SlideShare a Scribd company logo
1 of 37
Net Neutrality A primer
Network Neutrality The promise of the Internet Means networks should be dumb Because for once, dumb is good: Dumb networks are necessary for open and free communication Key to innovation The promise of the Internet
Who wouldn’t want this? Telecom providers feel left out of the Internet economy :-( Dear Google: We’re the reason you’re successful. Shouldn’t you pay us for all the traffic we bring you? Internet Service Providers want to ration bandwidth by application Create tiered access “value-add” for the consumer  BitTorrent and MMORPGs? $$$
Their needs
The Internets: Not a truck
How? Traffic shaping Deep Packet Inspection Telecom provider buys special box Special box peeks into your internet connections Tries to identify applications and services using known patterns Even encrypted protocols have identifiable patterns..
 Meanwhile…
#iranelection JUNE 2009, TEHRAN
Censorship in Iran Between 5 and 10 million websites, according to government statements Dissident and reformist political content Secular viewpoints Ba’hai faith, Kurdish movements Sins: Pornography, drug, alcohol, gambling Foreign media sites Tools for circumventing filters 9% of all Farsi blogs Myspace, Orkut, Flickr, Bebo, Metacafe, Photobucket, Del.ic.io.us
And during the 2009 election..
Iran Facts 23 million Internet users in Iran (28 million in Canada) 35% of the Iranian population 60,000 active Farsi blogs 1/3 of the Iranian population is between 15 and 29 years old
Circumventing Censorship SSL encrypted proxy servers Freegate Tor OpenVPN tunnels SSH tunnels
Iran blocking ports? We needed to know if it was true that connections originating inside Iran were being blocked by port We had no friends in Iran to help us test this Then we had an idea..
Testing Connectivity from Within Iran Follow these steps: Step 1: Google for publicly accessible FTP server Step 2: Connect with FTP client and initiate active mode data connection back to client Step 3: Wait to see if connection successfully completes or not Implemented in a program that did this automatically Link at the end of presentation
Results So how many ports were being blocked? None!
However.. There were credible reports from Iran of connectivity problems A pattern emerged Affected connections are slow, very slow The port does not matter Destination does not matter What matters is the protocol you’re using to communicate
An experiment We wanted to verify a theory that deep packet inspection technology was behind the censorship The SSH protocol was chosen Modifications were made to OpenSSH to fully encrypt the initial handshake To avoid detection by deep packet inspection technology
Result Significant performance differences observed between normal SSH and the modified SSH This strongly suggested that some sort of deep packet inspection technology was being used  Later, sources in Iran credibly claimed that Western technology was being used to implement state censorship policy Packet shaping, deep packet inspection technology Specific products cited
Conclusion By definition, deep-packet inspection, packet shaping technology is censorship technology The introduction of a policy of service or application preference, an intentional bias The technology is not evil But it can be Similarly, the export of technology to Iran is not a bad thing
Thank you!
Links http://opennet.net/research/profiles/iran http://github.com/brl/ftpscan http://github.com/brl/obfuscated-ssh E-mail bruce@netifera.com drma@mac.com

More Related Content

What's hot

Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1elsaher
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation policeAshley Raymond
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Mahmudul hasan
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 

What's hot (15)

Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1Internet traffic measurement, analysis and control based on apptype1
Internet traffic measurement, analysis and control based on apptype1
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
p2p
p2pp2p
p2p
 
Week10
Week10Week10
Week10
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Mobile ip
Mobile ipMobile ip
Mobile ip
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 

Viewers also liked

2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 201244CON
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on FacebookSauvik Das
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveMonica Feliu-Mojer, Ph.D.
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.Olesia Velychko
 

Viewers also liked (7)

2012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 20122012 in review: Tor and the censorship arms race - 44CON 2012
2012 in review: Tor and the censorship arms race - 44CON 2012
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Self-Censorship on Facebook
Self-Censorship on FacebookSelf-Censorship on Facebook
Self-Censorship on Facebook
 
Censorship
CensorshipCensorship
Censorship
 
Storytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More InclusiveStorytelling, Meaningful Connections and Making Science More Inclusive
Storytelling, Meaningful Connections and Making Science More Inclusive
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 
Deep Web. Oral Presention.
Deep Web. Oral Presention.Deep Web. Oral Presention.
Deep Web. Oral Presention.
 

Similar to Net Neutrality and Internet Censorship

Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internetipoque
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
January 2015 Newsletter
January 2015 Newsletter January 2015 Newsletter
January 2015 Newsletter Macnamara-ICT
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhoveimec.archive
 
The Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key ChallengesThe Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key Challengesitio Innovex Pvt Ltv
 
E book governmentblockchain
E book governmentblockchainE book governmentblockchain
E book governmentblockchainMahua Chatterjee
 
Blockchain Application Development
Blockchain Application DevelopmentBlockchain Application Development
Blockchain Application DevelopmentThe NineHertz
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809Eric Klinker
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?IRJET Journal
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageProQSys
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...Brenda Thomas
 
set zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfset zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfSudamaSharma7
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of thingsMohanad Kaleia
 
Peer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfPeer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfBlock Coders
 
chapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfchapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfstudy material
 

Similar to Net Neutrality and Internet Censorship (20)

Dw communication
Dw communicationDw communication
Dw communication
 
Darknet
DarknetDarknet
Darknet
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
January 2015 Newsletter
January 2015 Newsletter January 2015 Newsletter
January 2015 Newsletter
 
Qo E E2 E4 Net Neutrality Leo Van Audenhove
Qo E E2 E4   Net Neutrality   Leo Van AudenhoveQo E E2 E4   Net Neutrality   Leo Van Audenhove
Qo E E2 E4 Net Neutrality Leo Van Audenhove
 
The Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key ChallengesThe Future of P2P Payments and Its Key Challenges
The Future of P2P Payments and Its Key Challenges
 
E book governmentblockchain
E book governmentblockchainE book governmentblockchain
E book governmentblockchain
 
Blockchain Application Development
Blockchain Application DevelopmentBlockchain Application Development
Blockchain Application Development
 
OttawaSubmission.072809
OttawaSubmission.072809OttawaSubmission.072809
OttawaSubmission.072809
 
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
Banks V/s P2P Transactions: Who will own the Future of Financial Transactions?
 
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth UsageSchool System Deploys FlowTraq to Manage Internet Bandwidth Usage
School System Deploys FlowTraq to Manage Internet Bandwidth Usage
 
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...A Brief Note On Peer And Peer ( P2P ) Applications Have No...
A Brief Note On Peer And Peer ( P2P ) Applications Have No...
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
set zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdfset zeroth review blockchain electoral system.pdf
set zeroth review blockchain electoral system.pdf
 
Overview on internet of things
Overview on internet of thingsOverview on internet of things
Overview on internet of things
 
Peer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdfPeer to Peer Cryptocurrency Development.pdf
Peer to Peer Cryptocurrency Development.pdf
 
chapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdfchapter-16-internet-and-open-source-concepts.pdf
chapter-16-internet-and-open-source-concepts.pdf
 
Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1 Web Technology UPTU UNIT 1
Web Technology UPTU UNIT 1
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Net Neutrality and Internet Censorship

  • 2. Network Neutrality The promise of the Internet Means networks should be dumb Because for once, dumb is good: Dumb networks are necessary for open and free communication Key to innovation The promise of the Internet
  • 3. Who wouldn’t want this? Telecom providers feel left out of the Internet economy :-( Dear Google: We’re the reason you’re successful. Shouldn’t you pay us for all the traffic we bring you? Internet Service Providers want to ration bandwidth by application Create tiered access “value-add” for the consumer BitTorrent and MMORPGs? $$$
  • 5.
  • 7. How? Traffic shaping Deep Packet Inspection Telecom provider buys special box Special box peeks into your internet connections Tries to identify applications and services using known patterns Even encrypted protocols have identifiable patterns..
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23. Censorship in Iran Between 5 and 10 million websites, according to government statements Dissident and reformist political content Secular viewpoints Ba’hai faith, Kurdish movements Sins: Pornography, drug, alcohol, gambling Foreign media sites Tools for circumventing filters 9% of all Farsi blogs Myspace, Orkut, Flickr, Bebo, Metacafe, Photobucket, Del.ic.io.us
  • 24. And during the 2009 election..
  • 25. Iran Facts 23 million Internet users in Iran (28 million in Canada) 35% of the Iranian population 60,000 active Farsi blogs 1/3 of the Iranian population is between 15 and 29 years old
  • 26. Circumventing Censorship SSL encrypted proxy servers Freegate Tor OpenVPN tunnels SSH tunnels
  • 27.
  • 28. Iran blocking ports? We needed to know if it was true that connections originating inside Iran were being blocked by port We had no friends in Iran to help us test this Then we had an idea..
  • 29.
  • 30. Testing Connectivity from Within Iran Follow these steps: Step 1: Google for publicly accessible FTP server Step 2: Connect with FTP client and initiate active mode data connection back to client Step 3: Wait to see if connection successfully completes or not Implemented in a program that did this automatically Link at the end of presentation
  • 31. Results So how many ports were being blocked? None!
  • 32. However.. There were credible reports from Iran of connectivity problems A pattern emerged Affected connections are slow, very slow The port does not matter Destination does not matter What matters is the protocol you’re using to communicate
  • 33. An experiment We wanted to verify a theory that deep packet inspection technology was behind the censorship The SSH protocol was chosen Modifications were made to OpenSSH to fully encrypt the initial handshake To avoid detection by deep packet inspection technology
  • 34. Result Significant performance differences observed between normal SSH and the modified SSH This strongly suggested that some sort of deep packet inspection technology was being used Later, sources in Iran credibly claimed that Western technology was being used to implement state censorship policy Packet shaping, deep packet inspection technology Specific products cited
  • 35. Conclusion By definition, deep-packet inspection, packet shaping technology is censorship technology The introduction of a policy of service or application preference, an intentional bias The technology is not evil But it can be Similarly, the export of technology to Iran is not a bad thing
  • 37. Links http://opennet.net/research/profiles/iran http://github.com/brl/ftpscan http://github.com/brl/obfuscated-ssh E-mail bruce@netifera.com drma@mac.com