SlideShare a Scribd company logo
1 of 37
Net Neutrality A primer
Network Neutrality The promise of the Internet Means networks should be dumb Because for once, dumb is good: Dumb networks are necessary for open and free communication Key to innovation The promise of the Internet
Who wouldn’t want this? Telecom providers feel left out of the Internet economy :-( Dear Google: We’re the reason you’re successful. Shouldn’t you pay us for all the traffic we bring you? Internet Service Providers want to ration bandwidth by application Create tiered access “value-add” for the consumer  BitTorrent and MMORPGs? $$$
Their needs
The Internets: Not a truck
How? Traffic shaping Deep Packet Inspection Telecom provider buys special box Special box peeks into your internet connections Tries to identify applications and services using known patterns Even encrypted protocols have identifiable patterns..
 Meanwhile…
#iranelection JUNE 2009, TEHRAN
Censorship in Iran Between 5 and 10 million websites, according to government statements Dissident and reformist political content Secular viewpoints Ba’hai faith, Kurdish movements Sins: Pornography, drug, alcohol, gambling Foreign media sites Tools for circumventing filters 9% of all Farsi blogs Myspace, Orkut, Flickr, Bebo, Metacafe, Photobucket, Del.ic.io.us
And during the 2009 election..
Iran Facts 23 million Internet users in Iran (28 million in Canada) 35% of the Iranian population 60,000 active Farsi blogs 1/3 of the Iranian population is between 15 and 29 years old
Circumventing Censorship SSL encrypted proxy servers Freegate Tor OpenVPN tunnels SSH tunnels
Iran blocking ports? We needed to know if it was true that connections originating inside Iran were being blocked by port We had no friends in Iran to help us test this Then we had an idea..
Testing Connectivity from Within Iran Follow these steps: Step 1: Google for publicly accessible FTP server Step 2: Connect with FTP client and initiate active mode data connection back to client Step 3: Wait to see if connection successfully completes or not Implemented in a program that did this automatically Link at the end of presentation
Results So how many ports were being blocked? None!
However.. There were credible reports from Iran of connectivity problems A pattern emerged Affected connections are slow, very slow The port does not matter Destination does not matter What matters is the protocol you’re using to communicate
An experiment We wanted to verify a theory that deep packet inspection technology was behind the censorship The SSH protocol was chosen Modifications were made to OpenSSH to fully encrypt the initial handshake To avoid detection by deep packet inspection technology
Result Significant performance differences observed between normal SSH and the modified SSH This strongly suggested that some sort of deep packet inspection technology was being used  Later, sources in Iran credibly claimed that Western technology was being used to implement state censorship policy Packet shaping, deep packet inspection technology Specific products cited
Conclusion By definition, deep-packet inspection, packet shaping technology is censorship technology The introduction of a policy of service or application preference, an intentional bias The technology is not evil But it can be Similarly, the export of technology to Iran is not a bad thing
Thank you!
Links http://opennet.net/research/profiles/iran http://github.com/brl/ftpscan http://github.com/brl/obfuscated-ssh E-mail bruce@netifera.com drma@mac.com

More Related Content

What's hot

Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
Ashley Raymond
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 

What's hot (15)

Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
p2p
p2pp2p
p2p
 
Week10
Week10Week10
Week10
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 

Viewers also liked

Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
mmentis117
 

Viewers also liked (7)

2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on Facebook
 
Censorship
CensorshipCensorship
Censorship
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More Inclusive
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.
 

Similar to Net Neutrality and Internet Censorship

Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
imec.archive
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
Eric Klinker
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
Brenda Thomas
 
chapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfchapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdf
study material
 

Similar to Net Neutrality and Internet Censorship (20)

Dw communication
Dw communicationDw communication
Dw communication
 
Darknet
DarknetDarknet
Darknet
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
January 2015 Newsletter
January 2015 Newsletter January 2015 Newsletter
January 2015 Newsletter
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
The Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key ChallengesThe Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key Challenges
 
E book governmentblockchain
E book governmentblockchainE book governmentblockchain
E book governmentblockchain
 
Blockchain Application Development
Blockchain Application DevelopmentBlockchain Application Development
Blockchain Application Development
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
set zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfset zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdf
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of things
 
Peer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfPeer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdf
 
chapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfchapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdf
 
Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Net Neutrality and Internet Censorship

  • 2. Network Neutrality The promise of the Internet Means networks should be dumb Because for once, dumb is good: Dumb networks are necessary for open and free communication Key to innovation The promise of the Internet
  • 3. Who wouldn’t want this? Telecom providers feel left out of the Internet economy :-( Dear Google: We’re the reason you’re successful. Shouldn’t you pay us for all the traffic we bring you? Internet Service Providers want to ration bandwidth by application Create tiered access “value-add” for the consumer BitTorrent and MMORPGs? $$$
  • 5.
  • 7. How? Traffic shaping Deep Packet Inspection Telecom provider buys special box Special box peeks into your internet connections Tries to identify applications and services using known patterns Even encrypted protocols have identifiable patterns..
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23. Censorship in Iran Between 5 and 10 million websites, according to government statements Dissident and reformist political content Secular viewpoints Ba’hai faith, Kurdish movements Sins: Pornography, drug, alcohol, gambling Foreign media sites Tools for circumventing filters 9% of all Farsi blogs Myspace, Orkut, Flickr, Bebo, Metacafe, Photobucket, Del.ic.io.us
  • 24. And during the 2009 election..
  • 25. Iran Facts 23 million Internet users in Iran (28 million in Canada) 35% of the Iranian population 60,000 active Farsi blogs 1/3 of the Iranian population is between 15 and 29 years old
  • 26. Circumventing Censorship SSL encrypted proxy servers Freegate Tor OpenVPN tunnels SSH tunnels
  • 27.
  • 28. Iran blocking ports? We needed to know if it was true that connections originating inside Iran were being blocked by port We had no friends in Iran to help us test this Then we had an idea..
  • 29.
  • 30. Testing Connectivity from Within Iran Follow these steps: Step 1: Google for publicly accessible FTP server Step 2: Connect with FTP client and initiate active mode data connection back to client Step 3: Wait to see if connection successfully completes or not Implemented in a program that did this automatically Link at the end of presentation
  • 31. Results So how many ports were being blocked? None!
  • 32. However.. There were credible reports from Iran of connectivity problems A pattern emerged Affected connections are slow, very slow The port does not matter Destination does not matter What matters is the protocol you’re using to communicate
  • 33. An experiment We wanted to verify a theory that deep packet inspection technology was behind the censorship The SSH protocol was chosen Modifications were made to OpenSSH to fully encrypt the initial handshake To avoid detection by deep packet inspection technology
  • 34. Result Significant performance differences observed between normal SSH and the modified SSH This strongly suggested that some sort of deep packet inspection technology was being used Later, sources in Iran credibly claimed that Western technology was being used to implement state censorship policy Packet shaping, deep packet inspection technology Specific products cited
  • 35. Conclusion By definition, deep-packet inspection, packet shaping technology is censorship technology The introduction of a policy of service or application preference, an intentional bias The technology is not evil But it can be Similarly, the export of technology to Iran is not a bad thing
  • 37. Links http://opennet.net/research/profiles/iran http://github.com/brl/ftpscan http://github.com/brl/obfuscated-ssh E-mail bruce@netifera.com drma@mac.com