15
Anticensorship in the Network Infrastructure Eric Wustrow University of Michigan

Anticensorship in the Network Infrastructure Eric Wustrow University of Michigan

Embed Size (px)

Citation preview

Anticensorship in the Network Infrastructure

Eric Wustrow

University of Michigan

2

Background | Internet Censorship

Pervasive censorshipSubstantial censorship

Changing situationLittle or no censorship

Selective censorship

3

Censor … controls client’s network, but not external network

… blocks according to a blacklist… allows HTTPS connections to non-blocked sites

Threat Model

4

Telex | Overview

5

Telex | Overview

6

Telex | Overview

7

Telex | Overview

8

Telex | Overview

9

Telex | Overview

10

Prototype | Test Deployment

Hosted sites

Single Telex Station on lab-scale “ISP” at Michigan

Blocked.telex.ccSimulated censored site

only reachable via Telex

NotBlocked.telex.ccUnobjectionable content *

Inline BlockingAsymmetric flows

11

Telex v2: Passive tap

Client ServerISP Proxy

“GET / HTTP/1.1\r\nX-Ignore: \x81\x28\x66 …”

ACK [seq=Y,

ack=X]“PROXY OK” [seq=Y, ack=X, len=M]

ACK [seq=X, ack=Y+M]ack != Y?

“\x95\x1f\x6b\x27\xe2 … \xc8\x3f\x22 …”Tag:

Plaintext:

Ciphertext:

Plaintext:

“GET http://blocked.com/ …” [seq=X, ack=Y+M]

Plaintext:

“HTTP/1.1 200 OK … <html> ….”

Plaintext:

New architecture -- passive ISP tap

TLS Handshake

13

New architecture -- passive ISP tap

• Pros– No inline blocking required, only passive

tap–Works with asymmetric flows (client ->

server)

• Cons– Censor can use active attacks• (though we can use “active defenses”)

14

Anticensorship in the Network Infrastructure

• Future work– Looking for ISPs willing to help• Technical feedback• Prototype deployment

– Strategies for optimal deployment– Improving traffic analysis defense

https://telex.cc

Anticensorship in theNetwork Infrastructure

Eric WustrowColleen M. SwansonScott WolchokIan GoldbergJ. Alex Halderman