SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
2012 in review: Tor and the
   censorship arms race

   / Runa A. Sandvik / runa@torproject.org / @runasand
Today, we’re going to look at how Tor is being
  blocked and censored around the world.
In the beginning...
“Tor is free software and an open network
that helps you defend against a form of
network surveillance that threatens personal
freedom and privacy, confidential business
activities and relationships, and state
security known as traffic analysis.”
History

• Originally designed, implemented, and
  deployed as a third-generation onion
  routing project of the U.S. Naval Research
  Laboratory

• Developed for the primary purpose of
  protecting government communications

• The source code was released in 2002, the
  design paper was published in 2004
How Tor works
The arms race begins...
Indicators

• Increase in downloads of the Tor Browser
  Bundle: https://webstats.torproject.org/

• Anomaly-based censorship-detection
  system: https://metrics.torproject.org/

• Unblocking of the Tor Project website
• Increase in emails sent to the Tor help desk
  at help@rt.torproject.org
2006 - 2009 (1)

• Thailand (2006): DNS filtering of
  torproject.org

• Smartfilter/Websense (2006): Tor used
  HTTP for fetching directory info, cut all
  HTTP GET requests for “/tor/...”

• Iran (2009): throttled SSL traffic, got Tor
  for free because it looked like Firefox
  +Apache
2006 - 2009 (2)


• Tunisia (2009): blocked all but port 80+443,
  could also block port 443 especially for you

• China (2009): blocked all public relays and
  enumerated one of the bridge buckets
Since then...
Between 2010 and 2012

•   Tunisia: from 800 to 1,000

•   Egypt: from 600 to 1,500

•   Syria: from 600 to 15,000

•   Iran: from 7,000 to 40,000

•   All countries: from 200,000 to 500,000
China (October 2011)

• Directory authorities, public relays, and
  bridges have been blocked for a while

• GFW will identify a Tor connection, initiate
  active scanning, attempt to establish a Tor
  connection with the destination host and,
  if successful, block the IP:port.

• Private bridges are blocked as soon as a
  user in China connects
UK and US (January 2012)

• The HTTP version of the Tor Project
  website, along with other legitimate sites,
  was found to be filtered by a number of
  mobile operators

• Vodafone, Three, O2, and T-Mobile in the
  UK, as well as T-Mobile in the US

• See http://ooni.nu/, the Tor Project blog,
  and the Mobile Internet Censorship report
  by the Open Rights Group for details
Iran (February 2012)

• DPI on SSL DH modulus (Jan 2011), DPI on
  SSL certificate expiration time (Sept 2011)

• Iranian government ramped up censorship
  in three ways: deep packet inspection of
  SSL traffic, selective blocking of IP
  addresses, and some keyword filtering

• Preparing for a “halal” Internet, first phase
  of this project will be rolled out in the
  beginning of September
Kazakhstan (February 2012)

• Target SSL-based protocols for blocking;
  Tor, IPsec, PPT-based technologies, and
  some SSL-based VPNs

• Fingerprints Tor on the TLS client cipher
  list in the ClientHello record, parts of the
  Tor TLS server record, and probably more

• Will want to reanalyze the data we have
  from this blocking event
Ethiopia (May 2012)


• In the beginning, DPI devices were only
  looking for Tor TLS server hellos sent by
  relays or bridges to Tor clients

• Since the middle of July, DPI devices are also
  looking for TLS client hellos as sent by Tor
  clients < version 0.2.3.17-beta
UAE (June 2012)

• The Emirates Telecommunications
  Corporation, also known as Etisalat,
  started blocking Tor using DPI on June 25
  2012

• We are still analyzing the data from this
  blocking event

• Tor bridges with a patch that removes
  0x0039 from SERVER_CIPHER_LIST seem to
  work, so does Obfsproxy
The Philippines (May 2012)


• We have only heard from one user in the
  Philippines, he was able to successfully
  connect to Tor without using a bridge

• We have no other data about this blocking
  event, apart from the metrics user graph
Jordan (June 2012)


• User in Jordan reported seeing a fake
  certificate for torproject.org

• Assumed to be similar to the DigiNotar and
  Comodo incidents, turned out not to be the
  case
Cyberoam SSL CA
CVE-2012-3372


• Cyberoam UTM device with malware scan
• All devices share the same CA certificate
• Hence the same private key
• Any Cyberoam device can intercept traffic
  from any other
Documentation, tools, and solutions
Public key pinning - Chrome

• Certificate chain for torproject.org must
  now include a whitelisted public key

• Self-signed certificate will display a
  warning, incorrect certificate will fail hard

• XP prior to SP3 will have issues with
  SHA256 signed certificates, including the
  one for torproject.org
Censorship Wiki

• Collect information about the status of
  blocking events around the world,
  circumvention research, useful tools, etc

• Contains information about all the blocking
  events I have covered today, minus
  Wireshark network captures

• https://trac.torproject.org/projects/tor/
  wiki/doc/OONI/censorshipwiki
Obfsproxy

• Rolled out in February 2012
• Makes it easier to change how Tor traffic
  looks on the network, requires volunteers
  to set up special bridges

• FlashProxy, StegoTorus, SkypeMorph, Dust
• https://www.torproject.org/projects/
  obfsproxy.html.en
ooni-probe


• A part of the Open Observatory of Network
  Interference project

• Can be used to collect high-quality data
  about Internet censorship and surveillance

• Will eventually be able to determine how
  different DPI devices are blocking Tor
Questions?


• help@rt.torproject.org and tor-
  dev@lists.torproject.org

• IRC: #tor and #tor-dev on irc.oftc.net
• Twitter: @torproject, @runasand
• runa@torproject.org

Weitere ähnliche Inhalte

Was ist angesagt?

2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick takeAndrew Lewman
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceFelipe Prado
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Torantitree
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknetDvir Barel
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 

Was ist angesagt? (20)

2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take2009 06-03-cfp2009-tor-quick take
2009 06-03-cfp2009-tor-quick take
 
Dark web
Dark webDark web
Dark web
 
Tor Network
Tor NetworkTor Network
Tor Network
 
TOR: The Onion Router
TOR: The Onion RouterTOR: The Onion Router
TOR: The Onion Router
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
Tor Pivoting Networks Share
Tor Pivoting Networks Share Tor Pivoting Networks Share
Tor Pivoting Networks Share
 
Anonymity Systems: Tor
Anonymity Systems: TorAnonymity Systems: Tor
Anonymity Systems: Tor
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Tor
TorTor
Tor
 
Tor
TorTor
Tor
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Presentation darknet
Presentation darknetPresentation darknet
Presentation darknet
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 

Andere mochten auch

Net Neutrality and Internet Censorship
Net Neutrality and Internet CensorshipNet Neutrality and Internet Censorship
Net Neutrality and Internet Censorshipbleidl
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on FacebookSauvik Das
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillanceZied Jebali
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveMonica Feliu-Mojer, Ph.D.
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.Olesia Velychko
 

Andere mochten auch (12)

Net Neutrality and Internet Censorship
Net Neutrality and Internet CensorshipNet Neutrality and Internet Censorship
Net Neutrality and Internet Censorship
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on Facebook
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Censorship
CensorshipCensorship
Censorship
 
Internet surveillance
Internet surveillanceInternet surveillance
Internet surveillance
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More Inclusive
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.
 

Ähnlich wie Tor Censorship Arms Race Review 2012

Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
TOR... ALL THE THINGS Whitepaper
TOR... ALL THE THINGS WhitepaperTOR... ALL THE THINGS Whitepaper
TOR... ALL THE THINGS WhitepaperCrowdStrike
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)Kaustubh Joshi
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
UTOPOLL白皮書.pdf
UTOPOLL白皮書.pdfUTOPOLL白皮書.pdf
UTOPOLL白皮書.pdfaipaypoll
 

Ähnlich wie Tor Censorship Arms Race Review 2012 (20)

Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
.Onion
.Onion.Onion
.Onion
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
ION Santiago: Lock It Up: TLS for Network Operators
ION Santiago: Lock It Up: TLS for Network OperatorsION Santiago: Lock It Up: TLS for Network Operators
ION Santiago: Lock It Up: TLS for Network Operators
 
Darknet
DarknetDarknet
Darknet
 
Tor
TorTor
Tor
 
TOR... ALL THE THINGS Whitepaper
TOR... ALL THE THINGS WhitepaperTOR... ALL THE THINGS Whitepaper
TOR... ALL THE THINGS Whitepaper
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Information security using onion routing(tor)
Information security using onion routing(tor)Information security using onion routing(tor)
Information security using onion routing(tor)
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
UTOPOLL白皮書.pdf
UTOPOLL白皮書.pdfUTOPOLL白皮書.pdf
UTOPOLL白皮書.pdf
 

Mehr von 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 

Mehr von 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CO...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 

Tor Censorship Arms Race Review 2012

  • 1. 2012 in review: Tor and the censorship arms race / Runa A. Sandvik / runa@torproject.org / @runasand
  • 2. Today, we’re going to look at how Tor is being blocked and censored around the world.
  • 4. “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.”
  • 5. History • Originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory • Developed for the primary purpose of protecting government communications • The source code was released in 2002, the design paper was published in 2004
  • 7.
  • 8.
  • 9. The arms race begins...
  • 10. Indicators • Increase in downloads of the Tor Browser Bundle: https://webstats.torproject.org/ • Anomaly-based censorship-detection system: https://metrics.torproject.org/ • Unblocking of the Tor Project website • Increase in emails sent to the Tor help desk at help@rt.torproject.org
  • 11. 2006 - 2009 (1) • Thailand (2006): DNS filtering of torproject.org • Smartfilter/Websense (2006): Tor used HTTP for fetching directory info, cut all HTTP GET requests for “/tor/...” • Iran (2009): throttled SSL traffic, got Tor for free because it looked like Firefox +Apache
  • 12. 2006 - 2009 (2) • Tunisia (2009): blocked all but port 80+443, could also block port 443 especially for you • China (2009): blocked all public relays and enumerated one of the bridge buckets
  • 14. Between 2010 and 2012 • Tunisia: from 800 to 1,000 • Egypt: from 600 to 1,500 • Syria: from 600 to 15,000 • Iran: from 7,000 to 40,000 • All countries: from 200,000 to 500,000
  • 15. China (October 2011) • Directory authorities, public relays, and bridges have been blocked for a while • GFW will identify a Tor connection, initiate active scanning, attempt to establish a Tor connection with the destination host and, if successful, block the IP:port. • Private bridges are blocked as soon as a user in China connects
  • 16. UK and US (January 2012) • The HTTP version of the Tor Project website, along with other legitimate sites, was found to be filtered by a number of mobile operators • Vodafone, Three, O2, and T-Mobile in the UK, as well as T-Mobile in the US • See http://ooni.nu/, the Tor Project blog, and the Mobile Internet Censorship report by the Open Rights Group for details
  • 17. Iran (February 2012) • DPI on SSL DH modulus (Jan 2011), DPI on SSL certificate expiration time (Sept 2011) • Iranian government ramped up censorship in three ways: deep packet inspection of SSL traffic, selective blocking of IP addresses, and some keyword filtering • Preparing for a “halal” Internet, first phase of this project will be rolled out in the beginning of September
  • 18.
  • 19. Kazakhstan (February 2012) • Target SSL-based protocols for blocking; Tor, IPsec, PPT-based technologies, and some SSL-based VPNs • Fingerprints Tor on the TLS client cipher list in the ClientHello record, parts of the Tor TLS server record, and probably more • Will want to reanalyze the data we have from this blocking event
  • 20.
  • 21. Ethiopia (May 2012) • In the beginning, DPI devices were only looking for Tor TLS server hellos sent by relays or bridges to Tor clients • Since the middle of July, DPI devices are also looking for TLS client hellos as sent by Tor clients < version 0.2.3.17-beta
  • 22.
  • 23.
  • 24. UAE (June 2012) • The Emirates Telecommunications Corporation, also known as Etisalat, started blocking Tor using DPI on June 25 2012 • We are still analyzing the data from this blocking event • Tor bridges with a patch that removes 0x0039 from SERVER_CIPHER_LIST seem to work, so does Obfsproxy
  • 25.
  • 26. The Philippines (May 2012) • We have only heard from one user in the Philippines, he was able to successfully connect to Tor without using a bridge • We have no other data about this blocking event, apart from the metrics user graph
  • 27.
  • 28. Jordan (June 2012) • User in Jordan reported seeing a fake certificate for torproject.org • Assumed to be similar to the DigiNotar and Comodo incidents, turned out not to be the case
  • 30. CVE-2012-3372 • Cyberoam UTM device with malware scan • All devices share the same CA certificate • Hence the same private key • Any Cyberoam device can intercept traffic from any other
  • 32. Public key pinning - Chrome • Certificate chain for torproject.org must now include a whitelisted public key • Self-signed certificate will display a warning, incorrect certificate will fail hard • XP prior to SP3 will have issues with SHA256 signed certificates, including the one for torproject.org
  • 33. Censorship Wiki • Collect information about the status of blocking events around the world, circumvention research, useful tools, etc • Contains information about all the blocking events I have covered today, minus Wireshark network captures • https://trac.torproject.org/projects/tor/ wiki/doc/OONI/censorshipwiki
  • 34. Obfsproxy • Rolled out in February 2012 • Makes it easier to change how Tor traffic looks on the network, requires volunteers to set up special bridges • FlashProxy, StegoTorus, SkypeMorph, Dust • https://www.torproject.org/projects/ obfsproxy.html.en
  • 35. ooni-probe • A part of the Open Observatory of Network Interference project • Can be used to collect high-quality data about Internet censorship and surveillance • Will eventually be able to determine how different DPI devices are blocking Tor
  • 36. Questions? • help@rt.torproject.org and tor- dev@lists.torproject.org • IRC: #tor and #tor-dev on irc.oftc.net • Twitter: @torproject, @runasand • runa@torproject.org