SlideShare a Scribd company logo
1 of 37
Net Neutrality A primer
Network Neutrality The promise of the Internet Means networks should be dumb Because for once, dumb is good: Dumb networks are necessary for open and free communication Key to innovation The promise of the Internet
Who wouldn’t want this? Telecom providers feel left out of the Internet economy :-( Dear Google: We’re the reason you’re successful. Shouldn’t you pay us for all the traffic we bring you? Internet Service Providers want to ration bandwidth by application Create tiered access “value-add” for the consumer  BitTorrent and MMORPGs? $$$
Their needs
The Internets: Not a truck
How? Traffic shaping Deep Packet Inspection Telecom provider buys special box Special box peeks into your internet connections Tries to identify applications and services using known patterns Even encrypted protocols have identifiable patterns..
 Meanwhile…
#iranelection JUNE 2009, TEHRAN
Censorship in Iran Between 5 and 10 million websites, according to government statements Dissident and reformist political content Secular viewpoints Ba’hai faith, Kurdish movements Sins: Pornography, drug, alcohol, gambling Foreign media sites Tools for circumventing filters 9% of all Farsi blogs Myspace, Orkut, Flickr, Bebo, Metacafe, Photobucket, Del.ic.io.us
And during the 2009 election..
Iran Facts 23 million Internet users in Iran (28 million in Canada) 35% of the Iranian population 60,000 active Farsi blogs 1/3 of the Iranian population is between 15 and 29 years old
Circumventing Censorship SSL encrypted proxy servers Freegate Tor OpenVPN tunnels SSH tunnels
Iran blocking ports? We needed to know if it was true that connections originating inside Iran were being blocked by port We had no friends in Iran to help us test this Then we had an idea..
Testing Connectivity from Within Iran Follow these steps: Step 1: Google for publicly accessible FTP server Step 2: Connect with FTP client and initiate active mode data connection back to client Step 3: Wait to see if connection successfully completes or not Implemented in a program that did this automatically Link at the end of presentation
Results So how many ports were being blocked? None!
However.. There were credible reports from Iran of connectivity problems A pattern emerged Affected connections are slow, very slow The port does not matter Destination does not matter What matters is the protocol you’re using to communicate
An experiment We wanted to verify a theory that deep packet inspection technology was behind the censorship The SSH protocol was chosen Modifications were made to OpenSSH to fully encrypt the initial handshake To avoid detection by deep packet inspection technology
Result Significant performance differences observed between normal SSH and the modified SSH This strongly suggested that some sort of deep packet inspection technology was being used  Later, sources in Iran credibly claimed that Western technology was being used to implement state censorship policy Packet shaping, deep packet inspection technology Specific products cited
Conclusion By definition, deep-packet inspection, packet shaping technology is censorship technology The introduction of a policy of service or application preference, an intentional bias The technology is not evil But it can be Similarly, the export of technology to Iran is not a bad thing
Thank you!
Links http://opennet.net/research/profiles/iran http://github.com/brl/ftpscan http://github.com/brl/obfuscated-ssh E-mail bruce@netifera.com drma@mac.com

More Related Content

What's hot

Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1elsaher
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation policeAshley Raymond
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 

What's hot (15)

Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
p2p
p2pp2p
p2p
 
Week10
Week10Week10
Week10
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 

Viewers also liked

2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 201244CON
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on FacebookSauvik Das
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveMonica Feliu-Mojer, Ph.D.
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.Olesia Velychko
 

Viewers also liked (7)

2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on Facebook
 
Censorship
CensorshipCensorship
Censorship
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More Inclusive
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.
 

Similar to Net Neutrality and Internet Censorship

Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internetipoque
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
January 2015 Newsletter
January 2015 Newsletter January 2015 Newsletter
January 2015 Newsletter Macnamara-ICT
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhoveimec.archive
 
The Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key ChallengesThe Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key Challengesitio Innovex Pvt Ltv
 
E book governmentblockchain
E book governmentblockchainE book governmentblockchain
E book governmentblockchainMahua Chatterjee
 
Blockchain Application Development
Blockchain Application DevelopmentBlockchain Application Development
Blockchain Application DevelopmentThe NineHertz
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809Eric Klinker
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?IRJET Journal
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageProQSys
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
set zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfset zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfSudamaSharma7
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of thingsMohanad Kaleia
 
Peer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfPeer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfBlock Coders
 
chapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfchapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfstudy material
 

Similar to Net Neutrality and Internet Censorship (20)

Dw communication
Dw communicationDw communication
Dw communication
 
Darknet
DarknetDarknet
Darknet
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
January 2015 Newsletter
January 2015 Newsletter January 2015 Newsletter
January 2015 Newsletter
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
The Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key ChallengesThe Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key Challenges
 
E book governmentblockchain
E book governmentblockchainE book governmentblockchain
E book governmentblockchain
 
Blockchain Application Development
Blockchain Application DevelopmentBlockchain Application Development
Blockchain Application Development
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
set zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfset zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdf
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of things
 
Peer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfPeer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdf
 
chapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfchapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdf
 
Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Net Neutrality and Internet Censorship

  • 2. Network Neutrality The promise of the Internet Means networks should be dumb Because for once, dumb is good: Dumb networks are necessary for open and free communication Key to innovation The promise of the Internet
  • 3. Who wouldn’t want this? Telecom providers feel left out of the Internet economy :-( Dear Google: We’re the reason you’re successful. Shouldn’t you pay us for all the traffic we bring you? Internet Service Providers want to ration bandwidth by application Create tiered access “value-add” for the consumer BitTorrent and MMORPGs? $$$
  • 5.
  • 7. How? Traffic shaping Deep Packet Inspection Telecom provider buys special box Special box peeks into your internet connections Tries to identify applications and services using known patterns Even encrypted protocols have identifiable patterns..
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23. Censorship in Iran Between 5 and 10 million websites, according to government statements Dissident and reformist political content Secular viewpoints Ba’hai faith, Kurdish movements Sins: Pornography, drug, alcohol, gambling Foreign media sites Tools for circumventing filters 9% of all Farsi blogs Myspace, Orkut, Flickr, Bebo, Metacafe, Photobucket, Del.ic.io.us
  • 24. And during the 2009 election..
  • 25. Iran Facts 23 million Internet users in Iran (28 million in Canada) 35% of the Iranian population 60,000 active Farsi blogs 1/3 of the Iranian population is between 15 and 29 years old
  • 26. Circumventing Censorship SSL encrypted proxy servers Freegate Tor OpenVPN tunnels SSH tunnels
  • 27.
  • 28. Iran blocking ports? We needed to know if it was true that connections originating inside Iran were being blocked by port We had no friends in Iran to help us test this Then we had an idea..
  • 29.
  • 30. Testing Connectivity from Within Iran Follow these steps: Step 1: Google for publicly accessible FTP server Step 2: Connect with FTP client and initiate active mode data connection back to client Step 3: Wait to see if connection successfully completes or not Implemented in a program that did this automatically Link at the end of presentation
  • 31. Results So how many ports were being blocked? None!
  • 32. However.. There were credible reports from Iran of connectivity problems A pattern emerged Affected connections are slow, very slow The port does not matter Destination does not matter What matters is the protocol you’re using to communicate
  • 33. An experiment We wanted to verify a theory that deep packet inspection technology was behind the censorship The SSH protocol was chosen Modifications were made to OpenSSH to fully encrypt the initial handshake To avoid detection by deep packet inspection technology
  • 34. Result Significant performance differences observed between normal SSH and the modified SSH This strongly suggested that some sort of deep packet inspection technology was being used Later, sources in Iran credibly claimed that Western technology was being used to implement state censorship policy Packet shaping, deep packet inspection technology Specific products cited
  • 35. Conclusion By definition, deep-packet inspection, packet shaping technology is censorship technology The introduction of a policy of service or application preference, an intentional bias The technology is not evil But it can be Similarly, the export of technology to Iran is not a bad thing
  • 37. Links http://opennet.net/research/profiles/iran http://github.com/brl/ftpscan http://github.com/brl/obfuscated-ssh E-mail bruce@netifera.com drma@mac.com