36
Tools for Censorship Resistance Rachel Greenstadt [email protected] CIH2K5 March 2005 Tools for Censorship Resistance – p.1/36

Tools for Censorship Resistance - Drexel CCIgreenie/eecs_files/defcon-slides.pdf · 2001 Capital crime to “provide state secrets” over Internet ... 2002 DNS hijacking Tools for

  • Upload
    ngohanh

  • View
    219

  • Download
    3

Embed Size (px)

Citation preview

Tools for Censorship ResistanceRachel Greenstadt

[email protected]

CIH2K5

March 2005

Tools for Censorship Resistance – p.1/36

Overview

Approaches to CensorshipCircumvention methods

Case study: China

Censorship in a “free” societythe LOCKSS project

Unobservability

Tools for Censorship Resistance – p.2/36

A Taxonomy of Censorship

Generalized BlockingBlocking senders/serversBlocking receivers/clientsModifying content for censorship"Arms race" solutions okay

Surveillance/Chilling EffectsRelies on accountability/punishment

Effective censors use multiple techniques

Tools for Censorship Resistance – p.3/36

Blocking Senders

Figure 1: Bonsai kitten picturefrom bonsaikitten.com

Hardest formof censorshipto do (spam)

Offensivematerial for-bidden bygovt/ISP/DOSattackers

Tools for Censorship Resistance – p.4/36

Circumventing Sender Blocking

Find someone who will make materialavailable

More permitting ISPWritable web pages (blogs, etc)Outside jurisdictions

Anonymity servicesCan help if sender blocking is combinedwith surveillanceHidden servers may prove useful foravoiding DOS attacksCurrent systems probably too fragileTools for Censorship Resistance – p.5/36

Blocking Receivers

If the blocking authority has control over some,but not all, internet users

Government firewalls at routers

Corporate firewalls

Nannyware in schools/libraries

Tools for Censorship Resistance – p.6/36

Blocking Approaches

Web Site BlockedThe website you were trying to accesswas deemed inappropriate by the Au-thorities. If you feel that this particularweb site should not have been blockedper our policy, you may ask that the website be removed from the blocked list bygoing to the following website.If you have any questions, contact us [email protected].

Figure 2: Closed Block-ing

Tools for Censorship Resistance – p.7/36

Blocking Techniques

Block open or closed?

Drop packets at gateway based on IP address

DNS redirection

Filter based on keywords

Filter based on images ("Finding NakedPeople")

Block loophole serversProxies/anonymizers/translators/googlecache/wayback machine/etc

Tools for Censorship Resistance – p.8/36

Overview

Approaches to Censorship

Circumvention methodsCase study: China

Censorship in a “free” societythe LOCKSS project

Unobservability

Tools for Censorship Resistance – p.9/36

Circumvention Methods

Proxies

Tunnels

Mirrors

Email (spam)

P2P systems to make proxies availableSafeweb/Triangle-Boy, Six/Four,Peek-a-booty, Infranet

Tools for Censorship Resistance – p.10/36

Publicizing the circumvention system

1. You don’t: used by small set of people,communicate out of band

2. Use something to communicate that theywon’t or can’t block

This may be harder than you think

3. Closed group: no one sees the whole patternInfranet: keyspace-hopping (client puzzles)TU Dresden: captchasWon’t work against a resource richadversary

Tools for Censorship Resistance – p.11/36

Stego in Circumvention Systems

Can make proxy servers more difficult to detectand block, clients have plausible deniability

Infranet (MIT NMS)—embed requests forcontent in the sequence of http requests,embed content itself steganographically inimages

Camera Shy (Hacktivismo)—uses lsbsteganography. Automatically scans andparses web pages for applications

Tools for Censorship Resistance – p.12/36

Tools

Peacefire Circumventor:http://www.peacefire.org

Psiphon: http://www.citizenlab.org/

DIT: http://www.dit-inc.us/

TOR: http://freehaven.net/tor/

Hacktivismo: http://www.hacktivismo.com/

Freenet-china: http://www.freenet-china.org/

Tools for Censorship Resistance – p.13/36

Overview

Approaches to Censorship

Circumvention methods

Case study: ChinaCensorship in a “free” society

the LOCKSS project

Unobservability

Tools for Censorship Resistance – p.14/36

Internet Censorship in China

Use sender/receiver blocking, surveillance

Makes evident how much of “cyberspace” istied to national borders and how much isn’t

Opaque system, closed blocking

Tools for Censorship Resistance – p.15/36

Goals

Block dissident websites and pornography

Belief that access to the Internet wouldfoment change/unrest

Also—Internet used as coordination tool fordissidents

3 main dissident groups (Rand)Falun Gong

Chinese Democratic Party

Tibetan/Taiwanese sites

Also block news, health, education, gov’t, religionTools for Censorship Resistance – p.16/36

PRC Resources

Control of routers inside China

Internet access in country throughcooperative ISPs

Sophisticated network and Internet cafesurveillance

approx 30,000+ employees to find sites tofilter (Big Mamas/volunteers)

Ability to arrest/detain/interrogate suspiciousindividuals

Tools for Censorship Resistance – p.17/36

Evolution of Chinese Censorship

Witnessing the “arms race”

1995 Internet commerically available in China

1996 “Great Firewall of China”

1997 Regulations place liability for Internet use on ISPs

1999 Foreign dissident sites DOS’ed

2000 Golden Shield begins, Security China 2000

2001 Safeweb/Triangle Boy blocked

2001 Capital crime to “provide state secrets” over Internet

2002 Pledge of Self-Discipline for Chinese Internet Industry

2002 DNS hijacking Tools for Censorship Resistance – p.18/36

Evolution of Chinese Censorship

2002 Attempt to block google -> keyword blocking

2002 More fine grained blocking (CNN, blogspot)

2002 Internet cafe fire, PRC closes cafes

2002 Cafes required to install surveillance software

2002 Downtime punishment

2004 est. 87 million Internet users in China

2004 PRC monitoring SMS text messages

Tools for Censorship Resistance – p.19/36

Sad Story of Safeweb

Set up a proxy service, got blocked

Set a P2P network of proxies, they got blocked

Almost immediately

With their resources, China can discover the peers andblock them, even with rate limiting measures

You try getting a P2P network up and running this way

Involuntary servers? (In a windows app?)

On a safe port—blocked

A gazillon IIS servers, there’s a good idea...Tools for Censorship Resistance – p.20/36

But they wouldn’t block X...

Only a few sites they unblocked (google,blogspot)

Even these they do selective blocking

And random P2P servers aren’t likely to beuseful to them for anything

Don’t expect companies to help youWe’re selling them surveillance techThey’ve signed self-discipline pledges too

Tools for Censorship Resistance – p.21/36

VIP Reference

Dissident email newsletter(http://come.to/dck)

Most successful widespread circumvention

Spam’s a hard problem

Sent to prominent party members, randomChinese, and dissidents

Not without repercussions: Lin Hai sentencedto 2 years in prison for providing 30,000 emailaddresses to “overseas hostile publications”

Tools for Censorship Resistance – p.22/36

Implications Outside China

Traffic routed through China subject to filtering

Root nameserver in China could causepeople outside China to be subject to DNShijacking

Tools for Censorship Resistance – p.23/36

References on China

“Empirical Analysis of Internet Filtering inChina,” Zittrain/Edelman, Harvard BerkmanCenter

Zittrain/Edelman, Harvard Berkman Centerhttp://cyber.law.harvard.edu/filtering/china/

“You’ve Got Dissent! Chinese Dissident Useof the Internet and Beijing’sCounter-Strategies”

Chase/Mulvenon, RANDhttp://www.rand.org/publications/MR/MR1543/

Tools for Censorship Resistance – p.24/36

Overview

Approaches to Censorship

Circumvention methods

Case study: China

Censorship in a “free” societythe LOCKSS project

Unobservability

Tools for Censorship Resistance – p.25/36

Document distortion or removal

Form of blocking, previously available itemsare changed or disappear

Concern in U.S. (talk at PORTIA)

Can be mitigated with digital signatures

BUT—Often self-censorship

Tools for Censorship Resistance – p.26/36

Example: Time Magazine

This articlewas removedfrom Time’sonline website

Also excisedfrom the Tableof Contents

Frommemoryhole.org

Tools for Censorship Resistance – p.27/36

LOCKSS: Lots of Copies Keep Stuff Safe

Libraries help prevent document distortion bypreserving documents in many locations

LOCKSS is a P2P system to help librariesArchive documents and avoid bit rotMaintain consensus about which documentis correct

Some online sources doing similar things(wayback machine, memoryhole, cryptome,google cache)

Tools for Censorship Resistance – p.28/36

Overview

Approaches to Censorship

Circumvention methods

Case study: China

Censorship in a “free” societythe LOCKSS project

Unobservability

Tools for Censorship Resistance – p.29/36

Unobservability as Censorship Resistance

Unobservability hides both the content andthe fact that covert communication is takingplace

Examples: steganography, covert channels

Can help circumvent surveillance

And blocking (can’t block what you don’t knowis there)

Tools for Censorship Resistance – p.30/36

Limitations of Encryption

It may be forbidden, or bring unwelcomesuspicion

Censoring authority may have the ability togain keys (Britain)

Many systems built to avoid this problem

Requires some degree ofcoordination(keys)/technical sophistication

Tools for Censorship Resistance – p.31/36

Properties for Unobservable Systems

UndetectabilityPlausible (legitimate cover)Encode the message to match channelstatistically

RobustnessMessage survive natural/maliciouslossinessIndispensable

Tools for Censorship Resistance – p.32/36

Limitations of Unobservability

Hard to have security guarantees aboutdetectability

Many ’unobservable’ approaches aredetectable—security through obscurity

Especially true if you are worried about thechannel being blocked

Tools for Censorship Resistance – p.33/36

Pitfalls of Randomness

Images from Westfeld’s attackson steganographic systems

Embedding cryptographic outputin nonrandom sources is obvious

In general, bits are not random

I made this mistake with TCPtimestamps

Tools for Censorship Resistance – p.34/36

Image Steganography

LSB steganography is detectable. Easily.

Increasingly good blind jpeg steg detection(Fridrich)

Certainly an arms race

Robustness?

Image choice steganographyVery low bandwidthBut robust, hard to detectFotoblogs...

Tools for Censorship Resistance – p.35/36

Conclusions

Circumvention is easy to do on small scale,hard to do on large scale

Hardest problem is distributing circumventionsystems, without having them blocked

Arms race double edgedCan cause working circumvention methodsto get blockedMake circumventor pay higher price forcontrolWith surveillance, need to make sure usersaware of risks

Tools for Censorship Resistance – p.36/36