rfc9505v3.txt | rfc9505.txt | |||
---|---|---|---|---|
skipping to change at line 14 ¶ | skipping to change at line 14 ¶ | |||
Category: Informational M. D. Aaron | Category: Informational M. D. Aaron | |||
ISSN: 2070-1721 CU Boulder | ISSN: 2070-1721 CU Boulder | |||
A. Andersdotter | A. Andersdotter | |||
B. Jones | B. Jones | |||
N. Feamster | N. Feamster | |||
U Chicago | U Chicago | |||
M. Knodel | M. Knodel | |||
Center for Democracy & Technology | Center for Democracy & Technology | |||
October 2023 | November 2023 | |||
A Survey of Worldwide Censorship Techniques | A Survey of Worldwide Censorship Techniques | |||
Abstract | Abstract | |||
This document describes technical mechanisms employed in network | This document describes technical mechanisms employed in network | |||
censorship that regimes around the world use for blocking or | censorship that regimes around the world use for blocking or | |||
impairing Internet traffic. It aims to make designers, implementers, | impairing Internet traffic. It aims to make designers, implementers, | |||
and users of Internet protocols aware of the properties exploited and | and users of Internet protocols aware of the properties exploited and | |||
mechanisms used for censoring end-user access to information. This | mechanisms used for censoring end-user access to information. This | |||
skipping to change at line 101 ¶ | skipping to change at line 101 ¶ | |||
6. Non-technical Interference | 6. Non-technical Interference | |||
6.1. Manual Filtering | 6.1. Manual Filtering | |||
6.2. Self-Censorship | 6.2. Self-Censorship | |||
6.3. Server Takedown | 6.3. Server Takedown | |||
6.4. Notice and Takedown | 6.4. Notice and Takedown | |||
6.5. Domain Name Seizures | 6.5. Domain Name Seizures | |||
7. Future Work | 7. Future Work | |||
8. IANA Considerations | 8. IANA Considerations | |||
9. Security Considerations | 9. Security Considerations | |||
10. Informative References | 10. Informative References | |||
Contributors | Acknowledgments | |||
Authors' Addresses | Authors' Addresses | |||
1. Introduction | 1. Introduction | |||
Censorship is where an entity in a position of power -- such as a | Censorship is where an entity in a position of power -- such as a | |||
government, organization, or individual -- suppresses communication | government, organization, or individual -- suppresses communication | |||
that it considers objectionable, harmful, sensitive, or inconvenient | that it considers objectionable, harmful, sensitive, or inconvenient | |||
[WP-Def-2020]. Although censors that engage in censorship must do so | [WP-Def-2020]. Although censors that engage in censorship must do so | |||
through legal, military, or other means, this document focuses | through legal, martial, or other means, this document focuses largely | |||
largely on technical mechanisms used to achieve network censorship. | on technical mechanisms used to achieve network censorship. | |||
This document describes technical mechanisms that censorship regimes | This document describes technical mechanisms that censorship regimes | |||
around the world use for blocking or impairing Internet traffic. See | around the world use for blocking or impairing Internet traffic. See | |||
[RFC7754] for a discussion of Internet blocking and filtering in | [RFC7754] for a discussion of Internet blocking and filtering in | |||
terms of implications for Internet architecture rather than end-user | terms of implications for Internet architecture rather than end-user | |||
access to content and services. There is also a growing field of | access to content and services. There is also a growing field of | |||
academic study of censorship circumvention (see the review article of | academic study of censorship circumvention (see the review article of | |||
[Tschantz-2016]), results from which we seek to make relevant here | [Tschantz-2016]), results from which we seek to make relevant here | |||
for protocol designers and implementers. | for protocol designers and implementers. | |||
skipping to change at line 186 ¶ | skipping to change at line 186 ¶ | |||
cases, these private services attempt to categorize every semi- | cases, these private services attempt to categorize every semi- | |||
questionable website to allow for meta-tag blocking. Similarly, they | questionable website to allow for meta-tag blocking. Similarly, they | |||
tune real-time content heuristic systems to map their assessments | tune real-time content heuristic systems to map their assessments | |||
onto categories of objectionable content. | onto categories of objectionable content. | |||
Countries that are more interested in retaining specific political | Countries that are more interested in retaining specific political | |||
control typically have ministries or organizations that maintain | control typically have ministries or organizations that maintain | |||
blocklists. Examples include the Ministry of Industry and | blocklists. Examples include the Ministry of Industry and | |||
Information Technology in China, the Ministry of Culture and Islamic | Information Technology in China, the Ministry of Culture and Islamic | |||
Guidance in Iran, and the organizations specific to copyright law in | Guidance in Iran, and the organizations specific to copyright law in | |||
France [HADOPI] and consumer protection laaw across the EU | France [HADOPI] and consumer protection law across the EU | |||
[Reda-2017]. | [Reda-2017]. | |||
Content-layer filtering of images and video requires institutions or | Content-layer filtering of images and video requires institutions or | |||
organizations to store hashes of images or videos to be blocked in | organizations to store hashes of images or videos to be blocked in | |||
databases, which can then be compared, with some degree of tolerance, | databases, which can then be compared, with some degree of tolerance, | |||
to content that is sent, received, or stored using centralized | to content that is sent, received, or stored using centralized | |||
content applications and services [ekr-2021]. | content applications and services [ekr-2021]. | |||
4. Technical Identification | 4. Technical Identification | |||
skipping to change at line 1101 ¶ | skipping to change at line 1101 ¶ | |||
unrest in a country. | unrest in a country. | |||
Empirical Examples: Network disconnections tend to only happen in | Empirical Examples: Network disconnections tend to only happen in | |||
times of substantial unrest, largely due to the huge social, | times of substantial unrest, largely due to the huge social, | |||
political, and economic impact such a move has. One of the first, | political, and economic impact such a move has. One of the first, | |||
highly covered occurrences was when the junta in Myanmar employed | highly covered occurrences was when the junta in Myanmar employed | |||
network disconnection to help junta forces quash a rebellion in 2007 | network disconnection to help junta forces quash a rebellion in 2007 | |||
[Dobie-2007]. China disconnected the network in the Xinjiang region | [Dobie-2007]. China disconnected the network in the Xinjiang region | |||
during unrest in 2009 in an effort to prevent the protests from | during unrest in 2009 in an effort to prevent the protests from | |||
spreading to other regions [Heacock-2009]. The Arab Spring saw the | spreading to other regions [Heacock-2009]. The Arab Spring saw the | |||
the most frequent usage of network disconnection, with events in | most frequent usage of network disconnection, with events in Egypt | |||
Egypt and Libya in 2011 [Cowie-2011] and Syria in 2012 | and Libya in 2011 [Cowie-2011] and Syria in 2012 [Thomson-2012]. | |||
[Thomson-2012]. Russia indicated that it would attempt to disconnect | Russia indicated that it would attempt to disconnect all Russian | |||
all Russian networks from the global Internet in April 2019 as part | networks from the global Internet in April 2019 as part of a test of | |||
of a test of the nation's network independence. Reports also | the nation's network independence. Reports also indicate that, as | |||
indicate that, as part of the test disconnect, Russian | part of the test disconnect, Russian telecommunications firms must | |||
telecommunications firms must now route all traffic to state-operated | now route all traffic to state-operated monitoring points | |||
monitoring points [Cimpanu-2019]. India saw the largest number of | [Cimpanu-2019]. India saw the largest number of Internet shutdowns | |||
Internet shutdowns per year in 2016 and 2017 [Dada-2017]. | per year in 2016 and 2017 [Dada-2017]. | |||
5.3.2. Adversarial Route Announcement | 5.3.2. Adversarial Route Announcement | |||
More fine-grained and potentially wide-spread censorship can be | More fine-grained and potentially wide-spread censorship can be | |||
achieved with BGP hijacking, which adversarially re-routes BGP IP | achieved with BGP hijacking, which adversarially re-routes BGP IP | |||
prefixes incorrectly within a region and beyond. This restricts and | prefixes incorrectly within a region and beyond. This restricts and | |||
effectively censors the correctly known location of information that | effectively censors the correctly known location of information that | |||
flows into or out of a jurisdiction and will similarly prevent people | flows into or out of a jurisdiction and will similarly prevent people | |||
from outside your jurisdiction from viewing content generated outside | from outside your jurisdiction from viewing content generated outside | |||
that jurisdiction as the adversarial route announcement propagates. | that jurisdiction as the adversarial route announcement propagates. | |||
skipping to change at line 1143 ¶ | skipping to change at line 1143 ¶ | |||
website. The new routes were announced to the ISP's upstream | website. The new routes were announced to the ISP's upstream | |||
providers and beyond. The entire Internet began directing YouTube | providers and beyond. The entire Internet began directing YouTube | |||
routes to Pakistan Telecom and continued doing so for many hours. In | routes to Pakistan Telecom and continued doing so for many hours. In | |||
2018, nearly all Google services and Google Cloud customers, like | 2018, nearly all Google services and Google Cloud customers, like | |||
Spotify, all lost more than one hour of service after Google lost | Spotify, all lost more than one hour of service after Google lost | |||
control of several million of its IP addresses. Those IP prefixes | control of several million of its IP addresses. Those IP prefixes | |||
were being misdirected to China Telecom, a Chinese government-owned | were being misdirected to China Telecom, a Chinese government-owned | |||
ISP [Google-2018], in a manner similar to the BGP hijacking of US | ISP [Google-2018], in a manner similar to the BGP hijacking of US | |||
government and military websites by China Telecom in 2010. ISPs in | government and military websites by China Telecom in 2010. ISPs in | |||
both Russia (2022) and Myanmar (2021) have tried to hijack the same | both Russia (2022) and Myanmar (2021) have tried to hijack the same | |||
Twitter prefix more than once [MANRS]. | Twitter prefix more than once [Siddiqui-2022]. | |||
5.4. Multi-layer and Non-layer | 5.4. Multi-layer and Non-layer | |||
5.4.1. Distributed Denial of Service (DDoS) | 5.4.1. Distributed Denial of Service (DDoS) | |||
Distributed Denial of Service attacks are a common attack mechanism | Distributed Denial of Service attacks are a common attack mechanism | |||
used by "hacktivists" and malicious hackers. Censors have also used | used by "hacktivists" and malicious hackers. Censors have also used | |||
DDoS in the past for a variety of reasons. There is a wide variety | DDoS in the past for a variety of reasons. There is a wide variety | |||
of DDoS attacks [Wikip-DoS]. However, at a high level, two possible | of DDoS attacks [Wikip-DoS]. However, at a high level, two possible | |||
impacts from the attack tend to occur: a flood attack results in the | impacts from the attack tend to occur: a flood attack results in the | |||
skipping to change at line 1723 ¶ | skipping to change at line 1723 ¶ | |||
Kravtsova, Y., "Cyberattacks Disrupt Opposition's | Kravtsova, Y., "Cyberattacks Disrupt Opposition's | |||
Election", The Moscow Times, October 2012, | Election", The Moscow Times, October 2012, | |||
<http://www.themoscowtimes.com/news/article/cyberattacks- | <http://www.themoscowtimes.com/news/article/cyberattacks- | |||
disrupt-oppositions-election/470119.html>. | disrupt-oppositions-election/470119.html>. | |||
[Leyba-2019] | [Leyba-2019] | |||
Leyba, K., Edwards, B., Freeman, C., Crandall, J., and S. | Leyba, K., Edwards, B., Freeman, C., Crandall, J., and S. | |||
Forrest, "Borders and gateways: measuring and analyzing | Forrest, "Borders and gateways: measuring and analyzing | |||
national as chokepoints", COMPASS '19: Proceedings of the | national as chokepoints", COMPASS '19: Proceedings of the | |||
2nd ACM SIGCAS Conference on Computing and Sustainable | 2nd ACM SIGCAS Conference on Computing and Sustainable | |||
Societies, pages 184–194, DOI 10.1145/3314344.3332502, | Societies, pages 184-194, DOI 10.1145/3314344.3332502, | |||
July 2019, <https://doi.org/10.1145/3314344.3332502>. | July 2019, <https://doi.org/10.1145/3314344.3332502>. | |||
[Li-2017] Li, F., Razaghpanah, A., Molavi Kakhki, A., Akhavan Niaki, | [Li-2017] Li, F., Razaghpanah, A., Molavi Kakhki, A., Akhavan Niaki, | |||
A., Choffnes, D., Gill, P., and A. Mislove, "lib•erate, | A., Choffnes, D., Gill, P., and A. Mislove, "lib•erate, | |||
(n): a library for exposing (traffic-classification) rules | (n): a library for exposing (traffic-classification) rules | |||
and avoiding them efficiently", | and avoiding them efficiently", | |||
DOI 10.1145/3131365.3131376, November 2017, | DOI 10.1145/3131365.3131376, November 2017, | |||
<https://david.choffnes.com/pubs/liberate-imc17.pdf>. | <https://david.choffnes.com/pubs/liberate-imc17.pdf>. | |||
[Lomas-2019] | [Lomas-2019] | |||
Lomas, N., "Github removes Tsunami Democràtic's APK after | Lomas, N., "Github removes Tsunami Democràtic's APK after | |||
a takedown order from Spain", October 2019, | a takedown order from Spain", October 2019, | |||
<https://techcrunch.com/2019/10/30/github-removes-tsunami- | <https://techcrunch.com/2019/10/30/github-removes-tsunami- | |||
democratics-apk-after-a-takedown-order-from-spain/>. | democratics-apk-after-a-takedown-order-from-spain/>. | |||
[MANRS] Siddiqui, A., "Lesson Learned: Twitter Shored Up Its | ||||
Routing Security", March 2022, | ||||
<https://www.manrs.org/2022/03/lesson-learned-twitter- | ||||
shored-up-its-routing-security/>. | ||||
[Marczak-2015] | [Marczak-2015] | |||
Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, | Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, | |||
D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., | D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., | |||
and V. Paxson, "An Analysis of China's "Great Cannon"", | and V. Paxson, "An Analysis of China's "Great Cannon"", | |||
August 2015, | August 2015, | |||
<https://www.usenix.org/system/files/conference/foci15/ | <https://www.usenix.org/system/files/conference/foci15/ | |||
foci15-paper-marczak.pdf>. | foci15-paper-marczak.pdf>. | |||
[Muncaster-2013] | [Muncaster-2013] | |||
Muncaster, P., "Malaysian election sparks web blocking/ | Muncaster, P., "Malaysian election sparks web blocking/ | |||
skipping to change at line 1922 ¶ | skipping to change at line 1917 ¶ | |||
Applications", November 2013, | Applications", November 2013, | |||
<https://citizenlab.org/2013/11/asia-chats-analyzing- | <https://citizenlab.org/2013/11/asia-chats-analyzing- | |||
information-controls-privacy-asian-messaging- | information-controls-privacy-asian-messaging- | |||
applications/>. | applications/>. | |||
[Shbair-2015] | [Shbair-2015] | |||
Shbair, W. M., Cholez, T., Goichot, A., and I. Chrisment, | Shbair, W. M., Cholez, T., Goichot, A., and I. Chrisment, | |||
"Efficiently Bypassing SNI-based HTTPS Filtering", May | "Efficiently Bypassing SNI-based HTTPS Filtering", May | |||
2015, <https://hal.inria.fr/hal-01202712/document>. | 2015, <https://hal.inria.fr/hal-01202712/document>. | |||
[Siddiqui-2022] | ||||
Siddiqui, A., "Lesson Learned: Twitter Shored Up Its | ||||
Routing Security", March 2022, | ||||
<https://www.manrs.org/2022/03/lesson-learned-twitter- | ||||
shored-up-its-routing-security/>. | ||||
[SIDN-2020] | [SIDN-2020] | |||
Moura, G., "Detecting and Taking Down Fraudulent Webshops | Moura, G., "Detecting and Taking Down Fraudulent Webshops | |||
at the .nl ccTLD", February 2020, | at the .nl ccTLD", February 2020, | |||
<https://labs.ripe.net/Members/giovane_moura/detecting- | <https://labs.ripe.net/Members/giovane_moura/detecting- | |||
and-taking-down-fraudulent-webshops-at-a-cctld>. | and-taking-down-fraudulent-webshops-at-a-cctld>. | |||
[Singh-2019] | [Singh-2019] | |||
Singh, K., Grover, G., and V. Bansal, "How India Censors | Singh, K., Grover, G., and V. Bansal, "How India Censors | |||
the Web", DOI 10.48550/arXiv.1912.08590, December 2019, | the Web", DOI 10.48550/arXiv.1912.08590, December 2019, | |||
<https://arxiv.org/abs/1912.08590>. | <https://arxiv.org/abs/1912.08590>. | |||
skipping to change at line 2091 ¶ | skipping to change at line 2092 ¶ | |||
DOI 10.48550/arXiv.1107.3794, July 2011, | DOI 10.48550/arXiv.1107.3794, July 2011, | |||
<http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf>. | <http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf>. | |||
[Zmijewski-2014] | [Zmijewski-2014] | |||
Zmijewski, E., "Turkish Internet Censorship Takes a New | Zmijewski, E., "Turkish Internet Censorship Takes a New | |||
Turn", Wayback Machine archive, March 2014, | Turn", Wayback Machine archive, March 2014, | |||
<http://web.archive.org/web/20200726222723/ | <http://web.archive.org/web/20200726222723/ | |||
https://blogs.oracle.com/internetintelligence/turkish- | https://blogs.oracle.com/internetintelligence/turkish- | |||
internet-censorship-takes-a-new-turn>. | internet-censorship-takes-a-new-turn>. | |||
Contributors | Acknowledgments | |||
This document benefited from discussions with and input from David | This document benefited from discussions with and input from David | |||
Belson, Stéphane Bortzmeyer, Vinicius Fortuna, Gurshabad Grover, | Belson, Stéphane Bortzmeyer, Vinicius Fortuna, Gurshabad Grover, | |||
Andrew McConachie, Martin Nilsson, Michael Richardson, Patrick Vacek, | Andrew McConachie, Martin Nilsson, Michael Richardson, Patrick Vacek, | |||
and Chris Wood. | and Chris Wood. | |||
Coauthor Hall performed work on this document before employment at | ||||
the Internet Society, and his affiliation listed in this document is | ||||
for identification purposes only. | ||||
Authors' Addresses | Authors' Addresses | |||
Joseph Lorenzo Hall | Joseph Lorenzo Hall | |||
Internet Society | Internet Society | |||
Email: hall@isoc.org | Email: hall@isoc.org | |||
Michael D. Aaron | Michael D. Aaron | |||
CU Boulder | CU Boulder | |||
Email: michael.drew.aaron@gmail.com | Email: michael.drew.aaron@gmail.com | |||
End of changes. 11 change blocks. | ||||
22 lines changed or deleted | 27 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |