SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Tor e la Censura
                        Come i gorverni hanno censurato Tor e come i
                                 pacchetti vengono liberati.




Saturday, June 30, 12
$ whoami

                        • Arturo `hellais` Filastò
                        • Tor Project hacker
                        • Random GlobaLeaks Developer
                        • I develop Free Software for Freedom

Saturday, June 30, 12
Surveillance

                        • Censorship is a
                          subset of
                          surveillance
                        • If you are censoring
                          something you are
                          surveilling everything



Saturday, June 30, 12
“The Net interprets censorship as damage and
                                      routes around it.”
                                   - John Gilmore; TIME magazine (6
                                      December 1993)




Saturday, June 30, 12
What is Internet
                                Filtering?
                        • Is a form of non
                          democratic
                          oppression on
                          people
                        • It allows those in
                          power to subvert
                          reality


Saturday, June 30, 12
FilterNet

                        • It’s a distortion of what is in reality the
                          internet.
                        • Follows the subjectiveness of the
                          authorities
                        • This does not help humanity

Saturday, June 30, 12
There is no just
                                censorship.
                        • Internet filtering is happening in China,
                          Iran, Syria, but also in Italy, UK, Netherlands.
                        • The only solution to what is considered by
                          some wrong information is more
                          information.




Saturday, June 30, 12
Tor and Censorship

                        • Tor is born as
                          anonymity tool
                        • Censorship
                          circumvention
                          was a side effect




Saturday, June 30, 12
Brief Timeline of Tor
                                Censorship
                        •   2002 - The Source code for Tor is released
                        •   2006, April - Thailand - DNS Filtering of tpo
                        •   2006 - Websense/netfilter - Block Tor based on Tor GET requests
                        •   2007 - Iran, Saudi - Blocks Tor thanks to Websense
                                                                                                    For more details on
                        •   2009, Iran throttles SSL                                              these events see, “How
                        •   2009, Tunisia - Smartfilter to block all expect 443, 80                governments have tried
                        •   2009, China blocks public relays                                           to block Tor”
                        •   2009 - Tor bridges are introduced
                        •   2010 - China starts collecting and blocking bridges
                        •   2011 - Iran by DPI on DH parameter in SSL
                        •   2011 - Egypt selected targetted sites for blocking
                        •   2011 - Lybia, throttling to limit use
                        •   2011 - Syria, DPI on Tor’s TLS renegotiation and killed connections
                        •   2011 - Iran DPI on SSL and TLS certificate timeline




Saturday, June 30, 12
What has happened in
                         the past months?
                        • 9 February 2012, Iran total SSL blockage
                        • 2012, China proactive censorship
                          evolutions
                        • February - March 2012, Kazakhstan
                        • 22 May 2012, Ethiopia
                        • 25 June 2012, UAE, Tor blocking via DPI
Saturday, June 30, 12
Iran SSL Blockage
                        • Deep packet inspection (DPI) of SSL traffic
                        • Selective blocking of IP Address and TCP
                          port combinations
                        • Some keyword filtering
                        • Not nationwide, certain areas no SSL traffic.
                        • February 2012, First real world deployment
                          of obfsproxy


Saturday, June 30, 12
Iran SSL Blockage




Saturday, June 30, 12
China evolutions
                        •   Blocking Techniques
                            •   IP Blocking (layer 3)
                            •   IP:Port blocking (layer 4)
                            •   RST based filtering (layer 4, active, easy circumvention)
                            •   HTTP blocking (layer 5)
                        •   Detection techniques
                            •   Active probing of *every* SSL connection (speaking Tor protocol)
                            •   Tor fingerprints for TLS Helo
                            •   Philip Winter, Fabio Pietrosanti worked on understanding active
                                chinese probing.




Saturday, June 30, 12
February - March 2012
                         Kazakhstan
                        •   In response to protests in Zhanaozen
                        •   Previously
                            •   IP address blocking
                            •   DNS based blocking
                        •   DPI SSL blocking
                            •   JSC KazTransCom starts blocking SSL traffic based on client
                                key exchange
                            •   Some businesses affected (no SSL, no IPSEC, no PPTP, no
                                certain VPNs)
                            •   Obfsproxy used



Saturday, June 30, 12
February - March 2012
                         Kazakhstan




Saturday, June 30, 12
22 May 2012
                                   Ethiopia

                        • Stateless DPI looking for Tor TLS Server
                          Helo
                        • Research conducted by phw, naif
                        • Patch for bridge #6045


Saturday, June 30, 12
22 May 2012
                          Ethiopia




Saturday, June 30, 12
25 June 2012
                                     UAE
                        • The Emirates Telecommunications
                          Corporation, also known as Etisalat, started
                          blocking Tor using DPI
                        • Evasion trough
                         • Special patch for bridges that removed
                            fingerprint
                         • Obfsproxy
Saturday, June 30, 12
What we are doing?
                        • Help people access information
                          Anonymously (Tor)
                        • Help people circumvent censorship (Tor, Tor
                          Bridges)
                        • Measure Internet filtering in the world
                          (OONI-Probe)
                        • Help people speak freely and anonymously
                          (Tor Hidden Services, APAF)


Saturday, June 30, 12
OONI

                        • Open Observatory of Network
                          interference
                        • Provide a methodology and framework
                        • Strong focus on Openness


Saturday, June 30, 12
Why OONI?
                        •   A lot of tools exist, but are either:
                            •   Closed source
                            •   Closed methodologies
                            •   Closed data
                        •   OONI is to be:
                            •   Free Software
                            •   using Open and described methodologies
                            •   publishing all the collected data with Open License


Saturday, June 30, 12
Open Methodologies

                        • This means that the research is
                          reproducible
                        • People seeing the results can evaluate the
                          accuracy of the testing strategy




Saturday, June 30, 12
Free Software
                        • Free software for freedom
                        • Means that anybody can base their
                          censorship research on OONI
                        • This allows code reuse and knowledge
                          sharing
                        • https://gitweb.torproject.org/ooni-probe.git

Saturday, June 30, 12
Open Data
                        • This allows people to independently verify
                          the results
                        • Open License (Creative Commons by
                          Attribution)
                        • People will independently draw their
                          conclusions based on the *data*
                        • Data driven journalism, Political Science
                          studies, Anti-Censorship activism.


Saturday, June 30, 12
What it detects
                        • It’s goals is to detect:
                          • Network filtering (“Is my network traffic
                            being tampered with?”)
                         • Content restrictions (“What is being
                            blocked?”)
                         • Filtering technique (“How is it being
                            blocked?”, “What software are they
                            using?”)


Saturday, June 30, 12
OONI Architecture 1/2




Saturday, June 30, 12
OONI Architecture 2/2




Saturday, June 30, 12
OONIB
                        •   Distributed backend for:
                            •   Assist in running of certain tests
                                •   Two way traceroute
                                •   Echo server
                                •   DNS server
                                •   HTTP server
                                •   Control Channel
                            •   Collect reports from probes


Saturday, June 30, 12
OONI-probe
                        • The actual measurement tool
                        • Includes the core of the test logic
                        • Takes an input and performs measurements
                          on the test network
                        • It can run the test on the local network or
                          send it to a remote Node (SOCKS,
                          OONIProxy, PlanetLab, etc.)


Saturday, June 30, 12
Reports




Saturday, June 30, 12
Test Categorization

                        • Traffic manipulation
                         • “Is there surveillance, of what kind?”
                        • Content blocking
                         • “Is there censorship?”
                         • “What is being censored?”

Saturday, June 30, 12
Traffic Manipulation
                                 examples
                        •   Two way traceroute If there is a difference
                            between an inbound traceroute and an outbound
                            traceroute for certain source and destination
                            ports this may be an indication of traffic being
                            routed to interception de- vices.
                        •   Header field manipulation By varying the
                            capitalization and adding certain headers to layer 7
                            protocols it is possible to detect on the receiving
                            end if the traffic has been tampered with.



Saturday, June 30, 12
Content Blocking
                                   examples
                        •   HTTP Host This involves changing the Host header field of an HTTP request to
                            that of the site one wishes to check for censorship.
                        •   DNS lookup This involves doing a DNS lookup for the in question hostname. If
                            the lookup result does not match the expected result the site is marked as being
                            censored.
                        •   Keyword filtering This involves sending an receiving data that contains certain
                            keywords and matching for censorship. It is possible to use bisection method to
                            understand what subset of keywords are triggering the filter.
                        •   HTTP scan This involves doing a full connection to the in question site. If the
                            content does not match the expected result then a censored flag is raised.
                        •   Traceroute This involves doing TCP, UDP, ICMP traceroute for certain destination
                            addresses if there are discrepancies in the paths with locations in the vicinities then
                            a censorship flag is raised.
                        •   RST packet detection This involves attempting to con- nect to a certain
                            destination and checking if the client gets back a RST packet.




Saturday, June 30, 12
Implementation details
                        •   Written in Python
                        •   Based on twisted
                        •   Provides scapy twisted
                            integration
                        •   Is currently a prototype.
                            •   Expect problems and to need
                                to have to use the source
                            •   Please kill bugs
                        •   Parts of OONIB implemented,
                            no remote reporting, OONI-
                            probe runs only locally




Saturday, June 30, 12
Recent impact
                        T-Mobile USA




Saturday, June 30, 12
Saturday, June 30, 12
Recent Impact
                            Handara Palestine

                        • Blockage of politically
                          oriented websites




Saturday, June 30, 12
Future

                        • Keep hacking on OONI
                        • Finish the architecture specification
                        • Get a beta release of OONI for December
                          2012.
                        • Perform measurements in all the world.

Saturday, June 30, 12
Come hack with us :)

                        • https://www.torproject.org/
                        • #tor, #tor-dev, #ooni irc.oftc.net
                        • https://ooni.nu/
                        • https://gitweb.torproject.org/ooni-probe.git

Saturday, June 30, 12
Saturday, June 30, 12
Thank you for your
                               attention!
                        • art@torproject.org
                        • 0x150FE210
                          46E5 EF37 DE26 4EA6 8DCF
                          53EA E3A2 1297 150F E210
                        • twitter: @hellais

Saturday, June 30, 12
20




Saturday, June 30, 12
21




Saturday, June 30, 12

Contenu connexe

Dernier

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Tor censorship 2012, OONI

  • 1. Tor e la Censura Come i gorverni hanno censurato Tor e come i pacchetti vengono liberati. Saturday, June 30, 12
  • 2. $ whoami • Arturo `hellais` Filastò • Tor Project hacker • Random GlobaLeaks Developer • I develop Free Software for Freedom Saturday, June 30, 12
  • 3. Surveillance • Censorship is a subset of surveillance • If you are censoring something you are surveilling everything Saturday, June 30, 12
  • 4. “The Net interprets censorship as damage and routes around it.” - John Gilmore; TIME magazine (6 December 1993) Saturday, June 30, 12
  • 5. What is Internet Filtering? • Is a form of non democratic oppression on people • It allows those in power to subvert reality Saturday, June 30, 12
  • 6. FilterNet • It’s a distortion of what is in reality the internet. • Follows the subjectiveness of the authorities • This does not help humanity Saturday, June 30, 12
  • 7. There is no just censorship. • Internet filtering is happening in China, Iran, Syria, but also in Italy, UK, Netherlands. • The only solution to what is considered by some wrong information is more information. Saturday, June 30, 12
  • 8. Tor and Censorship • Tor is born as anonymity tool • Censorship circumvention was a side effect Saturday, June 30, 12
  • 9. Brief Timeline of Tor Censorship • 2002 - The Source code for Tor is released • 2006, April - Thailand - DNS Filtering of tpo • 2006 - Websense/netfilter - Block Tor based on Tor GET requests • 2007 - Iran, Saudi - Blocks Tor thanks to Websense For more details on • 2009, Iran throttles SSL these events see, “How • 2009, Tunisia - Smartfilter to block all expect 443, 80 governments have tried • 2009, China blocks public relays to block Tor” • 2009 - Tor bridges are introduced • 2010 - China starts collecting and blocking bridges • 2011 - Iran by DPI on DH parameter in SSL • 2011 - Egypt selected targetted sites for blocking • 2011 - Lybia, throttling to limit use • 2011 - Syria, DPI on Tor’s TLS renegotiation and killed connections • 2011 - Iran DPI on SSL and TLS certificate timeline Saturday, June 30, 12
  • 10. What has happened in the past months? • 9 February 2012, Iran total SSL blockage • 2012, China proactive censorship evolutions • February - March 2012, Kazakhstan • 22 May 2012, Ethiopia • 25 June 2012, UAE, Tor blocking via DPI Saturday, June 30, 12
  • 11. Iran SSL Blockage • Deep packet inspection (DPI) of SSL traffic • Selective blocking of IP Address and TCP port combinations • Some keyword filtering • Not nationwide, certain areas no SSL traffic. • February 2012, First real world deployment of obfsproxy Saturday, June 30, 12
  • 13. China evolutions • Blocking Techniques • IP Blocking (layer 3) • IP:Port blocking (layer 4) • RST based filtering (layer 4, active, easy circumvention) • HTTP blocking (layer 5) • Detection techniques • Active probing of *every* SSL connection (speaking Tor protocol) • Tor fingerprints for TLS Helo • Philip Winter, Fabio Pietrosanti worked on understanding active chinese probing. Saturday, June 30, 12
  • 14. February - March 2012 Kazakhstan • In response to protests in Zhanaozen • Previously • IP address blocking • DNS based blocking • DPI SSL blocking • JSC KazTransCom starts blocking SSL traffic based on client key exchange • Some businesses affected (no SSL, no IPSEC, no PPTP, no certain VPNs) • Obfsproxy used Saturday, June 30, 12
  • 15. February - March 2012 Kazakhstan Saturday, June 30, 12
  • 16. 22 May 2012 Ethiopia • Stateless DPI looking for Tor TLS Server Helo • Research conducted by phw, naif • Patch for bridge #6045 Saturday, June 30, 12
  • 17. 22 May 2012 Ethiopia Saturday, June 30, 12
  • 18. 25 June 2012 UAE • The Emirates Telecommunications Corporation, also known as Etisalat, started blocking Tor using DPI • Evasion trough • Special patch for bridges that removed fingerprint • Obfsproxy Saturday, June 30, 12
  • 19. What we are doing? • Help people access information Anonymously (Tor) • Help people circumvent censorship (Tor, Tor Bridges) • Measure Internet filtering in the world (OONI-Probe) • Help people speak freely and anonymously (Tor Hidden Services, APAF) Saturday, June 30, 12
  • 20. OONI • Open Observatory of Network interference • Provide a methodology and framework • Strong focus on Openness Saturday, June 30, 12
  • 21. Why OONI? • A lot of tools exist, but are either: • Closed source • Closed methodologies • Closed data • OONI is to be: • Free Software • using Open and described methodologies • publishing all the collected data with Open License Saturday, June 30, 12
  • 22. Open Methodologies • This means that the research is reproducible • People seeing the results can evaluate the accuracy of the testing strategy Saturday, June 30, 12
  • 23. Free Software • Free software for freedom • Means that anybody can base their censorship research on OONI • This allows code reuse and knowledge sharing • https://gitweb.torproject.org/ooni-probe.git Saturday, June 30, 12
  • 24. Open Data • This allows people to independently verify the results • Open License (Creative Commons by Attribution) • People will independently draw their conclusions based on the *data* • Data driven journalism, Political Science studies, Anti-Censorship activism. Saturday, June 30, 12
  • 25. What it detects • It’s goals is to detect: • Network filtering (“Is my network traffic being tampered with?”) • Content restrictions (“What is being blocked?”) • Filtering technique (“How is it being blocked?”, “What software are they using?”) Saturday, June 30, 12
  • 28. OONIB • Distributed backend for: • Assist in running of certain tests • Two way traceroute • Echo server • DNS server • HTTP server • Control Channel • Collect reports from probes Saturday, June 30, 12
  • 29. OONI-probe • The actual measurement tool • Includes the core of the test logic • Takes an input and performs measurements on the test network • It can run the test on the local network or send it to a remote Node (SOCKS, OONIProxy, PlanetLab, etc.) Saturday, June 30, 12
  • 31. Test Categorization • Traffic manipulation • “Is there surveillance, of what kind?” • Content blocking • “Is there censorship?” • “What is being censored?” Saturday, June 30, 12
  • 32. Traffic Manipulation examples • Two way traceroute If there is a difference between an inbound traceroute and an outbound traceroute for certain source and destination ports this may be an indication of traffic being routed to interception de- vices. • Header field manipulation By varying the capitalization and adding certain headers to layer 7 protocols it is possible to detect on the receiving end if the traffic has been tampered with. Saturday, June 30, 12
  • 33. Content Blocking examples • HTTP Host This involves changing the Host header field of an HTTP request to that of the site one wishes to check for censorship. • DNS lookup This involves doing a DNS lookup for the in question hostname. If the lookup result does not match the expected result the site is marked as being censored. • Keyword filtering This involves sending an receiving data that contains certain keywords and matching for censorship. It is possible to use bisection method to understand what subset of keywords are triggering the filter. • HTTP scan This involves doing a full connection to the in question site. If the content does not match the expected result then a censored flag is raised. • Traceroute This involves doing TCP, UDP, ICMP traceroute for certain destination addresses if there are discrepancies in the paths with locations in the vicinities then a censorship flag is raised. • RST packet detection This involves attempting to con- nect to a certain destination and checking if the client gets back a RST packet. Saturday, June 30, 12
  • 34. Implementation details • Written in Python • Based on twisted • Provides scapy twisted integration • Is currently a prototype. • Expect problems and to need to have to use the source • Please kill bugs • Parts of OONIB implemented, no remote reporting, OONI- probe runs only locally Saturday, June 30, 12
  • 35. Recent impact T-Mobile USA Saturday, June 30, 12
  • 37. Recent Impact Handara Palestine • Blockage of politically oriented websites Saturday, June 30, 12
  • 38. Future • Keep hacking on OONI • Finish the architecture specification • Get a beta release of OONI for December 2012. • Perform measurements in all the world. Saturday, June 30, 12
  • 39. Come hack with us :) • https://www.torproject.org/ • #tor, #tor-dev, #ooni irc.oftc.net • https://ooni.nu/ • https://gitweb.torproject.org/ooni-probe.git Saturday, June 30, 12
  • 41. Thank you for your attention! • art@torproject.org • 0x150FE210 46E5 EF37 DE26 4EA6 8DCF 53EA E3A2 1297 150F E210 • twitter: @hellais Saturday, June 30, 12