using commerical bluecoat
                            devices
                    • Anonymous Telecomix contributors
                            produced a good analysis




Sunday, September 4, 2011
Syria: BlueCoat
                    •       SERVER is located outside Syria
                    •       CLIENT1 is located inside Syria
                    •       CLIENT connects to SERVER port 5060, no
                            connection
                    •       CLIENT connects to SERVER port 443,
                            connection works
                    •       CLIENT connects to SERVER port 80, the
                            headers in the response are rewritten


Sunday, September 4, 2011
Syria: BlueCoat
                                           GET /HTTP/1.1
                                           Host: SERVER
                              User-Agent: Standard-browser-User-Agent
                                       Accept: text/html,etc.
                                  Accept-Encoding: gzip,deflate,sdch
                                  Accept-Language: en-US,en;q=0.8
                            Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
                                    X-Forwarded-For: CLIENT
                                    Cache-Control: max-stale=0
                                      Connection: Keep-Alive
                                X-BlueCoat-Via: 2C044BEC00210EB6




Sunday, September 4, 2011
Syria: BlueCoat


                    • More details and funness to come in the
                            following days ;)




Sunday, September 4, 2011
Funny ⅖ Off Topic
                                discovery
                    • Who has ever used a captive portal?
                    • Skype makes you pay access with it’s credit
                    • It has problems doing login
                    • It uses a captive portal

Sunday, September 4, 2011
Sunday, September 4, 2011
Iran




Sunday, September 4, 2011
Iran

                    •       Nokia has reportedly sold equipment to the
                            Iranian government. It helps wiretap, track,
                            and crush dissenting members of Iranian
                            society. Nokia claims that this is ethical
                            because they were forced to put legal
                            intercepts into their products by the West.




Sunday, September 4, 2011
Italy

                    • Currently two methods are being used:
                     • DNS based
                     • ISP level blacklisting


Sunday, September 4, 2011
Sunday, September 4, 2011
libero.it




Sunday, September 4, 2011
Free communications


                    • Are something that is important to the
                            progress of humanity.




Sunday, September 4, 2011
Questions?




Sunday, September 4, 2011
Sunday, September 4, 2011

Más contenido relacionado

Similar a Censorship Detection Techniques

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011Gohsuke Takama
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Fred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UIFred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UIAxway Appcelerator
 
Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011Charles Nutter
 
Using+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applicationsUsing+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applicationsMuhammad Ikram Ul Haq
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive SecurityAndy Hoernecke
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive securityScott Behrens
 
Intro to Micro-frameworks
Intro to Micro-frameworksIntro to Micro-frameworks
Intro to Micro-frameworksjsmith92
 
102611 justice and journalism
102611 justice and journalism102611 justice and journalism
102611 justice and journalismVal Hoeppner
 
Doctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 ParisDoctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 ParisJonathan Wage
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven Innovationideas.org
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven InnovationSimon Grice
 
Track f interoperable ip-delivery_ch_e ofer shragay
Track f   interoperable ip-delivery_ch_e ofer shragayTrack f   interoperable ip-delivery_ch_e ofer shragay
Track f interoperable ip-delivery_ch_e ofer shragaychiportal
 
2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN Architecture2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN ArchitectureSimon Coles
 
Are Your Tests Really Helping You?
Are Your Tests Really Helping You?Are Your Tests Really Helping You?
Are Your Tests Really Helping You?LB Denker
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 

Similar a Censorship Detection Techniques (20)

GloabLeaks ESC2011
GloabLeaks ESC2011GloabLeaks ESC2011
GloabLeaks ESC2011
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
 
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
 
Pres e safety-yd
Pres e safety-ydPres e safety-yd
Pres e safety-yd
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Fred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UIFred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UI
 
Managing in an XML environment
Managing in an XML environmentManaging in an XML environment
Managing in an XML environment
 
Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011
 
Using+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applicationsUsing+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applications
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive security
 
Intro to Micro-frameworks
Intro to Micro-frameworksIntro to Micro-frameworks
Intro to Micro-frameworks
 
102611 justice and journalism
102611 justice and journalism102611 justice and journalism
102611 justice and journalism
 
Doctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 ParisDoctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 Paris
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven Innovation
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven Innovation
 
Track f interoperable ip-delivery_ch_e ofer shragay
Track f   interoperable ip-delivery_ch_e ofer shragayTrack f   interoperable ip-delivery_ch_e ofer shragay
Track f interoperable ip-delivery_ch_e ofer shragay
 
2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN Architecture2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN Architecture
 
Are Your Tests Really Helping You?
Are Your Tests Really Helping You?Are Your Tests Really Helping You?
Are Your Tests Really Helping You?
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Censorship Detection Techniques

  • 1. Censorship detection Arturo `hellais` Filasto’ Sunday, September 4, 2011
  • 2. Whoami • @hellais on twitter • hellais@torproject.org • art@globaleaks.org • art@fuffa.org • art@winstonsmith.org Sunday, September 4, 2011
  • 3. What is Censorship? • Internet filtering is a form of non democratic oppression on people. • It allows those in power to subvert the reality. Sunday, September 4, 2011
  • 4. Filternet • It’s a distorsion of what is in reality the internet. • Follows the subjectiveness of the authorities • This does not help humanity Sunday, September 4, 2011
  • 5. La soluzione a quelli che sono percepiti soggettivamente come contenuti inappropriati è oggettivamente più contenuti Sunday, September 4, 2011
  • 6. Tor • Tor software downloads are currently blocked from China, Iran, Lebanon, Qatar, etc. • Tor delivers via email, write to gettor@torproject.org and we will send you a client to bootstrap a Tor client Sunday, September 4, 2011
  • 7. Hidden Services • They allow a server to give access to content anonymously • This bypasses censorship in place Sunday, September 4, 2011
  • 8. Tor Hidden Services • am4wuhz3zifexz5u.onion • Anonymity for the Server • DoS protection • End-To-End encryption Sunday, September 4, 2011
  • 9. How HS work Client Hidden Server IP IP IP Sunday, September 4, 2011
  • 10. How HS work Client Hidden Server IP IP IP RP Sunday, September 4, 2011
  • 11. Why use HS • Avoid retaliation for what you publish • Securely host and serve content • Stealth Hidden Service Sunday, September 4, 2011
  • 12. How filtering is performed • Depends on the location and entities performing it • A mix of commercial products and open source software • Lebanon ISP’s use Free Software • Syria uses commercial Blue Coat devices • US/NSA use commercial Narus devices Sunday, September 4, 2011
  • 13. Filtering taxonomy • Logging (passive) • Network and protocol Hijacking • Injection (modify content, 302, rst etc.) • Dropping (packets not transmitted) Sunday, September 4, 2011
  • 14. Filter detection techniques • Important to classify by risk profile • People running filter detection tools must know how invasive the technique is Sunday, September 4, 2011
  • 15. OONI • Open Observatory of Network Interference • I am working on this with Jacob Appelbaum as part of The Tor Project • An extensible and flexible tool to perform censorship detection Sunday, September 4, 2011
  • 16. Existing testing tools • Netalyzr, rTurtle, Herdict. • Unfortunately either the raw data results or even the tools themselves are closed :( • They only release reports, without the original raw data Sunday, September 4, 2011
  • 17. Goals for OONI • Make a something Open Source and publish the raw data collected • Have hackers write code and sociologist write reports ;) Sunday, September 4, 2011
  • 18. Filtering detection techniques • High risk and Active • request for certain “bad” resources (test censorship lists) • keyword injection • anything that may trigger DPI devices • Low risk and Active • TTL walking • Network latency • Passive • In the future proxooni to proxy traffic with a SOCKS proxy and detect anomalies as the user does his normal internet activities Sunday, September 4, 2011
  • 19. Fingerprinting of the application • Most existing tools that we audited leak who they are • In OONI reports will only be submitted over Tor Sunday, September 4, 2011
  • 20. The scientific method • Control • What you know is a good result • It can also be a request done over Tor • Experiment • Check if it matches up with the result • If it does not there is an anomaly that must be explored Sunday, September 4, 2011
  • 21. Brief excursus on censorship in the World Sunday, September 4, 2011
  • 22. Syria: BlueCoat • They are using commerical bluecoat devices • Anonymous Telecomix contributors produced a good analysis Sunday, September 4, 2011
  • 23. Syria: BlueCoat • SERVER is located outside Syria • CLIENT1 is located inside Syria • CLIENT connects to SERVER port 5060, no connection • CLIENT connects to SERVER port 443, connection works • CLIENT connects to SERVER port 80, the headers in the response are rewritten Sunday, September 4, 2011
  • 24. Syria: BlueCoat GET /HTTP/1.1 Host: SERVER User-Agent: Standard-browser-User-Agent Accept: text/html,etc. Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 X-Forwarded-For: CLIENT Cache-Control: max-stale=0 Connection: Keep-Alive X-BlueCoat-Via: 2C044BEC00210EB6 Sunday, September 4, 2011
  • 25. Syria: BlueCoat • More details and funness to come in the following days ;) Sunday, September 4, 2011
  • 26. Funny ⅖ Off Topic discovery • Who has ever used a captive portal? • Skype makes you pay access with it’s credit • It has problems doing login • It uses a captive portal Sunday, September 4, 2011
  • 29. Iran • Nokia has reportedly sold equipment to the Iranian government. It helps wiretap, track, and crush dissenting members of Iranian society. Nokia claims that this is ethical because they were forced to put legal intercepts into their products by the West. Sunday, September 4, 2011
  • 30. Italy • Currently two methods are being used: • DNS based • ISP level blacklisting Sunday, September 4, 2011
  • 33. Free communications • Are something that is important to the progress of humanity. Sunday, September 4, 2011