SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Downloaden Sie, um offline zu lesen
Tor e la Censura
                        Come i gorverni hanno censurato Tor e come i
                                 pacchetti vengono liberati.




Saturday, June 30, 12
$ whoami

                        • Arturo `hellais` Filastò
                        • Tor Project hacker
                        • Random GlobaLeaks Developer
                        • I develop Free Software for Freedom

Saturday, June 30, 12
Surveillance

                        • Censorship is a
                          subset of
                          surveillance
                        • If you are censoring
                          something you are
                          surveilling everything



Saturday, June 30, 12
“The Net interprets censorship as damage and
                                      routes around it.”
                                   - John Gilmore; TIME magazine (6
                                      December 1993)




Saturday, June 30, 12
What is Internet
                                Filtering?
                        • Is a form of non
                          democratic
                          oppression on
                          people
                        • It allows those in
                          power to subvert
                          reality


Saturday, June 30, 12
FilterNet

                        • It’s a distortion of what is in reality the
                          internet.
                        • Follows the subjectiveness of the
                          authorities
                        • This does not help humanity

Saturday, June 30, 12
There is no just
                                censorship.
                        • Internet filtering is happening in China,
                          Iran, Syria, but also in Italy, UK, Netherlands.
                        • The only solution to what is considered by
                          some wrong information is more
                          information.




Saturday, June 30, 12
Tor and Censorship

                        • Tor is born as
                          anonymity tool
                        • Censorship
                          circumvention
                          was a side effect




Saturday, June 30, 12
Brief Timeline of Tor
                                Censorship
                        •   2002 - The Source code for Tor is released
                        •   2006, April - Thailand - DNS Filtering of tpo
                        •   2006 - Websense/netfilter - Block Tor based on Tor GET requests
                        •   2007 - Iran, Saudi - Blocks Tor thanks to Websense
                                                                                                    For more details on
                        •   2009, Iran throttles SSL                                              these events see, “How
                        •   2009, Tunisia - Smartfilter to block all expect 443, 80                governments have tried
                        •   2009, China blocks public relays                                           to block Tor”
                        •   2009 - Tor bridges are introduced
                        •   2010 - China starts collecting and blocking bridges
                        •   2011 - Iran by DPI on DH parameter in SSL
                        •   2011 - Egypt selected targetted sites for blocking
                        •   2011 - Lybia, throttling to limit use
                        •   2011 - Syria, DPI on Tor’s TLS renegotiation and killed connections
                        •   2011 - Iran DPI on SSL and TLS certificate timeline




Saturday, June 30, 12
What has happened in
                         the past months?
                        • 9 February 2012, Iran total SSL blockage
                        • 2012, China proactive censorship
                          evolutions
                        • February - March 2012, Kazakhstan
                        • 22 May 2012, Ethiopia
                        • 25 June 2012, UAE, Tor blocking via DPI
Saturday, June 30, 12
Iran SSL Blockage
                        • Deep packet inspection (DPI) of SSL traffic
                        • Selective blocking of IP Address and TCP
                          port combinations
                        • Some keyword filtering
                        • Not nationwide, certain areas no SSL traffic.
                        • February 2012, First real world deployment
                          of obfsproxy


Saturday, June 30, 12
Iran SSL Blockage




Saturday, June 30, 12
China evolutions
                        •   Blocking Techniques
                            •   IP Blocking (layer 3)
                            •   IP:Port blocking (layer 4)
                            •   RST based filtering (layer 4, active, easy circumvention)
                            •   HTTP blocking (layer 5)
                        •   Detection techniques
                            •   Active probing of *every* SSL connection (speaking Tor protocol)
                            •   Tor fingerprints for TLS Helo
                            •   Philip Winter, Fabio Pietrosanti worked on understanding active
                                chinese probing.




Saturday, June 30, 12
February - March 2012
                         Kazakhstan
                        •   In response to protests in Zhanaozen
                        •   Previously
                            •   IP address blocking
                            •   DNS based blocking
                        •   DPI SSL blocking
                            •   JSC KazTransCom starts blocking SSL traffic based on client
                                key exchange
                            •   Some businesses affected (no SSL, no IPSEC, no PPTP, no
                                certain VPNs)
                            •   Obfsproxy used



Saturday, June 30, 12
February - March 2012
                         Kazakhstan




Saturday, June 30, 12
22 May 2012
                                   Ethiopia

                        • Stateless DPI looking for Tor TLS Server
                          Helo
                        • Research conducted by phw, naif
                        • Patch for bridge #6045


Saturday, June 30, 12
22 May 2012
                          Ethiopia




Saturday, June 30, 12
25 June 2012
                                     UAE
                        • The Emirates Telecommunications
                          Corporation, also known as Etisalat, started
                          blocking Tor using DPI
                        • Evasion trough
                         • Special patch for bridges that removed
                            fingerprint
                         • Obfsproxy
Saturday, June 30, 12
What we are doing?
                        • Help people access information
                          Anonymously (Tor)
                        • Help people circumvent censorship (Tor, Tor
                          Bridges)
                        • Measure Internet filtering in the world
                          (OONI-Probe)
                        • Help people speak freely and anonymously
                          (Tor Hidden Services, APAF)


Saturday, June 30, 12
OONI

                        • Open Observatory of Network
                          interference
                        • Provide a methodology and framework
                        • Strong focus on Openness


Saturday, June 30, 12
Why OONI?
                        •   A lot of tools exist, but are either:
                            •   Closed source
                            •   Closed methodologies
                            •   Closed data
                        •   OONI is to be:
                            •   Free Software
                            •   using Open and described methodologies
                            •   publishing all the collected data with Open License


Saturday, June 30, 12
Open Methodologies

                        • This means that the research is
                          reproducible
                        • People seeing the results can evaluate the
                          accuracy of the testing strategy




Saturday, June 30, 12
Free Software
                        • Free software for freedom
                        • Means that anybody can base their
                          censorship research on OONI
                        • This allows code reuse and knowledge
                          sharing
                        • https://gitweb.torproject.org/ooni-probe.git

Saturday, June 30, 12
Open Data
                        • This allows people to independently verify
                          the results
                        • Open License (Creative Commons by
                          Attribution)
                        • People will independently draw their
                          conclusions based on the *data*
                        • Data driven journalism, Political Science
                          studies, Anti-Censorship activism.


Saturday, June 30, 12
What it detects
                        • It’s goals is to detect:
                          • Network filtering (“Is my network traffic
                            being tampered with?”)
                         • Content restrictions (“What is being
                            blocked?”)
                         • Filtering technique (“How is it being
                            blocked?”, “What software are they
                            using?”)


Saturday, June 30, 12
OONI Architecture 1/2




Saturday, June 30, 12
OONI Architecture 2/2




Saturday, June 30, 12
OONIB
                        •   Distributed backend for:
                            •   Assist in running of certain tests
                                •   Two way traceroute
                                •   Echo server
                                •   DNS server
                                •   HTTP server
                                •   Control Channel
                            •   Collect reports from probes


Saturday, June 30, 12
OONI-probe
                        • The actual measurement tool
                        • Includes the core of the test logic
                        • Takes an input and performs measurements
                          on the test network
                        • It can run the test on the local network or
                          send it to a remote Node (SOCKS,
                          OONIProxy, PlanetLab, etc.)


Saturday, June 30, 12
Reports




Saturday, June 30, 12
Test Categorization

                        • Traffic manipulation
                         • “Is there surveillance, of what kind?”
                        • Content blocking
                         • “Is there censorship?”
                         • “What is being censored?”

Saturday, June 30, 12
Traffic Manipulation
                                 examples
                        •   Two way traceroute If there is a difference
                            between an inbound traceroute and an outbound
                            traceroute for certain source and destination
                            ports this may be an indication of traffic being
                            routed to interception de- vices.
                        •   Header field manipulation By varying the
                            capitalization and adding certain headers to layer 7
                            protocols it is possible to detect on the receiving
                            end if the traffic has been tampered with.



Saturday, June 30, 12
Content Blocking
                                   examples
                        •   HTTP Host This involves changing the Host header field of an HTTP request to
                            that of the site one wishes to check for censorship.
                        •   DNS lookup This involves doing a DNS lookup for the in question hostname. If
                            the lookup result does not match the expected result the site is marked as being
                            censored.
                        •   Keyword filtering This involves sending an receiving data that contains certain
                            keywords and matching for censorship. It is possible to use bisection method to
                            understand what subset of keywords are triggering the filter.
                        •   HTTP scan This involves doing a full connection to the in question site. If the
                            content does not match the expected result then a censored flag is raised.
                        •   Traceroute This involves doing TCP, UDP, ICMP traceroute for certain destination
                            addresses if there are discrepancies in the paths with locations in the vicinities then
                            a censorship flag is raised.
                        •   RST packet detection This involves attempting to con- nect to a certain
                            destination and checking if the client gets back a RST packet.




Saturday, June 30, 12
Implementation details
                        •   Written in Python
                        •   Based on twisted
                        •   Provides scapy twisted
                            integration
                        •   Is currently a prototype.
                            •   Expect problems and to need
                                to have to use the source
                            •   Please kill bugs
                        •   Parts of OONIB implemented,
                            no remote reporting, OONI-
                            probe runs only locally




Saturday, June 30, 12
Recent impact
                        T-Mobile USA




Saturday, June 30, 12
Saturday, June 30, 12
Recent Impact
                            Handara Palestine

                        • Blockage of politically
                          oriented websites




Saturday, June 30, 12
Future

                        • Keep hacking on OONI
                        • Finish the architecture specification
                        • Get a beta release of OONI for December
                          2012.
                        • Perform measurements in all the world.

Saturday, June 30, 12
Come hack with us :)

                        • https://www.torproject.org/
                        • #tor, #tor-dev, #ooni irc.oftc.net
                        • https://ooni.nu/
                        • https://gitweb.torproject.org/ooni-probe.git

Saturday, June 30, 12
Saturday, June 30, 12
Thank you for your
                               attention!
                        • art@torproject.org
                        • 0x150FE210
                          46E5 EF37 DE26 4EA6 8DCF
                          53EA E3A2 1297 150F E210
                        • twitter: @hellais

Saturday, June 30, 12
20




Saturday, June 30, 12
21




Saturday, June 30, 12

Weitere ähnliche Inhalte

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Tor censorship 2012, OONI

  • 1. Tor e la Censura Come i gorverni hanno censurato Tor e come i pacchetti vengono liberati. Saturday, June 30, 12
  • 2. $ whoami • Arturo `hellais` Filastò • Tor Project hacker • Random GlobaLeaks Developer • I develop Free Software for Freedom Saturday, June 30, 12
  • 3. Surveillance • Censorship is a subset of surveillance • If you are censoring something you are surveilling everything Saturday, June 30, 12
  • 4. “The Net interprets censorship as damage and routes around it.” - John Gilmore; TIME magazine (6 December 1993) Saturday, June 30, 12
  • 5. What is Internet Filtering? • Is a form of non democratic oppression on people • It allows those in power to subvert reality Saturday, June 30, 12
  • 6. FilterNet • It’s a distortion of what is in reality the internet. • Follows the subjectiveness of the authorities • This does not help humanity Saturday, June 30, 12
  • 7. There is no just censorship. • Internet filtering is happening in China, Iran, Syria, but also in Italy, UK, Netherlands. • The only solution to what is considered by some wrong information is more information. Saturday, June 30, 12
  • 8. Tor and Censorship • Tor is born as anonymity tool • Censorship circumvention was a side effect Saturday, June 30, 12
  • 9. Brief Timeline of Tor Censorship • 2002 - The Source code for Tor is released • 2006, April - Thailand - DNS Filtering of tpo • 2006 - Websense/netfilter - Block Tor based on Tor GET requests • 2007 - Iran, Saudi - Blocks Tor thanks to Websense For more details on • 2009, Iran throttles SSL these events see, “How • 2009, Tunisia - Smartfilter to block all expect 443, 80 governments have tried • 2009, China blocks public relays to block Tor” • 2009 - Tor bridges are introduced • 2010 - China starts collecting and blocking bridges • 2011 - Iran by DPI on DH parameter in SSL • 2011 - Egypt selected targetted sites for blocking • 2011 - Lybia, throttling to limit use • 2011 - Syria, DPI on Tor’s TLS renegotiation and killed connections • 2011 - Iran DPI on SSL and TLS certificate timeline Saturday, June 30, 12
  • 10. What has happened in the past months? • 9 February 2012, Iran total SSL blockage • 2012, China proactive censorship evolutions • February - March 2012, Kazakhstan • 22 May 2012, Ethiopia • 25 June 2012, UAE, Tor blocking via DPI Saturday, June 30, 12
  • 11. Iran SSL Blockage • Deep packet inspection (DPI) of SSL traffic • Selective blocking of IP Address and TCP port combinations • Some keyword filtering • Not nationwide, certain areas no SSL traffic. • February 2012, First real world deployment of obfsproxy Saturday, June 30, 12
  • 13. China evolutions • Blocking Techniques • IP Blocking (layer 3) • IP:Port blocking (layer 4) • RST based filtering (layer 4, active, easy circumvention) • HTTP blocking (layer 5) • Detection techniques • Active probing of *every* SSL connection (speaking Tor protocol) • Tor fingerprints for TLS Helo • Philip Winter, Fabio Pietrosanti worked on understanding active chinese probing. Saturday, June 30, 12
  • 14. February - March 2012 Kazakhstan • In response to protests in Zhanaozen • Previously • IP address blocking • DNS based blocking • DPI SSL blocking • JSC KazTransCom starts blocking SSL traffic based on client key exchange • Some businesses affected (no SSL, no IPSEC, no PPTP, no certain VPNs) • Obfsproxy used Saturday, June 30, 12
  • 15. February - March 2012 Kazakhstan Saturday, June 30, 12
  • 16. 22 May 2012 Ethiopia • Stateless DPI looking for Tor TLS Server Helo • Research conducted by phw, naif • Patch for bridge #6045 Saturday, June 30, 12
  • 17. 22 May 2012 Ethiopia Saturday, June 30, 12
  • 18. 25 June 2012 UAE • The Emirates Telecommunications Corporation, also known as Etisalat, started blocking Tor using DPI • Evasion trough • Special patch for bridges that removed fingerprint • Obfsproxy Saturday, June 30, 12
  • 19. What we are doing? • Help people access information Anonymously (Tor) • Help people circumvent censorship (Tor, Tor Bridges) • Measure Internet filtering in the world (OONI-Probe) • Help people speak freely and anonymously (Tor Hidden Services, APAF) Saturday, June 30, 12
  • 20. OONI • Open Observatory of Network interference • Provide a methodology and framework • Strong focus on Openness Saturday, June 30, 12
  • 21. Why OONI? • A lot of tools exist, but are either: • Closed source • Closed methodologies • Closed data • OONI is to be: • Free Software • using Open and described methodologies • publishing all the collected data with Open License Saturday, June 30, 12
  • 22. Open Methodologies • This means that the research is reproducible • People seeing the results can evaluate the accuracy of the testing strategy Saturday, June 30, 12
  • 23. Free Software • Free software for freedom • Means that anybody can base their censorship research on OONI • This allows code reuse and knowledge sharing • https://gitweb.torproject.org/ooni-probe.git Saturday, June 30, 12
  • 24. Open Data • This allows people to independently verify the results • Open License (Creative Commons by Attribution) • People will independently draw their conclusions based on the *data* • Data driven journalism, Political Science studies, Anti-Censorship activism. Saturday, June 30, 12
  • 25. What it detects • It’s goals is to detect: • Network filtering (“Is my network traffic being tampered with?”) • Content restrictions (“What is being blocked?”) • Filtering technique (“How is it being blocked?”, “What software are they using?”) Saturday, June 30, 12
  • 28. OONIB • Distributed backend for: • Assist in running of certain tests • Two way traceroute • Echo server • DNS server • HTTP server • Control Channel • Collect reports from probes Saturday, June 30, 12
  • 29. OONI-probe • The actual measurement tool • Includes the core of the test logic • Takes an input and performs measurements on the test network • It can run the test on the local network or send it to a remote Node (SOCKS, OONIProxy, PlanetLab, etc.) Saturday, June 30, 12
  • 31. Test Categorization • Traffic manipulation • “Is there surveillance, of what kind?” • Content blocking • “Is there censorship?” • “What is being censored?” Saturday, June 30, 12
  • 32. Traffic Manipulation examples • Two way traceroute If there is a difference between an inbound traceroute and an outbound traceroute for certain source and destination ports this may be an indication of traffic being routed to interception de- vices. • Header field manipulation By varying the capitalization and adding certain headers to layer 7 protocols it is possible to detect on the receiving end if the traffic has been tampered with. Saturday, June 30, 12
  • 33. Content Blocking examples • HTTP Host This involves changing the Host header field of an HTTP request to that of the site one wishes to check for censorship. • DNS lookup This involves doing a DNS lookup for the in question hostname. If the lookup result does not match the expected result the site is marked as being censored. • Keyword filtering This involves sending an receiving data that contains certain keywords and matching for censorship. It is possible to use bisection method to understand what subset of keywords are triggering the filter. • HTTP scan This involves doing a full connection to the in question site. If the content does not match the expected result then a censored flag is raised. • Traceroute This involves doing TCP, UDP, ICMP traceroute for certain destination addresses if there are discrepancies in the paths with locations in the vicinities then a censorship flag is raised. • RST packet detection This involves attempting to con- nect to a certain destination and checking if the client gets back a RST packet. Saturday, June 30, 12
  • 34. Implementation details • Written in Python • Based on twisted • Provides scapy twisted integration • Is currently a prototype. • Expect problems and to need to have to use the source • Please kill bugs • Parts of OONIB implemented, no remote reporting, OONI- probe runs only locally Saturday, June 30, 12
  • 35. Recent impact T-Mobile USA Saturday, June 30, 12
  • 37. Recent Impact Handara Palestine • Blockage of politically oriented websites Saturday, June 30, 12
  • 38. Future • Keep hacking on OONI • Finish the architecture specification • Get a beta release of OONI for December 2012. • Perform measurements in all the world. Saturday, June 30, 12
  • 39. Come hack with us :) • https://www.torproject.org/ • #tor, #tor-dev, #ooni irc.oftc.net • https://ooni.nu/ • https://gitweb.torproject.org/ooni-probe.git Saturday, June 30, 12
  • 41. Thank you for your attention! • art@torproject.org • 0x150FE210 46E5 EF37 DE26 4EA6 8DCF 53EA E3A2 1297 150F E210 • twitter: @hellais Saturday, June 30, 12