rfc9505.original | rfc9505.txt | |||
---|---|---|---|---|
pearg J. L. Hall | Internet Research Task Force (IRTF) J. L. Hall | |||
Internet-Draft Internet Society | Request for Comments: 9505 Internet Society | |||
Intended status: Informational M. D. Aaron | Category: Informational M. D. Aaron | |||
Expires: 30 September 2023 CU Boulder | ISSN: 2070-1721 CU Boulder | |||
A. Andersdotter | A. Andersdotter | |||
B. Jones | B. Jones | |||
N. Feamster | N. Feamster | |||
U Chicago | U Chicago | |||
M. Knodel | M. Knodel | |||
Center for Democracy & Technology | Center for Democracy & Technology | |||
29 March 2023 | November 2023 | |||
A Survey of Worldwide Censorship Techniques | A Survey of Worldwide Censorship Techniques | |||
draft-irtf-pearg-censorship-10 | ||||
Abstract | Abstract | |||
This document describes technical mechanisms employed in network | This document describes technical mechanisms employed in network | |||
censorship that regimes around the world use for blocking or | censorship that regimes around the world use for blocking or | |||
impairing Internet traffic. It aims to make designers, implementers, | impairing Internet traffic. It aims to make designers, implementers, | |||
and users of Internet protocols aware of the properties exploited and | and users of Internet protocols aware of the properties exploited and | |||
mechanisms used for censoring end-user access to information. This | mechanisms used for censoring end-user access to information. This | |||
document makes no suggestions on individual protocol considerations, | document makes no suggestions on individual protocol considerations, | |||
and is purely informational, intended as a reference. This document | and is purely informational, intended as a reference. This document | |||
is a product of the Privacy Enhancement and Assessment Research Group | is a product of the Privacy Enhancement and Assessment Research Group | |||
(PEARG) in the IRTF. | (PEARG) in the IRTF. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Research Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IRTF). The IRTF publishes the results of Internet-related research | |||
time. It is inappropriate to use Internet-Drafts as reference | and development activities. These results might not be suitable for | |||
material or to cite them other than as "work in progress." | deployment. This RFC represents the consensus of the Privacy | |||
Enhancements and Assessments Research Group of the Internet Research | ||||
Task Force (IRTF). Documents approved for publication by the IRSG | ||||
are not candidates for any level of Internet Standard; see Section 2 | ||||
of RFC 7841. | ||||
This Internet-Draft will expire on 30 September 2023. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9505. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
extracted from this document must include Revised BSD License text as | to this document. | |||
described in Section 4.e of the Trust Legal Provisions and are | ||||
provided without warranty as described in the Revised BSD License. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology | |||
3. Technical Prescription . . . . . . . . . . . . . . . . . . . 4 | 3. Technical Prescription | |||
4. Technical Identification . . . . . . . . . . . . . . . . . . 5 | 4. Technical Identification | |||
4.1. Points of Control . . . . . . . . . . . . . . . . . . . . 5 | 4.1. Points of Control | |||
4.2. Application Layer . . . . . . . . . . . . . . . . . . . . 7 | 4.2. Application Layer | |||
4.2.1. HTTP Request Header Identification . . . . . . . . . 7 | 4.2.1. HTTP Request Header Identification | |||
4.2.2. HTTP Response Header Identification . . . . . . . . . 8 | 4.2.2. HTTP Response Header Identification | |||
4.2.3. Transport Layer Security (TLS) . . . . . . . . . . . 9 | 4.2.3. Transport Layer Security (TLS) | |||
4.2.4. Instrumenting Content Distributors . . . . . . . . . 11 | 4.2.4. Instrumenting Content Distributors | |||
4.2.5. DPI Identification . . . . . . . . . . . . . . . . . 13 | 4.2.5. DPI Identification | |||
4.3. Transport Layer . . . . . . . . . . . . . . . . . . . . . 14 | 4.3. Transport Layer | |||
4.3.1. Shallow Packet Inspection and Transport Header | 4.3.1. Shallow Packet Inspection and Transport Header | |||
Identification . . . . . . . . . . . . . . . . . . . 15 | Identification | |||
4.3.2. Protocol Identification . . . . . . . . . . . . . . . 16 | 4.3.2. Protocol Identification | |||
4.4. Residual Censorship . . . . . . . . . . . . . . . . . . . 17 | 4.4. Residual Censorship | |||
5. Technical Interference . . . . . . . . . . . . . . . . . . . 18 | 5. Technical Interference | |||
5.1. Application Layer . . . . . . . . . . . . . . . . . . . . 18 | 5.1. Application Layer | |||
5.1.1. DNS Interference . . . . . . . . . . . . . . . . . . 18 | 5.1.1. DNS Interference | |||
5.2. Transport Layer . . . . . . . . . . . . . . . . . . . . . 20 | 5.2. Transport Layer | |||
5.2.1. Performance Degradation . . . . . . . . . . . . . . . 20 | 5.2.1. Performance Degradation | |||
5.2.2. Packet Dropping . . . . . . . . . . . . . . . . . . . 21 | 5.2.2. Packet Dropping | |||
5.2.3. RST Packet Injection . . . . . . . . . . . . . . . . 22 | 5.2.3. RST Packet Injection | |||
5.3. Routing Layer . . . . . . . . . . . . . . . . . . . . . . 23 | 5.3. Routing Layer | |||
5.3.1. Network Disconnection . . . . . . . . . . . . . . . . 23 | 5.3.1. Network Disconnection | |||
5.3.2. Adversarial Route Announcement . . . . . . . . . . . 24 | 5.3.2. Adversarial Route Announcement | |||
5.4. Multi-layer and Non-layer . . . . . . . . . . . . . . . . 25 | 5.4. Multi-layer and Non-layer | |||
5.4.1. Distributed Denial of Service (DDoS) . . . . . . . . 25 | 5.4.1. Distributed Denial of Service (DDoS) | |||
5.4.2. Censorship in Depth . . . . . . . . . . . . . . . . . 26 | 5.4.2. Censorship in Depth | |||
6. Non-Technical Interference . . . . . . . . . . . . . . . . . 26 | 6. Non-technical Interference | |||
6.1. Manual Filtering . . . . . . . . . . . . . . . . . . . . 26 | 6.1. Manual Filtering | |||
6.2. Self-Censorship . . . . . . . . . . . . . . . . . . . . . 27 | 6.2. Self-Censorship | |||
6.3. Server Takedown . . . . . . . . . . . . . . . . . . . . . 27 | 6.3. Server Takedown | |||
6.4. Notice and Takedown . . . . . . . . . . . . . . . . . . . 27 | 6.4. Notice and Takedown | |||
6.5. Domain-Name Seizures . . . . . . . . . . . . . . . . . . 27 | 6.5. Domain Name Seizures | |||
7. Future work . . . . . . . . . . . . . . . . . . . . . . . . . 28 | 7. Future Work | |||
8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 28 | 8. IANA Considerations | |||
9. Informative References . . . . . . . . . . . . . . . . . . . 28 | 9. Security Considerations | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 45 | 10. Informative References | |||
Acknowledgments | ||||
Authors' Addresses | ||||
1. Introduction | 1. Introduction | |||
Censorship is where an entity in a position of power -- such as a | Censorship is where an entity in a position of power -- such as a | |||
government, organization, or individual -- suppresses communication | government, organization, or individual -- suppresses communication | |||
that it considers objectionable, harmful, sensitive, politically | that it considers objectionable, harmful, sensitive, or inconvenient | |||
incorrect or inconvenient [WP-Def-2020]. Although censors that | [WP-Def-2020]. Although censors that engage in censorship must do so | |||
engage in censorship must do so through legal, military, or other | through legal, martial, or other means, this document focuses largely | |||
means, this document focuses largely on technical mechanisms used to | on technical mechanisms used to achieve network censorship. | |||
achieve network censorship. | ||||
This document describes technical mechanisms that censorship regimes | This document describes technical mechanisms that censorship regimes | |||
around the world use for blocking or impairing Internet traffic. See | around the world use for blocking or impairing Internet traffic. See | |||
[RFC7754] for a discussion of Internet blocking and filtering in | [RFC7754] for a discussion of Internet blocking and filtering in | |||
terms of implications for Internet architecture, rather than end-user | terms of implications for Internet architecture rather than end-user | |||
access to content and services. There is also a growing field of | access to content and services. There is also a growing field of | |||
academic study of censorship circumvention (see the review article of | academic study of censorship circumvention (see the review article of | |||
[Tschantz-2016]), results from which we seek to make relevant here | [Tschantz-2016]), results from which we seek to make relevant here | |||
for protocol designers and implementers. | for protocol designers and implementers. | |||
Censorship circumvention also impacts the cost of implementation of a | Censorship circumvention also impacts the cost of implementation of a | |||
censorship measure and we include mentions of tradeoffs in relation | censorship measure, and we include mentions of trade-offs in relation | |||
to such costs in conjunction with each technical method identified | to such costs in conjunction with each technical method identified | |||
below. | below. | |||
This document has seen extensive discussion and review in the IRTF | This document has seen extensive discussion and review in the IRTF | |||
Privacy Enhancement and Assessment Research Group (PEARG) and | Privacy Enhancement and Assessment Research Group (PEARG) and | |||
represents the consensus of that group. It is not an IETF product | represents the consensus of that group. It is not an IETF product | |||
and is not a standard. | and is not a standard. | |||
2. Terminology | 2. Terminology | |||
We describe three elements of Internet censorship: prescription, | We describe three elements of Internet censorship: prescription, | |||
identification, and interference. The document contains three major | identification, and interference. This document contains three major | |||
sections, each corresponding to one of these elements. Prescription | sections, each corresponding to one of these elements. Prescription | |||
is the process by which censors determine what types of material they | is the process by which censors determine what types of material they | |||
should censor, e.g., classifying pornographic websites as | should censor, e.g., classifying pornographic websites as | |||
undesirable. Identification is the process by which censors classify | undesirable. Identification is the process by which censors classify | |||
specific traffic or traffic identifiers to be blocked or impaired, | specific traffic or traffic identifiers to be blocked or impaired, | |||
e.g., deciding that webpages containing "sex" in an HTTP (Hypertext | e.g., deciding that webpages containing "sex" in an HTTP header or | |||
Transport Protocol) Header or that accept traffic through the URL | that accept traffic through the URL "www.sex.example" are likely to | |||
www.sex.example are likely to be undesirable. Interference is the | be undesirable. Interference is the process by which censors | |||
process by which censors intercede in communication and prevent | intercede in communication and prevent access to censored materials | |||
access to censored materials by blocking access or impairing the | by blocking access or impairing the connection, e.g., implementing a | |||
connection, e.g., implementing a technical solution capable of | technical solution capable of identifying HTTP headers or URLs and | |||
identifying HTTP headers or URLs and ensuring they are rendered | ensuring they are rendered wholly or partially inaccessible. | |||
wholly or partially inaccessible. | ||||
3. Technical Prescription | 3. Technical Prescription | |||
Prescription is the process of figuring out what censors would like | Prescription is the process of figuring out what censors would like | |||
to block [Glanville-2008]. Generally, censors aggregate information | to block [Glanville-2008]. Generally, censors aggregate information | |||
"to block" in blocklists, databases of image hashes [ekr-2021], or | "to block" in blocklists, databases of image hashes [ekr-2021], or | |||
use real-time heuristic assessment of content [Ding-1999]. Some | use real-time heuristic assessment of content [Ding-1999]. Some | |||
national networks are designed to more naturally serve as points of | national networks are designed to more naturally serve as points of | |||
control [Leyba-2019]. There are also indications that online censors | control [Leyba-2019]. There are also indications that online censors | |||
use probabilistic machine learning techniques [Tang-2016]. Indeed, | use probabilistic machine learning techniques [Tang-2016]. Indeed, | |||
web crawling and machine learning techniques are an active research | web crawling and machine learning techniques are an active research | |||
area in the effort to identify content deemed as morally or | area in the effort to identify content deemed as morally or | |||
commercially harmful to companies or consumers in some jurisdictions | commercially harmful to companies or consumers in some jurisdictions | |||
[SIDN2020]. | [SIDN-2020]. | |||
There are typically a few types of blocklist elements: Keyword, | There are typically a few types of blocklist elements: keyword, | |||
domain name, protocol, or Internet Protocol (IP) address. Keyword | domain name, protocol, or IP address. Keyword and domain name | |||
and domain name blocking take place at the application level, e.g., | blocking take place at the application level, e.g., HTTP; protocol | |||
HTTP; protocol blocking often occurs using deep packet inspection to | blocking often occurs using deep packet inspection (DPI) to identify | |||
identify a forbidden protocol; IP blocking tends to take place using | a forbidden protocol; IP blocking tends to take place using IP | |||
IP addresses in IPv4/IPv6 headers. Some censors also use the | addresses in IPv4/IPv6 headers. Some censors also use the presence | |||
presence of certain keywords to enable more aggressive blocklists | of certain keywords to enable more aggressive blocklists | |||
[Rambert-2021] or to be more permissive with content [Knockel-2021]. | [Rambert-2021] or to be more permissive with content [Knockel-2021]. | |||
The mechanisms for building up these blocklists vary. Censors can | The mechanisms for building up these blocklists vary. Censors can | |||
purchase from private industry "content control" software, which lets | purchase from private industry "content control" software, which lets | |||
censors filter traffic from broad categories they would like to | censors filter traffic from broad categories they would like to | |||
block, such as gambling or pornography [Knight-2005]. In these | block, such as gambling or pornography [Knight-2005]. In these | |||
cases, these private services attempt to categorize every semi- | cases, these private services attempt to categorize every semi- | |||
questionable website to allow for meta-tag blocking. Similarly, they | questionable website to allow for meta-tag blocking. Similarly, they | |||
tune real-time content heuristic systems to map their assessments | tune real-time content heuristic systems to map their assessments | |||
onto categories of objectionable content. | onto categories of objectionable content. | |||
Countries that are more interested in retaining specific political | Countries that are more interested in retaining specific political | |||
control typically have ministries or organizations that maintain | control typically have ministries or organizations that maintain | |||
blocklists. Examples include the Ministry of Industry and | blocklists. Examples include the Ministry of Industry and | |||
Information Technology in China, Ministry of Culture and Islamic | Information Technology in China, the Ministry of Culture and Islamic | |||
Guidance in Iran, and specific to copyright in France [HADOPI-2020] | Guidance in Iran, and the organizations specific to copyright law in | |||
and across the EU for consumer protection law [Reda-2017]. | France [HADOPI] and consumer protection law across the EU | |||
[Reda-2017]. | ||||
Content-layer filtering of images and video requires institutions or | Content-layer filtering of images and video requires institutions or | |||
organizations to store hashes of images or videos to be blocked in | organizations to store hashes of images or videos to be blocked in | |||
databases, which can then be compared, with some degree of tolerance, | databases, which can then be compared, with some degree of tolerance, | |||
to content that is sent, received or stored using centralized, | to content that is sent, received, or stored using centralized | |||
content applications and services [ekr-2021]. | content applications and services [ekr-2021]. | |||
4. Technical Identification | 4. Technical Identification | |||
4.1. Points of Control | 4.1. Points of Control | |||
Internet censorship takes place in all parts of the network topology. | Internet censorship takes place in all parts of the network topology. | |||
It may be implemented in the network itself (e.g., local loop or | It may be implemented in the network itself (e.g., local loop or | |||
backhaul), on the services side of communication (e.g., web hosts, | backhaul), on the services side of communication (e.g., web hosts, | |||
cloud providers or content delivery networks), in the ancillary | cloud providers, or content delivery networks), in the ancillary | |||
services eco-system (e.g., domain name system or certificate | services ecosystem (e.g., domain name system (DNS) or certificate | |||
authorities) or on the end-client side (e.g., in an end-user device | authorities (CAs)), or on the end-client side (e.g., in an end-user | |||
such as a smartphone, laptop or desktop or software executed on such | device, such as a smartphone, laptop, or desktop, or software | |||
devices). An important aspect of pervasive technical interception is | executed on such devices). An important aspect of pervasive | |||
the necessity to rely on software or hardware to intercept the | technical interception is the necessity to rely on software or | |||
content the censor is interested in. There are various logical and | hardware to intercept the content the censor is interested in. There | |||
physical points-of-control censors may use for interception | are various logical and physical points of control that censors may | |||
mechanisms, including, though not limited to, the following: | use for interception mechanisms, including, though not limited to, | |||
the following: | ||||
* Internet Backbone: If a censor controls elements of Internet | Internet Backbone: | |||
network infrastructure, such as the international gateways into a | If a censor controls elements of Internet network infrastructure, | |||
region or Internet exchange points, those chokepoints can be used | such as the international gateways into a region or Internet | |||
to filter undesirable traffic that is traveling into and out of | Exchange Points (IXPs), those choke points can be used to filter | |||
the region by packet sniffing and port mirroring. Censorship at | undesirable traffic that is traveling into and out of the region | |||
gateways is most effective at controlling the flow of information | by packet sniffing and port mirroring. Censorship at gateways is | |||
between a region and the rest of the Internet, but is ineffective | most effective at controlling the flow of information between a | |||
at identifying content traveling between the users within a | region and the rest of the Internet, but is ineffective at | |||
region, which would have to be accomplished at exchange points or | identifying content traveling between the users within a region, | |||
other network aggregation points. Some national network designs | which would have to be accomplished at exchange points or other | |||
naturally serve as more effective chokepoints and points of | network aggregation points. Some national network designs | |||
naturally serve as more effective choke points and points of | ||||
control [Leyba-2019]. | control [Leyba-2019]. | |||
* Internet Service Providers: Internet Service Providers are | Internet Service Providers (ISPs): | |||
frequently exploited points of control. They have the benefit of | ISPs are frequently exploited points of control. They have the | |||
being easily enumerable by a censor -- often falling under the | benefit of being easily enumerable by a censor -- often falling | |||
jurisdictional or operational control of a censor in an | under the jurisdictional or operational control of a censor in an | |||
indisputable way -- with the additional feature that an ISP can | indisputable way -- with the additional feature that an ISP can | |||
identify the regional and international traffic of all their | identify the regional and international traffic of all their | |||
users. The censor's filtration mechanisms can be placed on an ISP | users. The censor's filtration mechanisms can be placed on an ISP | |||
via governmental mandates, ownership, or voluntary/coercive | via governmental mandates, ownership, or voluntary/coercive | |||
influence. | influence. | |||
* Institutions: Private institutions such as corporations, schools, | Institutions: | |||
and Internet cafes can use filtration mechanisms. These | Private institutions such as corporations, schools, and Internet | |||
mechanisms are occasionally at the request of a government censor, | cafes can use filtration mechanisms. These mechanisms are | |||
but can also be implemented to help achieve institutional goals, | occasionally at the request of a government censor but can also be | |||
such as fostering a particular moral outlook on life by school- | implemented to help achieve institutional goals, such as fostering | |||
children, independent of broader society or government goals. | a particular moral outlook on life by schoolchildren, independent | |||
of broader society or government goals. | ||||
* Content Distribution Network (CDN): CDNs seek to collapse network | Content Distribution Network (CDN): | |||
topology in order to better locate content closer to the service's | CDNs seek to collapse network topology in order to better locate | |||
users. This reduces content transmission latency and improves | content closer to the service's users. This reduces content | |||
quality of service. The CDN service's content servers, located | transmission latency and improves QoS. The CDN service's content | |||
"close" to the user in a network-sense, can be powerful points of | servers, located "close" to the user in a network sense, can be | |||
control for censors, especially if the location of CDN | powerful points of control for censors, especially if the location | |||
repositories allow for easier interference. | of CDN repositories allows for easier interference. | |||
* Certificate Authorities (CAs) for Public-Key Infrastructures | CAs for Public Key Infrastructures (PKIs): | |||
(PKIs): Authorities that issue cryptographically secured resources | Authorities that issue cryptographically secured resources can be | |||
can be a significant point of control. CAs that issue | a significant point of control. CAs that issue certificates to | |||
certificates to domain holders for TLS/HTTPS (the Web PKI) or | domain holders for TLS/HTTPS (the Web PKI) or Regional or Local | |||
Regional/Local Internet Registries (RIRs) that issue Route | Internet Registries (RIRs or LIRs) that issue Route Origin | |||
Origination Authorizations (ROAs) to BGP operators can be forced | Authorizations (ROAs) to BGP operators can be forced to issue | |||
to issue rogue certificates that may allow compromise, i.e., by | rogue certificates that may allow compromise, i.e., by allowing | |||
allowing censorship software to engage in identification and | censorship software to engage in identification and interference | |||
interference where it may not have been possible before. CAs may | where it may not have been possible before. CAs may also be | |||
also be forced to revoke certificates. This may lead to | forced to revoke certificates. This may lead to adversarial | |||
adversarial traffic routing or TLS interception being allowed, or | traffic routing, TLS interception being allowed, or an otherwise | |||
an otherwise rightful origin or destination point of traffic flows | rightful origin or destination point of traffic flows being unable | |||
being unable to communicate in a secure way. | to communicate in a secure way. | |||
* Services: Application service providers can be pressured, coerced, | Services: | |||
or legally required to censor specific content or data flows. | Application service providers can be pressured, coerced, or | |||
legally required to censor specific content or data flows. | ||||
Service providers naturally face incentives to maximize their | Service providers naturally face incentives to maximize their | |||
potential customer base, and potential service shutdowns or legal | potential customer base, and potential service shutdowns or legal | |||
liability due to censorship efforts may seem much less attractive | liability due to censorship efforts may seem much less attractive | |||
than potentially excluding content, users, or uses of their | than potentially excluding content, users, or uses of their | |||
service. Services have increasingly become focal points of | service. Services have increasingly become focal points of | |||
censorship discussions, as well as the focus of discussions of | censorship discussions as well as discussions of moral imperatives | |||
moral imperatives to use censorship tools. | to use censorship tools. | |||
* Content sites: On the service side of communications lie many | Content Sites: | |||
platforms that publish user-generated content and require terms of | On the service side of communications lie many platforms that | |||
service compliance with all content and user accounts in order to | publish user-generated content and require terms of service | |||
avoid intermediary liability for the web hosts. In aggregate, | compliance with all content and user accounts in order to avoid | |||
these policies, actions and remedies are known as content | intermediary liability for the web hosts. In aggregate, these | |||
moderation. Content moderation happens above the services or | policies, actions, and remedies are known as content moderation. | |||
application layer, but these mechanisms are built to filter, sort | Content moderation happens above the services or application | |||
and block content and users thus making them available to censors | layer, but these mechanisms are built to filter, sort, and block | |||
through direct pressure on the private entity. | content and users, thus making them available to censors through | |||
direct pressure on the private entity. | ||||
* Personal Devices: Censors can mandate censorship software be | Personal Devices: | |||
installed on the device level. This has many disadvantages in | Censors can mandate censorship software be installed on the device | |||
terms of scalability, ease-of-circumvention, and operating system | level. This has many disadvantages in terms of scalability, ease | |||
requirements. (Of course, if a personal device is treated with | of circumvention, and operating system requirements. (Of course, | |||
censorship software before sale and this software is difficult to | if a personal device is treated with censorship software before | |||
reconfigure, this may work in favor of those seeking to control | sale and this software is difficult to reconfigure, this may work | |||
information, say for children, students, customers, or employees.) | in favor of those seeking to control information, say, for | |||
The emergence of mobile devices has exacerbate these feasibility | children, students, customers, or employees.) The emergence of | |||
problems. This software can also be mandated by institutional | mobile devices has exacerbated these feasibility problems. This | |||
actors acting on non-governmentally mandated moral imperatives. | software can also be mandated by institutional actors acting on | |||
non-governmentally mandated moral imperatives. | ||||
At all levels of the network hierarchy, the filtration mechanisms | At all levels of the network hierarchy, the filtration mechanisms | |||
used to censor undesirable traffic are essentially the same: a censor | used to censor undesirable traffic are essentially the same: a censor | |||
either directly identifies undesirable content using the identifiers | either directly identifies undesirable content using the identifiers | |||
described below and then uses a blocking or shaping mechanism such as | described below and then uses a blocking or shaping mechanism (such | |||
the ones exemplified below to prevent or impair access, or requests | as the ones exemplified below to prevent or impair access), or | |||
that an actor ancillary to the censor, such as a private entity, | requests that an actor ancillary to the censor (such as a private | |||
perform these functions. Identification of undesirable traffic can | entity) perform these functions. Identification of undesirable | |||
occur at the application, transport, or network layer of the IP | traffic can occur at the application, transport, or network layer of | |||
stack. Censors often focus on web traffic, so the relevant protocols | the IP stack. Censors often focus on web traffic, so the relevant | |||
tend to be filtered in predictable ways (see Section 4.2.1 and | protocols tend to be filtered in predictable ways (see Sections 4.2.1 | |||
Section 4.2.2). For example, a subversive image might make it past a | and 4.2.2). For example, a subversive image might make it past a | |||
keyword filter. However, if later the image is deemed undesirable, a | keyword filter. However, if later the image is deemed undesirable, a | |||
censor may then blocklist the provider site's IP address. | censor may then blocklist the provider site's IP address. | |||
4.2. Application Layer | 4.2. Application Layer | |||
The following subsections describe properties and tradeoffs of common | The following subsections describe properties and trade-offs of | |||
ways in which censors filter using application-layer information. | common ways in which censors filter using application-layer | |||
Each subsection includes empirical examples describing these common | information. Each subsection includes empirical examples describing | |||
behaviors for further reference. | these common behaviors for further reference. | |||
4.2.1. HTTP Request Header Identification | 4.2.1. HTTP Request Header Identification | |||
An HTTP header contains a lot of useful information for traffic | An HTTP header contains a lot of useful information for traffic | |||
identification. Although "host" is the only required field in an | identification. Although "host" is the only required field in an | |||
HTTP request header (for HTTP/1.1 and later), an HTTP method field is | HTTP request header (for HTTP/1.1 and later), an HTTP method field is | |||
necessary to do anything useful. As such, "method" and "host" are | necessary to do anything useful. As such, "method" and "host" are | |||
the two fields used most often for ubiquitous censorship. A censor | the two fields used most often for ubiquitous censorship. A censor | |||
can sniff traffic and identify a specific domain name (host) and | can sniff traffic and identify a specific domain name (host) and | |||
usually a page name (GET /page) as well. This identification | usually a page name (for example, GET /page) as well. This | |||
technique is usually paired with transport header identification (see | identification technique is usually paired with transport header | |||
Section 4.3.1) for a more robust method. | identification (see Section 4.3.1) for a more robust method. | |||
Tradeoffs: Request Identification is a technically straight-forward | Trade-offs: HTTP request header identification is a technically | |||
identification method that can be easily implemented at the Backbone | straightforward identification method that can be easily implemented | |||
or ISP level. The hardware needed for this sort of identification is | at the backbone or ISP level. The hardware needed for this sort of | |||
cheap and easy-to-acquire, making it desirable when budget and scope | identification is cheap and easy to acquire, making it desirable when | |||
are a concern. HTTPS (Hyptertext Transport Protocol Secure) will | budget and scope are a concern. HTTPS (Hypertext Transport Protocol | |||
encrypt the relevant request and response fields, so pairing with | Secure) will encrypt the relevant request and response fields, so | |||
transport identification (see Section 4.3.1) is necessary for HTTPS | pairing with transport identification (see Section 4.3.1) is | |||
filtering. However, some countermeasures can trivially defeat simple | necessary for HTTPS filtering. However, some countermeasures can | |||
forms of HTTP Request Header Identification. For example, two | trivially defeat simple forms of HTTP request header identification. | |||
cooperating endpoints -- an instrumented web server and client -- | For example, two cooperating endpoints -- an instrumented web server | |||
could encrypt or otherwise obfuscate the "host" header in a request, | and client -- could encrypt or otherwise obfuscate the "host" header | |||
potentially thwarting techniques that match against "host" header | in a request, potentially thwarting techniques that match against | |||
values. | "host" header values. | |||
Empirical Examples: Studies exploring censorship mechanisms have | Empirical Examples: Studies exploring censorship mechanisms have | |||
found evidence of HTTP header/ URL filtering in many countries, | found evidence of HTTP header and/or URL filtering in many countries, | |||
including Bangladesh, Bahrain, China, India, Iran, Malaysia, | including Bangladesh, Bahrain, China, India, Iran, Malaysia, | |||
Pakistan, Russia, Saudi Arabia, South Korea, Thailand, and Turkey | Pakistan, Russia, Saudi Arabia, South Korea, Thailand, and Turkey | |||
[Verkamp-2012] [Nabi-2013] [Aryan-2012]. Commercial technologies are | [Verkamp-2012] [Nabi-2013] [Aryan-2013]. Commercial technologies are | |||
often purchased by censors [Dalek-2013]. These commercial | often purchased by censors [Dalek-2013]. These commercial | |||
technologies use a combination of HTTP Request Identification and | technologies use a combination of HTTP request header identification | |||
Transport Header Identification to filter specific URLs. Dalek et | and transport header identification to filter specific URLs. Dalek | |||
al. and Jones et al. identified the use of these products in the wild | et al. and Jones et al. identified the use of these products in the | |||
[Dalek-2013] [Jones-2014]. | wild [Dalek-2013] [Jones-2014]. | |||
4.2.2. HTTP Response Header Identification | 4.2.2. HTTP Response Header Identification | |||
While HTTP Request Header Identification relies on the information | While HTTP request header identification relies on the information | |||
contained in the HTTP request from client to server, response | contained in the HTTP request from client to server, HTTP response | |||
identification uses information sent in response by the server to | header identification uses information sent in response by the server | |||
client to identify undesirable content. | to client to identify undesirable content. | |||
Tradeoffs: As with HTTP Request Header Identification, the techniques | Trade-offs: As with HTTP request header identification, the | |||
used to identify HTTP traffic are well-known, cheap, and relatively | techniques used to identify HTTP traffic are well-known, cheap, and | |||
easy to implement. However, they are made useless by HTTPS because | relatively easy to implement. However, they are made useless by | |||
HTTPS encrypts the response and its headers. | HTTPS because HTTPS encrypts the response and its headers. | |||
The response fields are also less helpful for identifying content | The response fields are also less helpful for identifying content | |||
than request fields, as "Server" could easily be identified using | than request fields, as "Server" could easily be identified using | |||
HTTP Request Header identification, and "Via" is rarely relevant. | HTTP request header identification, and "Via" is rarely relevant. | |||
HTTP Response censorship mechanisms normally let the first n packets | HTTP response censorship mechanisms normally let the first n packets | |||
through while the mirrored traffic is being processed; this may allow | through while the mirrored traffic is being processed; this may allow | |||
some content through and the user may be able to detect that the | some content through, and the user may be able to detect that the | |||
censor is actively interfering with undesirable content. | censor is actively interfering with undesirable content. | |||
Empirical Examples: In 2009, Jong Park et al. at the University of | Empirical Examples: In 2009, Jong Park et al. at the University of | |||
New Mexico demonstrated that the Great Firewall of China (GFW) has | New Mexico demonstrated that the Great Firewall of China (GFW) has | |||
used this technique [Crandall-2010]. However, Jong Park et al. found | used this technique [Crandall-2010]. However, Jong Park et al. found | |||
that the GFW discontinued this practice during the course of the | that the GFW discontinued this practice during the course of the | |||
study. Due to the overlap in HTTP response filtering and keyword | study. Due to the overlap in HTTP response filtering and keyword | |||
filtering (see Section 4.2.4), it is likely that most censors rely on | filtering (see Section 4.2.4), it is likely that most censors rely on | |||
keyword filtering over TCP streams instead of HTTP response | keyword filtering over TCP streams instead of HTTP response | |||
filtering. | filtering. | |||
4.2.3. Transport Layer Security (TLS) | 4.2.3. Transport Layer Security (TLS) | |||
Similar to HTTP, censors have deployed a variety of techniques | Similar to HTTP, censors have deployed a variety of techniques | |||
towards censoring Transport Layer Security (TLS) (and by extension | towards censoring TLS (and by extension HTTPS). Most of these | |||
HTTPS). Most of these techniques relate to the Server Name | techniques relate to the Server Name Indication (SNI) field, | |||
Indication (SNI) field, including censoring SNI, Encrypted SNI, or | including censoring SNI, Encrypted SNI (ESNI), or omitted SNI. | |||
omitted SNI. Censors can also censor HTTPS content via server | Censors can also censor HTTPS content via server certificates. Note | |||
certificates. Note that TLS 1.3 acts as a security component of | that TLS 1.3 acts as a security component of QUIC. | |||
QUIC. | ||||
4.2.3.1. Server Name Indication (SNI) | 4.2.3.1. Server Name Indication (SNI) | |||
In encrypted connections using TLS, there may be servers that host | In encrypted connections using TLS, there may be servers that host | |||
multiple "virtual servers" at a given network address, and the client | multiple "virtual servers" at a given network address, and the client | |||
will need to specify in the Client Hello message which domain name it | will need to specify in the ClientHello message which domain name it | |||
seeks to connect to (so that the server can respond with the | seeks to connect to (so that the server can respond with the | |||
appropriate TLS certificate) using the Server Name Indication (SNI) | appropriate TLS certificate) using, the SNI TLS extension [RFC6066]. | |||
TLS extension [RFC6066]. The Client Hello message is unencrypted for | The ClientHello message is unencrypted for TCP-based TLS. When using | |||
TCP-based TLS. When using QUIC, the Client Hello message is | QUIC, the ClientHello message is encrypted, but its confidentiality | |||
encrypted but its confidentiality is not effectively protected | is not effectively protected because the initial encryption keys are | |||
because the initial encryption keys are derived using a value that is | derived using a value that is visible on the wire. Since SNI is | |||
visible on the wire. Since SNI is often sent in the clear (as are | often sent in the clear (as are the cert fields sent in response), | |||
the cert fields sent in response), censors and filtering software can | censors and filtering software can use it (and response cert fields) | |||
use it (and response cert fields) as a basis for blocking, filtering, | as a basis for blocking, filtering, or impairment by dropping | |||
or impairment by dropping connections to domains that match | connections to domains that match prohibited content (e.g., | |||
prohibited content (e.g., bad.foo.example may be censored while | "bad.foo.example" may be censored while "good.foo.example" is not) | |||
good.foo.example is not) [Shbair-2015]. There are ongoing | [Shbair-2015]. There are ongoing standardization efforts in the TLS | |||
standardization efforts in the TLS Working Group to encrypt SNI | Working Group to encrypt SNI [RFC8744] [TLS-ESNI], and recent | |||
[I-D.ietf-tls-sni-encryption] [I-D.ietf-tls-esni] and recent research | research shows promising results in the use of ESNI in the face of | |||
shows promising results in the use of encrypted SNI in the face of | ||||
SNI-based filtering [Chai-2019] in some countries. | SNI-based filtering [Chai-2019] in some countries. | |||
Domain fronting has been one popular way to avoid identification by | Domain fronting has been one popular way to avoid identification by | |||
censors [Fifield-2015]. To avoid identification by censors, | censors [Fifield-2015]. To avoid identification by censors, | |||
applications using domain fronting put a different domain name in the | applications using domain fronting put a different domain name in the | |||
SNI extension than in the Host: header, which is protected by HTTPS. | SNI extension than in the "host" header, which is protected by HTTPS. | |||
The visible SNI would indicate an unblocked domain, while the blocked | The visible SNI would indicate an unblocked domain, while the blocked | |||
domain remains hidden in the encrypted application header. Some | domain remains hidden in the encrypted application header. Some | |||
encrypted messaging services relied on domain fronting to enable | encrypted messaging services relied on domain fronting to enable | |||
their provision in countries employing SNI-based filtering. These | their provision in countries employing SNI-based filtering. These | |||
services used the cover provided by domains for which blocking at the | services used the cover provided by domains for which blocking at the | |||
domain level would be undesirable to hide their true domain names. | domain level would be undesirable to hide their true domain names. | |||
However, the companies holding the most popular domains have since | However, the companies holding the most popular domains have since | |||
reconfigured their software to prevent this practice. It may be | reconfigured their software to prevent this practice. It may be | |||
possible to achieve similar results using potential future options to | possible to achieve similar results using potential future options to | |||
encrypt SNI. | encrypt SNI. | |||
Tradeoffs: Some clients do not send the SNI extension (e.g., clients | Trade-offs: Some clients do not send the SNI extension (e.g., clients | |||
that only support versions of SSL and not TLS), rendering this method | that only support versions of SSL and not TLS), rendering this method | |||
ineffective (see Section 4.2.3.3). In addition, this technique | ineffective (see Section 4.2.3.3). In addition, this technique | |||
requires deep packet inspection (DPI) techniques that can be | requires deep packet inspection (DPI) techniques that can be | |||
computationally and infrastructurally expensive, especially when | expensive in terms of computational complexity and infrastructure, | |||
applied to QUIC where DPI requires key extraction and decryption of | especially when applied to QUIC where DPI requires key extraction and | |||
the Client Hello in order to read the SNI. Improper configuration of | decryption of the ClientHello in order to read the SNI. Improper | |||
an SNI-based block can result in significant overblocking, e.g., when | configuration of an SNI-based block can result in significant over- | |||
a second-level domain like populardomain.example is inadvertently | blocking, e.g., when a second-level domain like | |||
blocked. In the case of encrypted SNI, pressure to censor may | "populardomain.example" is inadvertently blocked. In the case of | |||
transfer to other points of intervention, such as content and | ESNI, pressure to censor may transfer to other points of | |||
application providers. | intervention, such as content and application providers. | |||
Empirical Examples: There are many examples of security firms that | Empirical Examples: There are many examples of security firms that | |||
offer SNI-based filtering products [Trustwave-2015] [Sophos-2015] | offer SNI-based filtering products [Trustwave-2015] [Sophos-2023] | |||
[Shbair-2015], and the governments of China, Egypt, Iran, Qatar, | [Shbair-2015]. The governments of China, Egypt, Iran, Qatar, South | |||
South Korea, Turkey, Turkmenistan, and the UAE all do widespread SNI | Korea, Turkey, Turkmenistan, and the United Arab Emirates all do | |||
filtering or blocking [OONI-2018] [OONI-2019] [NA-SK-2019] | widespread SNI filtering or blocking [OONI-2018] [OONI-2019] | |||
[CitizenLab-2018] [Gatlan-2019] [Chai-2019] [Grover-2019] | [NA-SK-2019] [CitizenLab-2018] [Gatlan-2019] [Chai-2019] | |||
[Singh-2019]. SNI blocking against QUIC traffic was first observed | [Grover-2019] [Singh-2019]. SNI blocking against QUIC traffic was | |||
in Russia in March 2022 [Elmenhorst-2022]. | first observed in Russia in March 2022 [Elmenhorst-2022]. | |||
4.2.3.2. Encrypted SNI (ESNI) | 4.2.3.2. Encrypted SNI (ESNI) | |||
With the data leakage present with the SNI field, a natural response | With the data leakage present with the SNI field, a natural response | |||
is to encrypt it, which is forthcoming in TLS 1.3 with Encrypted | is to encrypt it, which is forthcoming in TLS 1.3 with Encrypted | |||
Client Hello (ECH). Prior to ECH, the Encrypted SNI (ESNI) extension | Client Hello (ECH). Prior to ECH, the ESNI extension is available to | |||
is available to prevent the data leakage caused by SNI, which | prevent the data leakage caused by SNI, which encrypts only the SNI | |||
encrypts only the SNI field. Unfortunately, censors can target | field. Unfortunately, censors can target connections that use the | |||
connections that use the ESNI extension specifically for censorship. | ESNI extension specifically for censorship. This guarantees over- | |||
This guarantees overblocking for the censor, but can be worth the | blocking for the censor but can be worth the cost if ESNI is not yet | |||
cost if ESNI is not yet widely deployed within the country. | widely deployed within the country. ECH is the emerging standard for | |||
Encrypted Client Hello (ECH) is the emerging standard for protecting | protecting the entire TLS ClientHello, but it is not yet widely | |||
the entire TLS Client Hello, but it is not yet widely deployed. | deployed. | |||
Tradeoffs: The cost to censoring Encrypted SNI (ESNI) is | Trade-offs: The cost to censoring ESNI is significantly higher than | |||
significantly higher than SNI to a censor, as the censor can no | SNI to a censor, as the censor can no longer target censorship to | |||
longer target censorship to specific domains and guarantees over- | specific domains and guarantees over-blocking. In these cases, the | |||
blocking. In these cases, the censor uses the over-blocking to | censor uses the over-blocking to discourage the use of ESNI entirely. | |||
discourage the use of ESNI entirely. | ||||
Empirical Examples: In 2020, China began censoring all uses of | Empirical Examples: In 2020, China began censoring all uses of ESNI | |||
Encrypted ESNI (ESNI) [Bock-2020b], even for innocuous connections. | [Bock-2020b], even for innocuous connections. The censorship | |||
The censorship mechanism for China's ESNI censorship differs from how | mechanism for China's ESNI censorship differs from how China censors | |||
China censors SNI-based connections, suggesting that new middleboxes | SNI-based connections, suggesting that new middleboxes were deployed | |||
were deployed specifically to target ESNI connections. | specifically to target ESNI connections. | |||
4.2.3.3. Omitted-SNI | 4.2.3.3. Omitted SNI | |||
Researchers have observed that some clients omit the SNI extension | Researchers have observed that some clients omit the SNI extension | |||
entirely. This omitted-SNI approach limits the information available | entirely. This omitted-SNI approach limits the information available | |||
to a censor. Like with ESNI, censors can choose to block connections | to a censor. Like with ESNI, censors can choose to block connections | |||
that omit the SNI, though this too risks over-blocking. | that omit the SNI, though this too risks over-blocking. | |||
Tradeoffs: The approach of censoring all connections that omit the | Trade-offs: The approach of censoring all connections that omit the | |||
SNI field is guaranteed to over-block, though connections that omit | SNI field is guaranteed to over-block, though connections that omit | |||
the SNI field should be relatively rare in the wild. | the SNI field should be relatively rare in the wild. | |||
Empirical Examples: In the past, researchers have observed censors in | Empirical Examples: In the past, researchers have observed censors in | |||
Russia blocking connections that omit the SNI field [Bock-2020b]. | Russia blocking connections that omit the SNI field [Bock-2020b]. | |||
4.2.3.4. Server Response Certificate | 4.2.3.4. Server Response Certificate | |||
During the TLS handshake after the TLS Client Hello, the server will | During the TLS handshake after the TLS ClientHello, the server will | |||
respond with the TLS certificate. This certificate also contains the | respond with the TLS certificate. This certificate also contains the | |||
domain the client is trying to access, creating another avenue that | domain the client is trying to access, creating another avenue that | |||
censors can use to perform censorship. This technique will not work | censors can use to perform censorship. This technique will not work | |||
in TLS 1.3, as the certificate will be encrypted. | in TLS 1.3, as the certificate will be encrypted. | |||
Tradeoffs: Censoring based on the server certificate requires DPI | Trade-offs: Censoring based on the server certificate requires DPI | |||
techniques that can be more computationally expensive compared to | techniques that can be more computationally expensive compared to | |||
other methods. Additionally, the certificate is sent later in the | other methods. Additionally, the certificate is sent later in the | |||
TLS Handshake compared to the SNI field, forcing the censor to track | TLS handshake compared to the SNI field, forcing the censor to track | |||
the connection longer. | the connection longer. | |||
Empirical Examples: Researchers have observed the Reliance Jio ISP in | Empirical Examples: Researchers have observed the Reliance Jio ISP in | |||
India using certificate response fields to censor connections | India using certificate response fields to censor connections | |||
[Satija-2021]. | [Satija-2021]. | |||
4.2.4. Instrumenting Content Distributors | 4.2.4. Instrumenting Content Distributors | |||
Many governments pressure content providers to censor themselves, or | Many governments pressure content providers to censor themselves, or | |||
provide the legal framework within which content distributors are | provide the legal framework, within which content distributors are | |||
incentivized to follow the content restriction preferences of agents | incentivized to follow the content restriction preferences of agents | |||
external to the content distributor [Boyle-1997]. Due to the | external to the content distributor [Boyle-1997]. Due to the | |||
extensive reach of such censorship, we define content distributor as | extensive reach of such censorship, we define "content distributor" | |||
any service that provides utility to users, including everything from | as any service that provides utility to users, including everything | |||
web sites to storage to locally installed programs. | from websites to storage to locally installed programs. | |||
A commonly used method of instrumenting content distributors consists | A commonly used method of instrumenting content distributors consists | |||
of keyword identification to detect restricted terms on their | of keyword identification to detect restricted terms on their | |||
platforms. Governments may provide the terms on such keyword lists. | platforms. Governments may provide the terms on such keyword lists. | |||
Alternatively, the content provider may be expected to come up with | Alternatively, the content provider may be expected to come up with | |||
their own list. | their own list. | |||
An increasingly common method of instrumenting content distribution | An increasingly common method of instrumenting content distribution | |||
consists of hash matching to detect and take action on images and | consists of hash matching to detect and take action against images | |||
videos known to be restricted either by governments, institutions, | and videos known to be restricted either by governments, | |||
organizations or the distributor themselves [ekr-2021]. | institutions, organizations or the distributor themselves [ekr-2021]. | |||
A different method of instrumenting content distributors consists of | A different method of instrumenting content distributors consists of | |||
requiring a distributor to disassociate with some categories of | requiring a distributor to disassociate with some categories of | |||
users. See also Section 6.4. | users. See also Section 6.4. | |||
Tradeoffs: By instrumenting content distributors to identify | Trade-offs: By instrumenting content distributors to identify | |||
restricted content or content providers, the censor can gain new | restricted content or content providers, the censor can gain new | |||
information at the cost of political capital with the companies it | information at the cost of political capital with the companies it | |||
forces or encourages to participate in censorship. For example, the | forces or encourages to participate in censorship. For example, the | |||
censor can gain insight about the content of encrypted traffic by | censor can gain insight about the content of encrypted traffic by | |||
coercing web sites to identify restricted content. Coercing content | coercing websites to identify restricted content. Coercing content | |||
distributors to regulate users, categories of users, content and | distributors to regulate users, categories of users, content, and | |||
content providers may encourage users and content providers to | content providers may encourage users and content providers to | |||
exhibit self-censorship, an additional advantage for censors (see | exhibit self-censorship, an additional advantage for censors (see | |||
Section 6.2). The tradeoffs for instrumenting content distributors | Section 6.2). The trade-offs for instrumenting content distributors | |||
are highly dependent on the content provider and the requested | are highly dependent on the content provider and the requested | |||
assistance. A typical concern is that the targeted keywords or | assistance. A typical concern is that the targeted keywords or | |||
categories of users are too broad, risk being too broadly applied, or | categories of users are too broad, risk being too broadly applied, or | |||
are not subjected to a sufficiently robust legal process prior to | are not subjected to a sufficiently robust legal process prior to | |||
their mandatory application (see p. 8 of [EC-2012]). | their mandatory application (see page 8 of [EC-2012]). | |||
Empirical Examples: Researchers discovered keyword identification by | Empirical Examples: Researchers discovered keyword identification by | |||
content providers on platforms ranging from instant messaging | content providers on platforms ranging from instant messaging | |||
applications [Senft-2013] to search engines [Rushe-2015] [Cheng-2010] | applications [Senft-2013] to search engines [Rushe-2014] [Cheng-2010] | |||
[Whittaker-2013] [BBC-2013] [Condliffe-2013]. To demonstrate the | [Whittaker-2013] [BBC-2013] [Condliffe-2013]. To demonstrate the | |||
prevalence of this type of keyword identification, we look to search | prevalence of this type of keyword identification, we look to search | |||
engine censorship. | engine censorship. | |||
Search engine censorship demonstrates keyword identification by | Search engine censorship demonstrates keyword identification by | |||
content providers and can be regional or worldwide. Implementation | content providers and can be regional or worldwide. Implementation | |||
is occasionally voluntary, but normally it is based on laws and | is occasionally voluntary, but normally it is based on laws and | |||
regulations of the country a search engine is operating in. The | regulations of the country a search engine is operating in. The | |||
keyword blocklists are most likely maintained by the search engine | keyword blocklists are most likely maintained by the search engine | |||
provider. China is known to require search engine providers to | provider. China is known to require search engine providers to | |||
"voluntarily" maintain search term blocklists to acquire and keep an | "voluntarily" maintain search term blocklists to acquire and keep an | |||
Internet content provider (ICP) license [Cheng-2010]. It is clear | Internet Content Provider (ICP) license [Cheng-2010]. It is clear | |||
these blocklists are maintained by each search engine provider based | these blocklists are maintained by each search engine provider based | |||
on the slight variations in the intercepted searches [Zhu-2011] | on the slight variations in the intercepted searches [Zhu-2011] | |||
[Whittaker-2013]. The United Kingdom has been pushing search engines | [Whittaker-2013]. The United Kingdom has been pushing search engines | |||
to self-censor with the threat of litigation if they do not do it | to self-censor with the threat of litigation if they do not do it | |||
themselves: Google and Microsoft have agreed to block more than | themselves: Google and Microsoft have agreed to block more than | |||
100,000 queries in the U.K. to help combat abuse [BBC-2013] | 100,000 queries in the U.K. to help combat abuse [BBC-2013] | |||
[Condliffe-2013]. European Union law, as well as US law, requires | [Condliffe-2013]. European Union law, as well as United States law, | |||
modification of search engine results in response to either | requires modification of search engine results in response to either | |||
copyright, trademark, data protection or defamation concerns | copyright, trademark, data protection, or defamation concerns | |||
[EC-2012]. | [EC-2012]. | |||
Depending on the output, search engine keyword identification may be | Depending on the output, search engine keyword identification may be | |||
difficult or easy to detect. In some cases, specialized or blank | difficult or easy to detect. In some cases, specialized or blank | |||
results provide a trivial enumeration mechanism, but more subtle | results provide a trivial enumeration mechanism, but more subtle | |||
censorship can be difficult to detect. In February 2015, Microsoft's | censorship can be difficult to detect. In February 2015, Microsoft's | |||
search engine, Bing, was accused of censoring Chinese content outside | search engine, Bing, was accused of censoring Chinese content outside | |||
of China [Rushe-2015] because Bing returned different results for | of China [Rushe-2014] because Bing returned different results for | |||
censored terms in Chinese and English. However, it is possible that | censored terms in Chinese and English. However, it is possible that | |||
censorship of the largest base of Chinese search users, China, biased | censorship of the largest base of Chinese search users, China, biased | |||
Bing's results so that the more popular results in China (the | Bing's results so that the more popular results in China (the | |||
uncensored results) were also more popular for Chinese speakers | uncensored results) were also more popular for Chinese speakers | |||
outside of China. | outside of China. | |||
Disassociation by content distributors from certain categories of | Disassociation by content distributors from certain categories of | |||
users has happened for instance in Spain, as a result of the conflict | users has happened for instance in Spain, as a result of the conflict | |||
between the Catalan independence movement and the Spanish legal | between the Catalan independence movement and the Spanish legal | |||
presumption of a unitary state [Lomas-2019]. E-sport event | presumption of a unitary state [Lomas-2019]. E-sport event | |||
organizers have also disassociated themselves from top players who | organizers have also disassociated themselves from top players who | |||
expressed political opinions in relation to the 2019 Hong Kong | expressed political opinions in relation to the 2019 Hong Kong | |||
protests [Victor-2019]. See also Section 5.3.1. | protests [Victor-2019]. See also Section 5.3.1. | |||
4.2.5. DPI Identification | 4.2.5. DPI Identification | |||
DPI (deep packet inspection) technically is any kind of packet | DPI technically is any kind of packet analysis beyond IP address and | |||
analysis beyond IP address and port number and has become | port number and has become computationally feasible as a component of | |||
computationally feasible as a component of censorship mechanisms in | censorship mechanisms in recent years [Wagner-2009]. Unlike other | |||
recent years [Wagner-2009]. Unlike other techniques, DPI reassembles | techniques, DPI reassembles network flows to examine the application | |||
network flows to examine the application "data" section, as opposed | "data" section, as opposed to only headers, and is therefore often | |||
to only headers, and is therefore often used for keyword | used for keyword identification. DPI also differs from other | |||
identification. DPI also differs from other identification | identification technologies because it can leverage additional packet | |||
technologies because it can leverage additional packet and flow | and flow characteristics, e.g., packet sizes and timings, when | |||
characteristics, e.g., packet sizes and timings, when identifying | identifying content. To prevent substantial QoS impacts, DPI | |||
content. To prevent substantial quality of service (QoS) impacts, | normally analyzes a copy of data while the original packets continue | |||
DPI normally analyzes a copy of data while the original packets | to be routed. Typically, the traffic is split using either a mirror | |||
continue to be routed. Typically, the traffic is split using either | switch or fiber splitter and analyzed on a cluster of machines | |||
a mirror switch or fiber splitter, and analyzed on a cluster of | running Intrusion Detection Systems (IDSs) configured for censorship. | |||
machines running Intrusion Detection Systems (IDS) configured for | ||||
censorship. | ||||
Tradeoffs: DPI is one of the most expensive identification mechanisms | Trade-offs: DPI is one of the most expensive identification | |||
and can have a large QoS impact [Porter-2010]. When used as a | mechanisms and can have a large QoS impact [Porter-2005]. When used | |||
keyword filter for TCP flows, DPI systems can cause also major | as a keyword filter for TCP flows, DPI systems can cause also major | |||
overblocking problems. Like other techniques, DPI is less useful | over-blocking problems. Like other techniques, DPI is less useful | |||
against encrypted data, though DPI can leverage unencrypted elements | against encrypted data, though DPI can leverage unencrypted elements | |||
of an encrypted data flow, e.g., the Server Name Indication (SNI) | of an encrypted data flow (e.g., the Server Name Indication (SNI) | |||
sent in the clear for TLS, or metadata about an encrypted flow, e.g., | sent in the clear for TLS) or metadata about an encrypted flow (e.g., | |||
packet sizes, which differ across video and textual flows, to | packet sizes, which differ across video and textual flows) to | |||
identify traffic. See Section 4.2.3.1 for more information about | identify traffic. See Section 4.2.3.1 for more information about | |||
SNI-based filtration mechanisms. | SNI-based filtration mechanisms. | |||
Other kinds of information can be inferred by comparing certain | Other kinds of information can be inferred by comparing certain | |||
unencrypted elements exchanged during TLS handshakes to similar data | unencrypted elements exchanged during TLS handshakes to similar data | |||
points from known sources. This practice, called TLS fingerprinting, | points from known sources. This practice, called "TLS | |||
allows a probabilistic identification of a party's operating system, | fingerprinting", allows a probabilistic identification of a party's | |||
browser, or application, based on a comparison of the specific | operating system, browser, or application, based on a comparison of | |||
combinations of TLS version, ciphersuites, compression options, etc. | the specific combinations of TLS version, ciphersuites, compression | |||
sent in the ClientHello message to similar signatures found in | options, etc., sent in the ClientHello message to similar signatures | |||
unencrypted traffic [Husak-2016]. | found in unencrypted traffic [Husak-2016]. | |||
Despite these problems, DPI is the most powerful identification | Despite these problems, DPI is the most powerful identification | |||
method and is widely used in practice. The Great Firewall of China | method and is widely used in practice. The Great Firewall of China | |||
(GFW), the largest censorship system in the world, uses DPI to | (GFW), the largest censorship system in the world, uses DPI to | |||
identify restricted content over HTTP and DNS and to inject TCP RSTs | identify restricted content over HTTP and DNS and to inject TCP RSTs | |||
and bad DNS responses, respectively, into connections [Crandall-2010] | and bad DNS responses, respectively, into connections [Crandall-2010] | |||
[Clayton-2006] [Anonymous-2014]. | [Clayton-2006] [Anonymous-2014]. | |||
Empirical Examples: Several studies have found evidence of censors | Empirical Examples: Several studies have found evidence of censors | |||
using DPI for censoring content and tools. Clayton et al., Crandal | using DPI for censoring content and tools. Clayton et al., Crandal | |||
et al., Anonymous, and Khattak et al., all explored the GFW | et al., Anonymous, and Khattak et al., all explored the GFW | |||
[Crandall-2010] [Clayton-2006] [Anonymous-2014]. Khattak et al. even | [Crandall-2010] [Clayton-2006] [Anonymous-2014]. Khattak et al. even | |||
probed the firewall to discover implementation details like how much | probed the firewall to discover implementation details like how much | |||
state it stores [Khattak-2013]. The Tor project claims that China, | state it stores [Khattak-2013]. The Tor project claims that China, | |||
Iran, Ethiopia, and others must have used DPI to block the obfs2 | Iran, Ethiopia, and others must have used DPI to block the obfs2 | |||
protocol [Wilde-2012]. Malaysia has been accused of using targeted | protocol [Wilde-2012]. Malaysia has been accused of using targeted | |||
DPI, paired with DDoS, to identify and subsequently attack pro- | DPI, paired with DDoS, to identify and subsequently attack pro- | |||
opposition material [Wagstaff-2013]. It also seems likely that | opposition material [Wagstaff-2013]. It also seems likely that | |||
organizations not so worried about blocking content in real-time | organizations that are not so worried about blocking content in real | |||
could use DPI to sort and categorically search gathered traffic using | time could use DPI to sort and categorically search gathered traffic | |||
technologies such as high-speed packet processing [Hepting-2011]. | using technologies such as high-speed packet processing | |||
[Hepting-2011]. | ||||
4.3. Transport Layer | 4.3. Transport Layer | |||
4.3.1. Shallow Packet Inspection and Transport Header Identification | 4.3.1. Shallow Packet Inspection and Transport Header Identification | |||
Of the various shallow packet inspection methods, Transport Header | Of the various shallow packet inspection methods, transport header | |||
Identification is the most pervasive, reliable, and predictable type | identification is the most pervasive, reliable, and predictable type | |||
of identification. Transport headers contain a few invaluable pieces | of identification. Transport headers contain a few invaluable pieces | |||
of information that must be transparent for traffic to be | of information that must be transparent for traffic to be | |||
successfully routed: destination and source IP address and port. | successfully routed: destination and source IP address and port. | |||
Destination and Source IP are doubly useful, as not only does it | Destination and source IP are doubly useful, as not only do they | |||
allow a censor to block undesirable content via IP blocklisting, but | allow a censor to block undesirable content via IP blocklisting but | |||
also allows a censor to identify the IP of the user making the | also allow a censor to identify the IP of the user making the request | |||
request and the IP address of the destination being visited, which in | and the IP address of the destination being visited, which in most | |||
most cases can be used to infer the domain being visited | cases can be used to infer the domain being visited [Patil-2019]. | |||
[Patil-2019]. Port is useful for allowlisting certain applications. | Port is useful for allowlisting certain applications. | |||
Combining IP address, port and protocol information found in the | By combining IP address, port, and protocol information found in the | |||
transport header, shallow packet inspection can be used by a censor | transport header, shallow packet inspection can be used by a censor | |||
to identify specific TCP or UDP endpoints. UDP endpoint blocking has | to identify specific TCP or UDP endpoints. UDP endpoint blocking has | |||
been observed in the context of QUIC blocking [Elmenhorst-2021]. | been observed in the context of QUIC blocking [Elmenhorst-2021]. | |||
Trade offs: header identification is popular due to its simplicity, | Trade-offs: Header identification is popular due to its simplicity, | |||
availability, and robustness. | availability, and robustness. | |||
Header identification is trivial to implement, but is difficult to | Header identification is trivial to implement in some routers, but is | |||
implement in backbone or ISP routers at scale, and is therefore | difficult to implement in backbone or ISP routers at scale, and is | |||
typically implemented with DPI. Blocklisting an IP is equivalent to | therefore typically implemented with DPI. Blocklisting an IP is | |||
installing a specific route on a router (such as a /32 route for IPv4 | equivalent to installing a specific route on a router (such as a /32 | |||
addresses and a /128 route for IPv6 addresses). However, due to | route for IPv4 addresses and a /128 route for IPv6 addresses). | |||
limited flow table space, this cannot scale beyond a few thousand IPs | However, due to limited flow table space, this cannot scale beyond a | |||
at most. IP blocking is also relatively crude. It often leads to | few thousand IPs at most. IP blocking is also relatively crude. It | |||
overblocking and cannot deal with some services like content | often leads to over-blocking and cannot deal with some services like | |||
distribution networks (CDN) that host content at hundreds or | Content Distribution Networks (CDNs) that host content at hundreds or | |||
thousands of IP addresses. Despite these limitations, IP blocking is | thousands of IP addresses. Despite these limitations, IP blocking is | |||
extremely effective because the user needs to proxy their traffic | extremely effective because the user needs to proxy their traffic | |||
through another destination to circumvent this type of | through another destination to circumvent this type of | |||
identification. In addition, IP blocking is effective against all | identification. In addition, IP blocking is effective against all | |||
protocols above IP, e.g., TCP and QUIC. | protocols above IP, e.g., TCP and QUIC. | |||
Port-blocking is generally not useful because many types of content | Port blocking is generally not useful because many types of content | |||
share the same port and it is possible for censored applications to | share the same port, and it is possible for censored applications to | |||
change their port. For example, most HTTP traffic goes over port 80, | change their port. For example, most HTTP traffic goes over port 80, | |||
so the censor cannot differentiate between restricted and allowed web | so the censor cannot differentiate between restricted and allowed web | |||
content solely on the basis of port. HTTPS goes over port 443, with | content solely on the basis of port. HTTPS goes over port 443, with | |||
similar consequences for the censor except only partial metadata may | similar consequences for the censor except only partial metadata may | |||
now be available to the censor. Port allowlisting is occasionally | now be available to the censor. Port allowlisting is occasionally | |||
used, where a censor limits communication to approved ports, such as | used, where a censor limits communication to approved ports (such as | |||
80 for HTTP traffic, and is most effective when used in conjunction | 80 for HTTP traffic), and is most effective when used in conjunction | |||
with other identification mechanisms. For example, a censor could | with other identification mechanisms. For example, a censor could | |||
block the default HTTPS port, port 443, thereby forcing most users to | block the default HTTPS port (port 443), thereby forcing most users | |||
fall back to HTTP. A counter-example is that port 25 (SMTP) has long | to fall back to HTTP. A counterexample is that port 25 (SMTP) has | |||
been blocked on residential ISP networks to reduce the risk of email | long been blocked on residential ISP networks to reduce the risk of | |||
spam, but doing this also prohibits residential ISP customers from | email spam, but doing this also prohibits residential ISP customers | |||
running their own email servers. | from running their own email servers. | |||
4.3.2. Protocol Identification | 4.3.2. Protocol Identification | |||
Censors sometimes identify entire protocols to be blocked using a | Censors sometimes identify entire protocols to be blocked using a | |||
variety of traffic characteristics. For example, Iran impairs the | variety of traffic characteristics. For example, Iran impairs the | |||
performance of HTTPS traffic, a protocol that prevents further | performance of HTTPS traffic, a protocol that prevents further | |||
analysis, to encourage users to switch to HTTP, a protocol that they | analysis, to encourage users to switch to HTTP, a protocol that they | |||
can analyze [Aryan-2012]. A simple protocol identification would be | can analyze [Aryan-2013]. A simple protocol identification would be | |||
to recognize all TCP traffic over port 443 as HTTPS, but more | to recognize all TCP traffic over port 443 as HTTPS, but a more | |||
sophisticated analysis of the statistical properties of payload data | sophisticated analysis of the statistical properties of payload data | |||
and flow behavior, would be more effective, even when port 443 is not | and flow behavior would be more effective, even when port 443 is not | |||
used [Hjelmvik-2010] [Sandvine-2014]. | used [Hjelmvik-2010] [Sandvine-2015]. | |||
If censors can detect circumvention tools, they can block them, so | If censors can detect circumvention tools, they can block them. | |||
censors like China are extremely interested in identifying the | Therefore, censors like China are extremely interested in identifying | |||
protocols for censorship circumvention tools. In recent years, this | the protocols for censorship circumvention tools. In recent years, | |||
has devolved into an competition between censors and circumvention | this has devolved into a competition between censors and | |||
tool developers. As part of this competition, China developed an | circumvention tool developers. As part of this competition, China | |||
extremely effective protocol identification technique that | developed an extremely effective protocol identification technique | |||
researchers call active probing or active scanning. | that researchers call "active probing" or "active scanning". | |||
In active probing, the censor determines whether hosts are running a | In active probing, the censor determines whether hosts are running a | |||
circumvention protocol by trying to initiate communication using the | circumvention protocol by trying to initiate communication using the | |||
circumvention protocol. If the host and the censor successfully | circumvention protocol. If the host and the censor successfully | |||
negotiate a connection, then the censor conclusively knows that the | negotiate a connection, then the censor conclusively knows that the | |||
host is running a circumvention tool. China has used active scanning | host is running a circumvention tool. China has used active scanning | |||
to great effect to block Tor [Winter-2012]. | to great effect to block Tor [Winter-2012]. | |||
Trade offs: Protocol identification only provides insight into the | Trade-offs: Protocol identification only provides insight into the | |||
way information is traveling, and not the information itself. | way information is traveling, and not the information itself. | |||
Protocol identification is useful for detecting and blocking | Protocol identification is useful for detecting and blocking | |||
circumvention tools, like Tor, or traffic that is difficult to | circumvention tools (like Tor) or traffic that is difficult to | |||
analyze, like VoIP or SSL, because the censor can assume that this | analyze (like Voice over IP (VoIP) or SSL) because the censor can | |||
traffic should be blocked. However, this can lead to over-blocking | assume that this traffic should be blocked. However, this can lead | |||
problems when used with popular protocols. These methods are | to over-blocking problems when used with popular protocols. These | |||
expensive, both computationally and financially, due to the use of | methods are expensive, both computationally and financially, due to | |||
statistical analysis, and can be ineffective due to their imprecise | the use of statistical analysis and can be ineffective due to their | |||
nature. | imprecise nature. | |||
Censors have also used protocol identification in the past in an | Censors have also used protocol identification in the past in an | |||
'allowlist' filtering capacity, such as by only allowing specific, | "allowlist" filtering capacity, such as by only allowing specific, | |||
pre-vetted protocols to be used and blocking any unrecognized | pre-vetted protocols to be used and blocking any unrecognized | |||
protocols [Bock-2020]. These protocol filtering approaches can also | protocols [Bock-2020]. These protocol filtering approaches can also | |||
lead to over-blocking if the allowed lists of protocols is too small | lead to over-blocking if the allowed lists of protocols are too small | |||
or incomplete, but can be cheap to implement, as many standard | or incomplete but can be cheap to implement, as many standard | |||
'allowed' protocols are simple to identify (such as HTTP). | "allowed" protocols are simple to identify (such as HTTP). | |||
Empirical Examples: Protocol identification can be easy to detect if | Empirical Examples: Protocol identification can be easy to detect if | |||
it is conducted in real time and only a particular protocol is | it is conducted in real time and only a particular protocol is | |||
blocked, but some types of protocol identification, like active | blocked. However, some types of protocol identification, like active | |||
scanning, are much more difficult to detect. Protocol identification | scanning, are much more difficult to detect. Protocol identification | |||
has been used by Iran to identify and throttle SSH traffic to make it | has been used by Iran to identify and throttle Secure Shell (SSH) | |||
unusable [Anonymous-2007] and by China to identify and block Tor | protocol traffic to make it unusable [Van-der-Sar-2007] and by China | |||
relays [Winter-2012]. Protocol identification has also been used for | to identify and block Tor relays [Winter-2012]. Protocol | |||
traffic management, such as the 2007 case where Comcast in the United | identification has also been used for traffic management, such as the | |||
States used RST injection (injection of a TCP RST packet into the | 2007 case where Comcast in the United States used RST injection | |||
stream) to interrupt BitTorrent Traffic [Winter-2012]. In 2020, Iran | (injection of a TCP RST packet into the stream) to interrupt | |||
deployed an allowlist protocol filter, which only allowed three | BitTorrent traffic [Winter-2012]. In 2020, Iran deployed an | |||
protocols to be used (DNS, TLS, and HTTP) on specific ports and | allowlist protocol filter, which only allowed three protocols to be | |||
censored any connection it could not identify [Bock-2020]. In 2022, | used (DNS, TLS, and HTTP) on specific ports, and censored any | |||
Russia seemed to have used protocol identification to block most | connection it could not identify [Bock-2020]. In 2022, Russia seemed | |||
HTTP/3 connections [Elmenhorst-2022]. | to have used protocol identification to block most HTTP/3 connections | |||
[Elmenhorst-2022]. | ||||
4.4. Residual Censorship | 4.4. Residual Censorship | |||
Another feature of some modern censorship systems is residual | Another feature of some modern censorship systems is residual | |||
censorship, a punitive form of censorship whereby after a censor | censorship, a punitive form of censorship whereby after a censor | |||
disrupts a forbidden connection, the censor continues to target | disrupts a forbidden connection, the censor continues to target | |||
subsequent connections, even if they are innocuous [Bock-2021]. | subsequent connections, even if they are innocuous [Bock-2021]. | |||
Residual censorship can take many forms and often relies on the | Residual censorship can take many forms and often relies on the | |||
methods of technical interference described in the next section. | methods of technical interference described in the next section. | |||
An important facet of residual censorship is precisely what the | An important facet of residual censorship is precisely what the | |||
censor continues to block after censorship is initially triggered. | censor continues to block after censorship is initially triggered. | |||
There are three common options available to an adversary: 2-tuple | There are three common options available to an adversary: 2-tuple | |||
(client IP, server IP), 3-tuple (client IP, server IP+port), or | (client IP, server IP), 3-tuple (client IP, server IP, server port), | |||
4-tuple (client IP+port, server IP+port). Future connections that | or 4-tuple (client IP, client port, server IP, server port). Future | |||
match the tuple of information the censor records will be disrupted | connections that match the tuple of information the censor records | |||
[Bock-2021]. | will be disrupted [Bock-2021]. | |||
Residual censorship can sometimes be difficult to identify and can | Residual censorship can sometimes be difficult to identify and can | |||
often complicate censorship measurement. | often complicate censorship measurement. | |||
Trade offs: The impact of residual censorship is to provide users | Trade-offs: The impact of residual censorship is to provide users | |||
with further discouragement from trying to access forbidden content, | with further discouragement from trying to access forbidden content, | |||
though it is not clear how successful it is at accomplishing this. | though it is not clear how successful it is at accomplishing this. | |||
Empirical Examples: China has used 3-tuple residual censorship in | Empirical Examples: China has used 3-tuple residual censorship in | |||
conjunction with their HTTP censorship for years and researchers have | conjunction with their HTTP censorship for years, and researchers | |||
reported seeing similar residual censorship for HTTPS. China seems | have reported seeing similar residual censorship for HTTPS. China | |||
to use a mix of 3-tuple and 4-tuple residual censorship for their | seems to use a mix of 3-tuple and 4-tuple residual censorship for | |||
censorship of HTTPS with ESNI. Some censors that perform censorship | their censorship of HTTPS with ESNI. Some censors that perform | |||
via packet dropping often accidentally implement 4-tuple residual | censorship via packet dropping often accidentally implement 4-tuple | |||
censorship, including Iran and Kazakhstan [Bock-2021]. | residual censorship, including Iran and Kazakhstan [Bock-2021]. | |||
5. Technical Interference | 5. Technical Interference | |||
5.1. Application Layer | 5.1. Application Layer | |||
5.1.1. DNS Interference | 5.1.1. DNS Interference | |||
There are a variety of mechanisms that censors can use to block or | There are a variety of mechanisms that censors can use to block or | |||
filter access to content by altering responses from the DNS | filter access to content by altering responses from the DNS | |||
[AFNIC-2013] [ICANN-SSAC-2012], including blocking the response, | [AFNIC-2013] [ICANN-SSAC-2012], including blocking the response, | |||
replying with an error message, or responding with an incorrect | replying with an error message, or responding with an incorrect | |||
address. Note that there are now encrypted transports for DNS | address. Note that there are now encrypted transports for DNS | |||
queries in DNS-over-HTTPS [RFC8484] and DNS-over-TLS [RFC7858] that | queries in DNS over HTTPS [RFC8484] and DNS over TLS [RFC7858] that | |||
can mitigate interference with DNS queries between the stub and the | can mitigate interference with DNS queries between the stub and the | |||
resolver. | resolver. | |||
Responding to a DNS query with an incorrect address can be achieved | Responding to a DNS query with an incorrect address can be achieved | |||
with on-path interception, off-path cache poisoning, and lying by the | with on-path interception, off-path cache poisoning, or lying by the | |||
nameserver. | name server. | |||
"DNS mangling" is a network-level technique of on-path interception | "DNS mangling" is a network-level technique of on-path interception | |||
where an incorrect IP address is returned in response to a DNS query | where an incorrect IP address is returned in response to a DNS query | |||
to a censored destination. Some Chinese networks, for example, do | to a censored destination. Some Chinese networks, for example, do | |||
this (we are not aware of any other wide-scale uses of mangling). On | this. (We are not aware of any other wide-scale uses of mangling.) | |||
those Chinese networks, every DNS request in transit is examined | On those Chinese networks, each DNS request in transit is examined | |||
(presumably by network inspection technologies such as DPI) and, if | (presumably by network inspection technologies such as DPI), and if | |||
it matches a censored domain, a false response is injected. End | it matches a censored domain, a false response is injected. End | |||
users can see this technique in action by simply sending DNS requests | users can see this technique in action by simply sending DNS requests | |||
to any unused IP address in China (see example below). If it is not | to any unused IP address in China (see example below). If it is not | |||
a censored name, there will be no response. If it is censored, a | a censored name, there will be no response. If it is censored, a | |||
forged response will be returned. For example, using the command- | forged response will be returned. For example, using the command- | |||
line dig utility to query an unused IP address in China of 192.0.2.2 | line dig utility to query an unused IP address in China of 192.0.2.2 | |||
for the name "www.uncensored.example" compared with | for the name "www.uncensored.example" compared with | |||
"www.censored.example" (censored at the time of writing), we get a | "www.censored.example" (censored at the time of writing), we get a | |||
forged IP address "198.51.100.0" as a response: | forged IP address "198.51.100.0" as a response: | |||
skipping to change at page 19, line 7 ¶ | skipping to change at line 854 ¶ | |||
% dig +short +nodnssec @192.0.2.2 A www.censored.example | % dig +short +nodnssec @192.0.2.2 A www.censored.example | |||
198.51.100.0 | 198.51.100.0 | |||
DNS cache poisoning happens off-path and refers to a mechanism where | DNS cache poisoning happens off-path and refers to a mechanism where | |||
a censor interferes with the response sent by an authoritative DNS | a censor interferes with the response sent by an authoritative DNS | |||
name server to a recursive resolver by responding more quickly than | name server to a recursive resolver by responding more quickly than | |||
the authoritative name server can respond with an alternative IP | the authoritative name server can respond with an alternative IP | |||
address [Halley-2008]. Cache poisoning occurs after the requested | address [Halley-2008]. Cache poisoning occurs after the requested | |||
site's name servers resolve the request and attempt to forward the | site's name servers resolve the request and attempt to forward the | |||
true IP back to the requesting device; on the return route the | true IP back to the requesting device. On the return route, the | |||
resolved IP is recursively cached by each DNS server that initially | resolved IP is recursively cached by each DNS server that initially | |||
forwarded the request. During this caching process if an undesirable | forwarded the request. During this caching process if an undesirable | |||
keyword is recognized, the resolved IP is "poisoned" and an | keyword is recognized, the resolved IP is "poisoned", and an | |||
alternative IP (or NXDOMAIN error) is returned more quickly than the | alternative IP (or NXDOMAIN error) is returned more quickly than the | |||
upstream resolver can respond, causing a forged IP address to be | upstream resolver can respond, causing a forged IP address to be | |||
cached (and potentially recursively so). The alternative IPs usually | cached (and potentially recursively so). The alternative IPs usually | |||
direct to a nonsense domain or a warning page. Alternatively, | direct to a nonsense domain or a warning page. Alternatively, | |||
Iranian censorship appears to prevent the communication en-route, | Iranian censorship appears to prevent the communication en route, | |||
preventing a response from ever being sent [Aryan-2012]. | preventing a response from ever being sent [Aryan-2013]. | |||
There are also cases of what is colloquially called "DNS lying", | There are also cases of what is colloquially called "DNS lying", | |||
where a censor mandates that the DNS responses provided -- by an | where a censor mandates that the DNS responses provided -- by an | |||
operator of a recursive resolver such as an Internet access provider | operator of a recursive resolver such as an Internet Access Provider | |||
-- be different than what an authoritative name server would provide | -- be different than what an authoritative name server would provide | |||
[Bortzmeyer-2015]. | [Bortzmeyer-2015]. | |||
Trade offs: These forms of DNS interference require the censor to | Trade-offs: These forms of DNS interference require the censor to | |||
force a user to traverse a controlled DNS hierarchy (or intervening | force a user to traverse a controlled DNS hierarchy (or intervening | |||
network on which the censor serves as an Active Pervasive Attacker | network on which the censor serves as an active pervasive attacker | |||
[RFC7624] to rewrite DNS responses) for the mechanism to be | [RFC7624] to rewrite DNS responses) for the mechanism to be | |||
effective. It can be circumvented by using alternative DNS resolvers | effective. DNS interference can be circumvented by using alternative | |||
(such as any of the public DNS resolvers) that may fall outside of | DNS resolvers (such as any of the public DNS resolvers) that may fall | |||
the jurisdictional control of the censor, or Virtual Private Network | outside of the jurisdictional control of the censor or Virtual | |||
(VPN) technology. DNS mangling and cache poisoning also imply | Private Network (VPN) technology. DNS mangling and cache poisoning | |||
returning an incorrect IP to those attempting to resolve a domain | also imply returning an incorrect IP to those attempting to resolve a | |||
name, but in some cases the destination may be technically | domain name, but in some cases the destination may be technically | |||
accessible; over HTTP, for example, the user may have another method | accessible. For example, over HTTP, the user may have another method | |||
of obtaining the IP address of the desired site and may be able to | of obtaining the IP address of the desired site and may be able to | |||
access it if the site is configured to be the default server | access it if the site is configured to be the default server | |||
listening at this IP address. Target blocking has also been a | listening at this IP address. Target blocking has also been a | |||
problem, as occasionally users outside of the censor's region will be | problem, as occasionally users outside of the censor's region will be | |||
directed through DNS servers or DNS-rewriting network equipment | directed through DNS servers or DNS-rewriting network equipment | |||
controlled by a censor, causing the request to fail. The ease of | controlled by a censor, causing the request to fail. The ease of | |||
circumvention, paired with the large risk of content blocking and | circumvention paired with the large risk of content blocking and | |||
target blocking, make DNS interference a partial, difficult, and less | target blocking make DNS interference a partial, difficult, and less- | |||
than ideal censorship mechanism. | than-ideal censorship mechanism. | |||
Additionally, the above mechanisms rely on DNSSEC not being deployed | Additionally, the above mechanisms rely on DNSSEC not being deployed | |||
or DNSSEC validation not being active on the client or recursive | or DNSSEC validation not being active on the client or recursive | |||
resolver (neither of which are hard to imagine given limited | resolver (neither of which is hard to imagine given limited | |||
deployment of DNSSEC and limited client support for DNSSEC | deployment of DNSSEC and limited client support for DNSSEC | |||
validation). Note that an adversary seeking to merely block | validation). Note that an adversary seeking to merely block | |||
resolution can serve a DNSSEC record that doesn't validate correctly, | resolution can serve a DNSSEC record that doesn't validate correctly, | |||
assuming of course that the client/recursive resolver validates. | assuming of course that the client or recursive resolver validates. | |||
Previously, techniques were used for censorship that relied on DNS | Previously, techniques were used for censorship that relied on DNS | |||
requests being passed in cleartext over port 53 [SSAC-109-2020]. | requests being passed in cleartext over port 53 [SSAC-109-2020]. | |||
With the deployment of encrypted DNS (e.g., DNS-over-HTTPS [RFC8484]) | With the deployment of encrypted DNS (e.g., DNS over HTTPS [RFC8484]) | |||
these requests are now increasingly passed on port 443 with other | these requests are now increasingly passed on port 443 with other | |||
HTTPS traffic, or in the case of DNS-over-TLS [RFC7858] no longer | HTTPS traffic, or in the case of DNS over TLS [RFC7858] no longer | |||
passed in the clear (see also Section 4.3.1). | passed in the clear (see also Section 4.3.1). | |||
Empirical Examples: DNS interference, when properly implemented, is | Empirical Examples: DNS interference, when properly implemented, is | |||
easy to identify based on the shortcomings identified above. Turkey | easy to identify based on the shortcomings identified above. Turkey | |||
relied on DNS interference for its country-wide block of websites, | relied on DNS interference for its country-wide block of websites, | |||
including Twitter and YouTube, for almost week in March of 2014. The | including Twitter and YouTube, for almost a week in March of 2014. | |||
ease of circumvention resulted in an increase in the popularity of | The ease of circumvention resulted in an increase in the popularity | |||
Twitter until Turkish ISPs implemented an IP blocklist to achieve the | of Twitter until Turkish ISPs implemented an IP blocklist to achieve | |||
governmental mandate [Zmijewski-2014]. Ultimately, Turkish ISPs | the governmental mandate [Zmijewski-2014]. Ultimately, Turkish ISPs | |||
started hijacking all requests to Google and Level 3's international | started hijacking all requests to Google and Level 3's international | |||
DNS resolvers [Zmijewski-2014]. DNS interference, when incorrectly | DNS resolvers [Zmijewski-2014]. DNS interference, when incorrectly | |||
implemented, has resulted in some of the largest "censorship | implemented, has resulted in some of the largest censorship | |||
disasters". In January 2014, China started directing all requests | disasters. In January 2014, China started directing all requests | |||
passing through the Great Fire Wall to a single domain, | passing through the Great Fire Wall to a single domain | |||
dongtaiwang.com, due to an improperly configured DNS poisoning | "dongtaiwang.com", due to an improperly configured DNS poisoning | |||
attempt; this incident is thought to be the largest Internet-service | attempt. This incident is thought to be the largest Internet service | |||
outage in history [AFP-2014] [Anon-SIGCOMM12]. Countries such as | outage in history [AFP-2014] [Anon-SIGCOMM12]. Countries such as | |||
China, Iran, Turkey, and the United States have discussed blocking | China, Turkey, and the United States have discussed blocking entire | |||
entire TLDs as well, but only Iran has acted by blocking all Israeli | Top-Level Domains (TLDs) as well [Albert-2011]. DNS blocking is | |||
(.il) domains [Albert-2011]. DNS-blocking is commonly deployed in | commonly deployed in European countries to deal with undesirable | |||
European countries to deal with undesirable content, such as child | content, such as | |||
abuse content (Norway, United Kingdom, Belgium, Denmark, Finland, | ||||
France, Germany, Ireland, Italy, Malta, the Netherlands, Poland, | * child abuse content (Norway, United Kingdom, Belgium, Denmark, | |||
Spain and Sweden [Wright-2013] [Eneman-2010]), online gambling | Finland, France, Germany, Ireland, Italy, Malta, the Netherlands, | |||
(Belgium, Bulgaria, Czech Republic, Cyprus, Denmark, Estonia, France, | Poland, Spain, and Sweden [Wright-2013] [Eneman-2010]), | |||
Greece, Hungary, Italy, Latvia, Lithuania, Poland, Portugal, Romania, | ||||
Slovakia, Slovenia, Spain (see Section 6.3.2 of: [EC-gambling-2012], | * online gambling (Belgium, Bulgaria, Czech Republic, Cyprus, | |||
[EC-gambling-2019])), copyright infringement (all European Economic | Denmark, Estonia, France, Greece, Hungary, Italy, Latvia, | |||
Area countries), hate-speech and extremism (France [Hertel-2015]) and | Lithuania, Poland, Portugal, Romania, Slovakia, Slovenia, and | |||
terrorism content (France [Hertel-2015]). | Spain (see Section 6.3.2 of [EC-gambling-2012], | |||
[EC-gambling-2019])), | ||||
* copyright infringement (all European Economic Area countries), | ||||
* hate speech and extremism (France [Hertel-2015]), and | ||||
* terrorism content (France [Hertel-2015]). | ||||
5.2. Transport Layer | 5.2. Transport Layer | |||
5.2.1. Performance Degradation | 5.2.1. Performance Degradation | |||
While other interference techniques outlined in this section mostly | While other interference techniques outlined in this section mostly | |||
focus on blocking or preventing access to content, it can be an | focus on blocking or preventing access to content, it can be an | |||
effective censorship strategy in some cases to not entirely block | effective censorship strategy in some cases to not entirely block | |||
access to a given destination or service, but instead to degrade the | access to a given destination or service but instead to degrade the | |||
performance of the relevant network connection. The resulting user | performance of the relevant network connection. The resulting user | |||
experience for a site or service under performance degradation can be | experience for a site or service under performance degradation can be | |||
so bad that users opt to use a different site, service, or method of | so bad that users opt to use a different site, service, or method of | |||
communication, or may not engage in communication at all if there are | communication or may not engage in communication at all if there are | |||
no alternatives. Traffic shaping techniques that rate-limit the | no alternatives. Traffic-shaping techniques that rate-limit the | |||
bandwidth available to certain types of traffic is one example of a | bandwidth available to certain types of traffic is one example of a | |||
performance degradation. | performance degradation. | |||
Trade offs: While implementing a performance degradation will not | Trade-offs: While implementing a performance degradation will not | |||
always eliminate the ability of people to access a desire resource, | always eliminate the ability of people to access a desire resource, | |||
it may force them to use other means of communication where | it may force them to use other means of communication where | |||
censorship (or surveillance) is more easily accomplished. | censorship (or surveillance) is more easily accomplished. | |||
Empirical Examples: Iran has been known to shape the bandwidth | Empirical Examples: Iran has been known to shape the bandwidth | |||
available to HTTPS traffic to encourage unencrypted HTTP traffic | available to HTTPS traffic to encourage unencrypted HTTP traffic | |||
[Aryan-2012]. | [Aryan-2013]. | |||
5.2.2. Packet Dropping | 5.2.2. Packet Dropping | |||
Packet dropping is a simple mechanism to prevent undesirable traffic. | Packet dropping is a simple mechanism to prevent undesirable traffic. | |||
The censor identifies undesirable traffic and chooses to not properly | The censor identifies undesirable traffic and chooses to not properly | |||
forward any packets it sees associated with the traversing | forward any packets it sees associated with the traversing | |||
undesirable traffic instead of following a normal routing protocol. | undesirable traffic instead of following a normal routing protocol. | |||
This can be paired with any of the previously described mechanisms so | This can be paired with any of the previously described mechanisms so | |||
long as the censor knows the user must route traffic through a | long as the censor knows the user must route traffic through a | |||
controlled router. | controlled router. | |||
Trade offs: Packet Dropping is most successful when every traversing | Trade-offs: Packet dropping is most successful when every traversing | |||
packet has transparent information linked to undesirable content, | packet has transparent information linked to undesirable content, | |||
such as a Destination IP. One downside Packet Dropping suffers from | such as a destination IP. One downside packet dropping suffers from | |||
is the necessity of blocking all content from otherwise allowable IPs | is the necessity of blocking all content from otherwise allowable IPs | |||
based on a single subversive sub-domain; blogging services and github | based on a single subversive subdomain; blogging services and GitHub | |||
repositories are good examples. China famously dropped all github | repositories are good examples. China famously dropped all GitHub | |||
packets for three days based on a single repository hosting | packets for three days based on a single repository hosting | |||
undesirable content [Anonymous-2013]. The need to inspect every | undesirable content [Anonymous-2013]. The need to inspect every | |||
traversing packet in close to real time also makes Packet Dropping | traversing packet in almost real time also makes packet dropping | |||
somewhat challenging from a QoS perspective. | somewhat challenging from a QoS perspective. | |||
Empirical Examples: Packet Dropping is a very common form of | Empirical Examples: Packet dropping is a very common form of | |||
technical interference and lends itself to accurate detection given | technical interference and lends itself to accurate detection given | |||
the unique nature of the time-out requests it leaves in its wake. | the unique nature of the timeout requests it leaves in its wake. The | |||
The Great Firewall of China has been observed using packet dropping | Great Firewall of China has been observed using packet dropping as | |||
as one of its primary technical censorship mechanisms [Ensafi-2013]. | one of its primary technical censorship mechanisms [Ensafi-2013]. | |||
Iran has also used Packet Dropping as the mechanism for throttling | Iran has also used packet dropping as the mechanism for throttling | |||
SSH [Aryan-2012]. These are but two examples of a ubiquitous | SSH [Aryan-2013]. These are but two examples of a ubiquitous | |||
censorship practice. Notably, packet dropping during the handshake | censorship practice. Notably, packet dropping during the handshake | |||
or working connection is the only interference technique observed for | or working connection is the only interference technique observed for | |||
QUIC traffic to date (e.g., in India, Iran, Russia and Uganda | QUIC traffic to date (e.g., in India, Iran, Russia, and Uganda | |||
[Elmenhorst-2021][Elmenhorst-2022]). | [Elmenhorst-2021] [Elmenhorst-2022]). | |||
5.2.3. RST Packet Injection | 5.2.3. RST Packet Injection | |||
Packet injection, generally, refers to a man-in-the-middle (MITM) | Packet injection, generally, refers to a machine-in-the-middle (MITM) | |||
network interference technique that spoofs packets in an established | network interference technique that spoofs packets in an established | |||
traffic stream. RST packets are normally used to let one side of a | traffic stream. RST packets are normally used to let one side of a | |||
TCP connection know the other side has stopped sending information, | TCP connection know the other side has stopped sending information | |||
and that the receiver should close the connection. RST Packet | and that the receiver should close the connection. RST packet | |||
Injection is a specific type of packet injection attack that is used | injection is a specific type of packet injection attack that is used | |||
to interrupt an established stream by sending RST packets to both | to interrupt an established stream by sending RST packets to both | |||
sides of a TCP connection; as each receiver thinks the other has | sides of a TCP connection; as each receiver thinks the other has | |||
dropped the connection, the session is terminated. | dropped the connection, the session is terminated. | |||
QUIC is not vulnerable to these types of injection attacks once the | QUIC is not vulnerable to these types of injection attacks once the | |||
connection has been setup. While QUIC implements a stateless reset | connection has been set up. While QUIC implements a stateless reset | |||
mechanism, such a reset is only accepted by a peer if the packet ends | mechanism, such a reset is only accepted by a peer if the packet ends | |||
in a previously issued (stateless reset) token which is difficult to | in a previously issued (stateless reset) token, which is difficult to | |||
guess. During the handshake, QUIC only provides effective protection | guess. During the handshake, QUIC only provides effective protection | |||
against off-path attackers but is vulnerable to injection attacks by | against off-path attackers but is vulnerable to injection attacks by | |||
attackers that have parsed prior packets. (See | attackers that have parsed prior packets. (See [RFC9000] for more | |||
[I-D.ietf-quic-transport] for more details.) | details.) | |||
Trade offs: Although ineffective against non-TCP protocols (QUIC, | Trade-offs: Although ineffective against non-TCP protocols (QUIC, | |||
IPSec), RST Packet Injection has a few advantages that make it | IPsec), RST packet injection has a few advantages that make it | |||
extremely popular as a technique employed for censorship. RST Packet | extremely popular as a technique employed for censorship. RST packet | |||
Injection is an out-of-band interference mechanism, allowing the | injection is an out-of-band interference mechanism, allowing the | |||
avoidance of the QoS bottleneck one can encounter with inline | avoidance of the QoS bottleneck that one can encounter with inline | |||
techniques such as Packet Dropping. This out-of-band property allows | techniques such as packet dropping. This out-of-band property allows | |||
a censor to inspect a copy of the information, usually mirrored by an | a censor to inspect a copy of the information, usually mirrored by an | |||
optical splitter, making it an ideal pairing for DPI and protocol | optical splitter, making it an ideal pairing for DPI and protocol | |||
identification [Weaver-2009] (this asynchronous version of a MITM is | identification [Weaver-2009]. (This asynchronous version of a MITM | |||
often called a Man-on-the-Side (MOTS)). RST Packet Injection also | is often called a machine-on-the-side (MOTS).) RST packet injection | |||
has the advantage of only requiring one of the two endpoints to | also has the advantage of only requiring one of the two endpoints to | |||
accept the spoofed packet for the connection to be interrupted. | accept the spoofed packet for the connection to be interrupted. | |||
The difficult part of RST Packet Injection is spoofing "enough" | The difficult part of RST packet injection is spoofing "enough" | |||
correct information to ensure one end-point accepts an RST packet as | correct information to ensure one endpoint accepts a RST packet as | |||
legitimate; this generally implies a correct IP, port, and TCP | legitimate; this generally implies a correct IP, port, and TCP | |||
sequence number. Sequence number is the hardest to get correct, as | sequence number. The sequence number is the hardest to get correct, | |||
[RFC0793] specifies an RST Packet should be in-sequence to be | as [RFC9293] specifies that a RST packet should be in sequence to be | |||
accepted, although the RFC also recommends allowing in-window packets | accepted, although that RFC also recommends allowing in-window | |||
as "good enough". This in-window recommendation is important; if it | packets. This in-window recommendation is important; if it is | |||
is implemented, it allows for successful Blind RST Injection attacks | implemented, it allows for successful Blind RST Injection attacks | |||
[Netsec-2011]. When in-window sequencing is allowed, it is trivial | [Netsec-2011]. When in-window sequencing is allowed, it is trivial | |||
to conduct a Blind RST Injection: while the term "blind" injection | to conduct a Blind RST Injection. While the term "blind" injection | |||
implies the censor doesn't know any sensitive sequencing information | implies the censor doesn't know any sensitive sequencing information | |||
about the TCP stream they are injecting into, they can simply | about the TCP stream they are injecting into, they can simply | |||
enumerate all ~70000 possible windows; this is particularly useful | enumerate all ~70000 possible windows. This is particularly useful | |||
for interrupting encrypted/obfuscated protocols such as SSH or Tor | for interrupting encrypted/obfuscated protocols such as SSH or Tor | |||
[Gilad]. Some censorship evasion systems work by trying to confuse | [Gilad]. Some censorship evasion systems work by trying to confuse | |||
the censor into tracking incorrect information, rendering their RST | the censor into tracking incorrect information, rendering their RST | |||
Packet Injection useless [Khattak-2013], [Wang-2017], [Li-2017], | packet injection useless [Khattak-2013] [Wang-2017] [Li-2017] | |||
[Bock-2019], [Wang-2020]. | [Bock-2019] [Wang-2020]. | |||
RST Packet Injection relies on a stateful network, making it useless | RST packet injection relies on a stateful network, making it useless | |||
against UDP connections. RST Packet Injection is among the most | against UDP connections. RST packet injection is among the most | |||
popular censorship techniques used today given its versatile nature | popular censorship techniques used today given its versatile nature | |||
and effectiveness against all types of TCP traffic. Recent research | and effectiveness against all types of TCP traffic. Recent research | |||
shows that a TCP RST packet injection attack can even work in the | shows that a TCP RST packet injection attack can even work in the | |||
case of an off-path attacker [Cao-2016]. | case of an off-path attacker [Cao-2016]. | |||
Empirical Examples: RST Packet Injection, as mentioned above, is most | Empirical Examples: RST packet injection, as mentioned above, is most | |||
often paired with identification techniques that require splitting, | often paired with identification techniques that require splitting, | |||
such as DPI or protocol identification. In 2007, Comcast was accused | such as DPI or protocol identification. In 2007, Comcast was accused | |||
of using RST Packet Injection to interrupt traffic it identified as | of using RST packet injection to interrupt traffic it identified as | |||
BitTorrent [Schoen-2007], subsequently leading to a US Federal | BitTorrent [Schoen-2007], subsequently leading to a US Federal | |||
Communications Commission ruling against Comcast [VonLohmann-2008]. | Communications Commission ruling against Comcast [VonLohmann-2008]. | |||
China has also been known to use RST Packet Injection for censorship | China has also been known to use RST packet injection for censorship | |||
purposes. This interference is especially evident in the | purposes. This interference is especially evident in the | |||
interruption of encrypted/obfuscated protocols, such as those used by | interruption of encrypted/obfuscated protocols, such as those used by | |||
Tor [Winter-2012]. | Tor [Winter-2012]. | |||
5.3. Routing Layer | 5.3. Routing Layer | |||
5.3.1. Network Disconnection | 5.3.1. Network Disconnection | |||
While it is perhaps the crudest of all techniques employed for | While it is perhaps the crudest of all techniques employed for | |||
censorship, there is no more effective way of making sure undesirable | censorship, there is no more effective way of making sure undesirable | |||
information isn't allowed to propagate on the web than by shutting | information isn't allowed to propagate on the web than by shutting | |||
off the network. The network can be logically cut off in a region | off the network. The network can be logically cut off in a region | |||
when a censoring entity withdraws all of the Border Gateway Protocol | when a censoring entity withdraws all of the Border Gateway Protocol | |||
(BGP) prefixes routing through the censor's country. | (BGP) prefixes routing through the censor's country. | |||
Trade offs: The impact of a network disconnection in a region is huge | Trade-offs: The impact of a network disconnection in a region is huge | |||
and absolute; the censor pays for absolute control over digital | and absolute; the censor pays for absolute control over digital | |||
information by losing the benefits a globally-accessible Internet | information by losing the benefits a globally accessible Internet | |||
brings. Network disconnections are also politically expensive as | brings. Network disconnections are also politically expensive as | |||
citizens accustomed to accessing Internet platforms and services see | citizens accustomed to accessing Internet platforms and services see | |||
such disconnections as a loss of civil liberty. Network | such disconnections as a loss of civil liberty. Network | |||
disconnection is rarely a long-term solution for any censor and is | disconnection is rarely a long-term solution for any censor and is | |||
normally only used as a last resort in times of substantial civil | normally only used as a last resort in times of substantial civil | |||
unrest in a country. | unrest in a country. | |||
Empirical Examples: Network Disconnections tend to only happen in | Empirical Examples: Network disconnections tend to only happen in | |||
times of substantial unrest, largely due to the huge social, | times of substantial unrest, largely due to the huge social, | |||
political, and economic impact such a move has. One of the first, | political, and economic impact such a move has. One of the first, | |||
highly covered occurrences was when the Junta in Myanmar employed | highly covered occurrences was when the junta in Myanmar employed | |||
Network Disconnection to help Junta forces quash a rebellion in 2007 | network disconnection to help junta forces quash a rebellion in 2007 | |||
[Dobie-2007]. China disconnected the network in the Xinjiang region | [Dobie-2007]. China disconnected the network in the Xinjiang region | |||
during unrest in 2009 in an effort to prevent the protests from | during unrest in 2009 in an effort to prevent the protests from | |||
spreading to other regions [Heacock-2009]. The Arab Spring saw the | spreading to other regions [Heacock-2009]. The Arab Spring saw the | |||
the most frequent usage of Network Disconnection, with events in | most frequent usage of network disconnection, with events in Egypt | |||
Egypt and Libya in 2011 [Cowie-2011], and Syria in 2012 | and Libya in 2011 [Cowie-2011] and Syria in 2012 [Thomson-2012]. | |||
[Thomson-2012]. Russia indicated that it would attempt to disconnect | Russia indicated that it would attempt to disconnect all Russian | |||
all Russian networks from the global Internet in April 2019 as part | networks from the global Internet in April 2019 as part of a test of | |||
of a test of the nation's network independence. Reports also | the nation's network independence. Reports also indicate that, as | |||
indicate that, as part of the test disconnect, Russian | part of the test disconnect, Russian telecommunications firms must | |||
telecommunications firms must now route all traffic to state-operated | now route all traffic to state-operated monitoring points | |||
monitoring points [Cimpanu-2019]. India saw the largest number of | [Cimpanu-2019]. India saw the largest number of Internet shutdowns | |||
Internet shutdowns per year in 2016 and 2017 [Dada-2017]. | per year in 2016 and 2017 [Dada-2017]. | |||
5.3.2. Adversarial Route Announcement | 5.3.2. Adversarial Route Announcement | |||
More fine-grained and potentially wide-spread censorship can be | More fine-grained and potentially wide-spread censorship can be | |||
achieved with BGP hijacking, which adversarially re-routes BGP IP | achieved with BGP hijacking, which adversarially re-routes BGP IP | |||
prefixes incorrectly within a region and beyond. This restricts and | prefixes incorrectly within a region and beyond. This restricts and | |||
effectively censors the correctly known location of information that | effectively censors the correctly known location of information that | |||
flows into or out of a jurisdiction and will similarly prevent people | flows into or out of a jurisdiction and will similarly prevent people | |||
from outside your jurisdiction from viewing content generated outside | from outside your jurisdiction from viewing content generated outside | |||
your jurisdiction as the adversarial route announcement propagates. | that jurisdiction as the adversarial route announcement propagates. | |||
The first can be achieved by an adversarial BGP announcement of | The first can be achieved by an adversarial BGP announcement of | |||
incorrect routes that are not intended to leak beyond a jurisdiction, | incorrect routes that are not intended to leak beyond a jurisdiction, | |||
where the latter attacks traffic by deliberately introducing bogus | where the latter attacks traffic by deliberately introducing bogus | |||
BGP announcements that reach the global internet. | BGP announcements that reach the global Internet. | |||
Trade offs: A global leak of a misrouted website can overwhelm an ISP | Trade-offs: A global leak of a misrouted website can overwhelm an ISP | |||
if the website gets a lot of traffic. It is not a permanent solution | if the website gets a lot of traffic. It is not a permanent solution | |||
because incorrect BGP routes that leak globally can be fixed, but | because incorrect BGP routes that leak globally can be fixed, but | |||
leaks within a jurisdiction can only be corrected by an ISP/IXP for | leaks within a jurisdiction can only be corrected by an ISP/IXP for | |||
local users. | local users. | |||
Empirical examples: In 2008, Pakistan Telecom censored Youtube at the | Empirical Examples: In 2008, Pakistan Telecom censored YouTube at the | |||
request of the Pakistan government by changing its BGP routes for the | request of the Pakistan government by changing its BGP routes for the | |||
website. The new routes were announced to the ISP's upstream | website. The new routes were announced to the ISP's upstream | |||
providers and beyond. The entire Internet began directing Youtube | providers and beyond. The entire Internet began directing YouTube | |||
routes to Pakistan Telecom and continued doing so for many hours. In | routes to Pakistan Telecom and continued doing so for many hours. In | |||
2018 nearly all Google services and Google cloud customers, like | 2018, nearly all Google services and Google Cloud customers, like | |||
Spotify, all lost more than one hour of service after it lost control | Spotify, all lost more than one hour of service after Google lost | |||
of several million of its IP addresses. Those IP prefixes were being | control of several million of its IP addresses. Those IP prefixes | |||
misdirected to China Telecom, a Chinese government-owned ISP | were being misdirected to China Telecom, a Chinese government-owned | |||
[Google-2018]}, in a manner similar to the BGP hijacking of US | ISP [Google-2018], in a manner similar to the BGP hijacking of US | |||
government and military websites by China Telecom in 2010. ISPs in | government and military websites by China Telecom in 2010. ISPs in | |||
both Russia (2022) and Myanmar (2021) have tried to hijack the same | both Russia (2022) and Myanmar (2021) have tried to hijack the same | |||
Twitter prefix more than once [MANRS]. | Twitter prefix more than once [Siddiqui-2022]. | |||
5.4. Multi-layer and Non-layer | 5.4. Multi-layer and Non-layer | |||
5.4.1. Distributed Denial of Service (DDoS) | 5.4.1. Distributed Denial of Service (DDoS) | |||
Distributed Denial of Service attacks are a common attack mechanism | Distributed Denial of Service attacks are a common attack mechanism | |||
used by "hacktivists" and malicious hackers. Censors have also used | used by "hacktivists" and malicious hackers. Censors have also used | |||
DDoS in the past for a variety of reasons. There is a wide variety | DDoS in the past for a variety of reasons. There is a wide variety | |||
of DDoS attacks [Wikip-DoS], but at a high level two possible impacts | of DDoS attacks [Wikip-DoS]. However, at a high level, two possible | |||
from the attack tend to occur; a flood attack results in the service | impacts from the attack tend to occur: a flood attack results in the | |||
being unusable while resources are being spent to flood the service, | service being unusable while resources are being spent to flood the | |||
a crash attack aims to crash the service so resources can be | service, and a crash attack aims to crash the service so resources | |||
reallocated elsewhere without "releasing" the service. | can be reallocated elsewhere without "releasing" the service. | |||
Trade offs: DDoS is an appealing mechanism when a censor would like | Trade-offs: DDoS is an appealing mechanism when a censor would like | |||
to prevent all access to undesirable content, instead of only | to prevent all access (not just regional access) to undesirable | |||
preventing access in their region for a limited period of time. The | content for a limited period of time. Temporal impermanence is | |||
latter is really the only uniquely beneficial feature for DDoS as a | really the only uniquely beneficial feature of DDoS as a technique | |||
technique employed for censorship. The resources required to carry | employed for censorship. The resources required to carry out a | |||
out a successful DDoS against major targets are computationally | successful DDoS against major targets are computationally expensive, | |||
expensive, usually requiring rental or ownership of a malicious | usually requiring rental or ownership of a malicious distributed | |||
distributed platform such as a botnet, and they are imprecise. DDoS | platform such as a botnet, and they are imprecise. DDoS is an | |||
is an incredibly crude censorship technique, and appears to largely | incredibly crude censorship technique and appears to largely be used | |||
be used as a timely, easy-to-access mechanism for blocking | as a timely, easy-to-access mechanism for blocking undesirable | |||
undesirable content for a limited period of time. | content for a limited period of time. | |||
Empirical Examples: In 2012 the U.K.'s signals intelligence | Empirical Examples: In 2012, the U.K.'s signals intelligence | |||
organization, the Government Communications Headquarters (GCHQ), used | organization, the Government Communications Headquarters (GCHQ), used | |||
DDoS to temporarily shutdown Internet Relay Chat (IRC) chat rooms | DDoS to temporarily shutdown Internet Relay Chat (IRC) chat rooms | |||
frequented by members of Anonymous using the Syn Flood DDoS method; | frequented by members of Anonymous using the Syn Flood DDoS method; | |||
Syn Flood exploits the handshake used by TCP to overload the victim | Syn Flood exploits the handshake used by TCP to overload the victim | |||
server with so many requests that legitimate traffic becomes slow or | server with so many requests that legitimate traffic becomes slow or | |||
impossible [Schone-2014] [CERT-2000]. Dissenting opinion websites | impossible [NBC-2014] [CERT-2000]. Dissenting opinion websites are | |||
are frequently victims of DDoS around politically sensitive events | frequently victims of DDoS around politically sensitive events like | |||
like the DDoS in Burma [Villeneuve-2011]. Controlling parties in | the DDoS in Burma [Villeneuve-2011]. Controlling parties in Russia | |||
Russia [Kravtsova-2012], Zimbabwe [Orion-2013], and Malaysia | [Kravtsova-2012], Zimbabwe [Orion-2013], and Malaysia | |||
[Muncaster-2013] have been accused of using DDoS to interrupt | [Muncaster-2013] have been accused of using DDoS to interrupt | |||
opposition support and access during elections. In 2015, China | opposition support and access during elections. In 2015, China | |||
launched a DDoS attack using a true MITM system collocated with the | launched a DDoS attack using a true MITM system (dubbed "Great | |||
Great Firewall, dubbed "Great Cannon", that was able to inject | Cannon"), collocated with the Great Firewall, that was able to inject | |||
JavaScript code into web visits to a Chinese search engine that | JavaScript code into web visits to a Chinese search engine that | |||
commandeered those user agents to send DDoS traffic to various sites | commandeered those user agents to send DDoS traffic to various sites | |||
[Marczak-2015]. | [Marczak-2015]. | |||
5.4.2. Censorship in Depth | 5.4.2. Censorship in Depth | |||
Often, censors implement multiple techniques in tandem, creating | Often, censors implement multiple techniques in tandem, creating | |||
"censorship in depth". Censorship in depth can take many forms; some | "censorship in depth". Censorship in depth can take many forms; some | |||
censors block the same content through multiple techniques (such as | censors block the same content through multiple techniques (such as | |||
blocking a domain by DNS, IP blocking, and HTTP simultaneously), some | blocking a domain by DNS, IP blocking, and HTTP simultaneously), some | |||
deploy parallel systems to improve censorship reliability (such as | deploy parallel systems to improve censorship reliability (such as | |||
deploying multiple different censorship systems to block the same | deploying multiple different censorship systems to block the same | |||
domain), and others can use complimentary systems to limit evasion | domain), and others can use complimentary systems to limit evasion | |||
(such as by blocking unwanted protocols entirely, forcing users to | (such as by blocking unwanted protocols entirely, forcing users to | |||
use other filtered protocols). | use other filtered protocols). | |||
Trade offs: Censorship in depth can be attractive for censors to | Trade-offs: Censorship in depth can be attractive for censors to | |||
deploy, as it offers additional guarantees about censorship: even if | deploy, as it offers additional guarantees about censorship: even if | |||
someone evades one type of censorship, they may still be blocked by | someone evades one type of censorship, they may still be blocked by | |||
another. The main drawback to this approach is the cost to initial | another. The main drawback to this approach is the cost to initial | |||
deployment, as it requires the system to deploy multiple censorship | deployment, as it requires the system to deploy multiple censorship | |||
systems in tandem. | systems in tandem. | |||
Empirical Examples: Censorship in depth is present in many large | Empirical Examples: Censorship in depth is present in many large | |||
censoring nation states today. Researchers have observed that China | censoring nation states today. Researchers have observed that China | |||
has deployed significant censorship in depth, often censoring the | has deployed significant censorship in depth, often censoring the | |||
same resource across multiple protocols [Chai-2019] [Bock-2020b], or | same resource across multiple protocols [Chai-2019] [Bock-2020b] or | |||
deploying additional censorship systems to censor the same content | deploying additional censorship systems to censor the same content | |||
and protocol [Bock-2021b]. Iran also has deployed a complimentary | and protocol [Bock-2021b]. Iran also has deployed a complimentary | |||
protocol filter to limit which protocols can be used on certain | protocol filter to limit which protocols can be used on certain | |||
ports, forcing users to rely on protocols their censorship system can | ports, forcing users to rely on protocols their censorship system can | |||
filter [Bock-2020]. | filter [Bock-2020]. | |||
6. Non-Technical Interference | 6. Non-technical Interference | |||
6.1. Manual Filtering | 6.1. Manual Filtering | |||
As the name implies, sometimes manual labor is the easiest way to | As the name implies, sometimes manual labor is the easiest way to | |||
figure out which content to block. Manual Filtering differs from the | figure out which content to block. Manual filtering differs from the | |||
common tactic of building up blocklists in that it doesn't | common tactic of building up blocklists in that it doesn't | |||
necessarily target a specific IP or DNS, but instead removes or flags | necessarily target a specific IP or DNS but instead removes or flags | |||
content. Given the imprecise nature of automatic filtering, manually | content. Given the imprecise nature of automatic filtering, manually | |||
sorting through content and flagging dissenting websites, blogs, | sorting through content and flagging dissenting websites, blogs, | |||
articles and other media for filtration can be an effective technique | articles, and other media for filtration can be an effective | |||
on its own, or combined with other automated techniques of detection | technique on its own or combined with other automated techniques of | |||
that are then followed by an action that would require manual | detection that are then followed by an action that would require | |||
confirmation. This filtration can occur on the Backbone/ISP level -- | manual confirmation. This filtration can occur on the backbone or | |||
China's army of monitors is a good example [BBC-2013b] -- but more | ISP level. China's army of monitors is a good example [BBC-2013b], | |||
commonly manual filtering occurs on an institutional level. Internet | but more commonly, manual filtering occurs on an institutional level. | |||
Content Providers such as Google or Weibo, require a business license | ICPs, such as Google or Weibo, require a business license to operate | |||
to operate in China. One of the prerequisites for a business license | in China. One of the prerequisites for a business license is an | |||
is an agreement to sign a "voluntary pledge" known as the "Public | agreement to sign a "voluntary pledge" known as the "Public Pledge on | |||
Pledge on Self-discipline for the Chinese Internet Industry". The | Self-discipline for the Chinese Internet Industry". The failure to | |||
failure to "energetically uphold" the pledged values can lead to the | "energetically uphold" the pledged values can lead to the ICPs being | |||
ICPs being held liable for the offending content by the Chinese | held liable for the offending content by the Chinese government | |||
government [BBC-2013b]. | [BBC-2013b]. | |||
6.2. Self-Censorship | 6.2. Self-Censorship | |||
Self-censorship is difficult to document, as it manifests primarily | Self-censorship is difficult to document as it manifests primarily | |||
through a lack of undesirable content. Tools which encourage self- | through a lack of undesirable content. Tools that encourage self- | |||
censorship are those which may lead a prospective speaker to believe | censorship may lead a prospective speaker to believe that speaking | |||
that speaking increases the risk of unfavourable outcomes for the | increases the risk of unfavorable outcomes for the speaker (technical | |||
speaker (technical monitoring, identification requirements, etc.). | monitoring, identification requirements, etc.). Reporters Without | |||
Reporters Without Borders exemplify methods of imposing self- | Borders exemplify methods of imposing self-censorship in their annual | |||
censorship in their annual World Press Freedom Index reports | World Press Freedom Index reports [RWB-2020]. | |||
[RWB2020]. | ||||
6.3. Server Takedown | 6.3. Server Takedown | |||
As mentioned in passing by [Murdoch-2011], servers must have a | As mentioned in passing by [Murdoch-2008], servers must have a | |||
physical location somewhere in the world. If undesirable content is | physical location somewhere in the world. If undesirable content is | |||
hosted in the censoring country, the servers can be physically seized | hosted in the censoring country, the servers can be physically | |||
or -- in cases where a server is virtualized in a cloud | seized, or -- in cases where a server is virtualized in a cloud | |||
infrastructure where it may not necessarily have a fixed physical | infrastructure where it may not necessarily have a fixed physical | |||
location -- the hosting provider can be required to prevent access. | location -- the hosting provider can be required to prevent access. | |||
6.4. Notice and Takedown | 6.4. Notice and Takedown | |||
In many countries, legal mechanisms exist where an individual or | In many countries, legal mechanisms exist where an individual or | |||
other content provider can issue a legal request to a content host | other content provider can issue a legal request to a content host | |||
that requires the host to take down content. Examples include the | that requires the host to take down content. Examples include the | |||
systems employed by companies like Google to comply with "Right to be | systems employed by companies like Google to comply with "Right to be | |||
Forgotten" policies in the European Union [Google-RTBF], intermediary | Forgotten" policies in the European Union [Google-RTBF], intermediary | |||
liability rules for electronic platform providers [EC-2012], or the | liability rules for electronic platform providers [EC-2012], or the | |||
copyright-oriented notice and takedown regime of the United States | copyright-oriented notice and takedown regime of the United States | |||
Digital Millennium Copyright Act (DMCA) Section 512 [DMLP-512]. | Digital Millennium Copyright Act (DMCA) Section 512 [DMLP-512]. | |||
6.5. Domain-Name Seizures | 6.5. Domain Name Seizures | |||
Domain names are catalogued in name-servers operated by legal | Domain names are catalogued in name servers operated by legal | |||
entities called registries. These registries can be made to cede | entities called registries. These registries can be made to cede | |||
control over a domain name to someone other than the entity which | control over a domain name to someone other than the entity that | |||
registered the domain name through a legal procedure grounded in | registered the domain name through a legal procedure grounded in | |||
either private contracts or public law. Domain name seizures is | either private contracts or public law. Domain name seizure is | |||
increasingly used by both public authorities and private entities to | increasingly used by both public authorities and private entities to | |||
deal with undesired content dissemination [ICANN2012] [EFF2017]. | deal with undesired content dissemination [ICANN-2012] [EFF-2017]. | |||
7. Future work | 7. Future Work | |||
In addition to establishing a thorough resource for describing | In addition to establishing a thorough resource for describing | |||
censorship techniques, this document implicates critical areas for | censorship techniques, this document implicates critical areas for | |||
future work. | future work. | |||
Taken as a whole the apparent costs of implementation of censorship | Taken as a whole, the apparent costs of implementation of censorship | |||
techniques indicate a need for better classification of censorship | techniques indicate a need for better classification of censorship | |||
regimes as they evolve and mature, and specifying censorship | regimes as they evolve and mature and better specification of | |||
circumvention techniques themselves. Censors maturity refers to the | censorship circumvention techniques themselves. Censor maturity | |||
technical maturity required of the censor to perform the specific | refers to the technical maturity required of the censor to perform | |||
censorship technique. Future work might classify techniques by | the specific censorship technique. Future work might classify | |||
essentially how hard a censor must work, including what | techniques by essentially how hard a censor must work, including what | |||
infrastructure is required, in order to successfully censor content, | infrastructure is required, in order to successfully censor content, | |||
users or services. | users, or services. | |||
On circumvention, the increase in protocols leveraging encryption is | On circumvention, the increase in protocols leveraging encryption is | |||
an effective counter-measure against some forms of censorship | an effective countermeasure against some forms of censorship | |||
described in this document, but that thorough research on | described in this document, but that thorough research on | |||
circumvention and encryption be left for another document. Moreover | circumvention and encryption is left for another document. Moreover, | |||
the censorship circumvention community has developed an area of | the censorship circumvention community has developed an area of | |||
research on "pluggable transports," which collects, documents and | research on "pluggable transports," which collect, document, and make | |||
makes agile methods for obfuscating the on-path traffic of censorship | agile methods for obfuscating the on-path traffic of censorship | |||
circumvention tools such that it appears indistinguishable from other | circumvention tools such that it appears indistinguishable from other | |||
kinds of traffic [Tor-2020]. Those methods would benefit from future | kinds of traffic [Tor-2019]. Those methods would benefit from future | |||
work in the internet standards community, too. | work in the Internet standards community, too. | |||
Lastly the empirical examples demonstrate that censorship techniques | Lastly, the empirical examples demonstrate that censorship techniques | |||
can evolve quickly, and experience shows that this document can only | can evolve quickly, and experience shows that this document can only | |||
be a point-in-time statement. Future work might extend this document | be a point-in-time statement. Future work might extend this document | |||
with updates and new techniques described using a comparable | with updates and new techniques described using a comparable | |||
methodology. | methodology. | |||
8. Contributors | 8. IANA Considerations | |||
This document benefited from discussions with and input from David | This document has no IANA actions. | |||
Belson, Stephane Bortzmeyer, Vinicius Fortuna, Gurshabad Grover, | ||||
Andrew McConachie, Martin Nilsson, Michael Richardson, Patrick Vacek | ||||
and Chris Wood. | ||||
9. Informative References | 9. Security Considerations | |||
This document is a survey of existing literature on network | ||||
censorship techniques. As such, it does not introduce any new | ||||
security considerations to be taken into account beyond what is | ||||
already discussed in each paper surveyed. | ||||
10. Informative References | ||||
[AFNIC-2013] | [AFNIC-2013] | |||
AFNIC, "Report of the AFNIC Scientific Council: | AFNIC, "Report of the AFNIC Scientific Council: | |||
Consequences of DNS-based Internet filtering", 2013, | Consequences of DNS-based Internet filtering", January | |||
2013, | ||||
<http://www.afnic.fr/medias/documents/conseilscientifique/ | <http://www.afnic.fr/medias/documents/conseilscientifique/ | |||
SC-consequences-of-DNS-based-Internet-filtering.pdf>. | SC-consequences-of-DNS-based-Internet-filtering.pdf>. | |||
[AFP-2014] AFP, "China Has Massive Internet Breakdown Reportedly | [AFP-2014] AFP, "China Has Massive Internet Breakdown Reportedly | |||
Caused By Their Own Censoring Tools", 2014, | Caused By Their Own Censoring Tools", January 2014, | |||
<http://www.businessinsider.com/chinas-internet-breakdown- | <http://www.businessinsider.com/chinas-internet-breakdown- | |||
reportedly-caused-by-censoring-tools-2014-1>. | reportedly-caused-by-censoring-tools-2014-1>. | |||
[Albert-2011] | [Albert-2011] | |||
Albert, K., "DNS Tampering and the new ICANN gTLD Rules", | Albert, K., "DNS Tampering and the new ICANN gTLD Rules", | |||
2011, <https://opennet.net/blog/2011/06/dns-tampering-and- | June 2011, <https://opennet.net/blog/2011/06/dns- | |||
new-icann-gtld-rules>. | tampering-and-new-icann-gtld-rules>. | |||
[Anon-SIGCOMM12] | [Anon-SIGCOMM12] | |||
Anonymous, "The Collateral Damage of Internet Censorship | Anonymous, "The Collateral Damage of Internet Censorship | |||
by DNS Injection", 2012, | by DNS Injection", July 2012, | |||
<http://www.sigcomm.org/sites/default/files/ccr/ | <http://www.sigcomm.org/sites/default/files/ccr/ | |||
papers/2012/July/2317307-2317311.pdf>. | papers/2012/July/2317307-2317311.pdf>. | |||
[Anonymous-2007] | ||||
Anonymous, "How to Bypass Comcast's Bittorrent | ||||
Throttling", 2012, <https://torrentfreak.com/how-to- | ||||
bypass-comcast-bittorrent-throttling-071021>. | ||||
[Anonymous-2013] | [Anonymous-2013] | |||
Anonymous, "GitHub blocked in China - how it happened, how | Anonymous, "GitHub blocked in China - how it happened, how | |||
to get around it, and where it will take us", 2013, | to get around it, and where it will take us", January | |||
<https://en.greatfire.org/blog/2013/jan/github-blocked- | 2013, <https://en.greatfire.org/blog/2013/jan/github- | |||
china-how-it-happened-how-get-around-it-and-where-it-will- | blocked-china-how-it-happened-how-get-around-it-and-where- | |||
take-us>. | it-will-take-us>. | |||
[Anonymous-2014] | [Anonymous-2014] | |||
Anonymous, "Towards a Comprehensive Picture of the Great | Anonymous, "Towards a Comprehensive Picture of the Great | |||
Firewall's DNS Censorship", 2014, | Firewall's DNS Censorship", August 2014, | |||
<https://www.usenix.org/system/files/conference/foci14/ | <https://www.usenix.org/system/files/conference/foci14/ | |||
foci14-anonymous.pdf>. | foci14-anonymous.pdf>. | |||
[AP-2012] Associated Press, "Sattar Beheshit, Iranian Blogger, Was | [Aryan-2013] | |||
Beaten In Prison According To Prosecutor", 2012, | ||||
<http://www.huffingtonpost.com/2012/12/03/sattar-beheshit- | ||||
iran_n_2233125.html>. | ||||
[Aryan-2012] | ||||
Aryan, S., Aryan, H., and J. A. Halderman, "Internet | Aryan, S., Aryan, H., and J. A. Halderman, "Internet | |||
Censorship in Iran: A First Look", 2012, | Censorship in Iran: A First Look", 2012, | |||
<https://jhalderm.com/pub/papers/iran-foci13.pdf>. | <https://jhalderm.com/pub/papers/iran-foci13.pdf>. | |||
[BBC-2013] BBC News, "Google and Microsoft agree steps to block abuse | [BBC-2013] BBC News, "Google and Microsoft agree steps to block abuse | |||
images", 2013, <http://www.bbc.com/news/uk-24980765>. | images", November 2013, | |||
<http://www.bbc.com/news/uk-24980765>. | ||||
[BBC-2013b] | [BBC-2013b] | |||
BBC, "China employs two million microblog monitors state | BBC, "China employs two million microblog monitors state | |||
media say", 2013, | media say", 2013, | |||
<http://www.bbc.com/news/world-asia-china-2439695>. | <https://www.bbc.com/news/world-asia-china-24396957>. | |||
[Bentham-1791] | ||||
Bentham, J., "Panopticon Or the Inspection House", 1791, | ||||
<https://www.google.com/books/edition/_/ | ||||
Ec4TAAAAQAAJ?hl=en>. | ||||
[Bock-2019] | [Bock-2019] | |||
Bock, K., Hughey, G., Qiang, X., and D. Levin, "Geneva: | Bock, K., Hughey, G., Qiang, X., and D. Levin, "Geneva: | |||
Evolving Censorship Evasion Strategies", 2019, | Evolving Censorship Evasion Strategies", | |||
DOI 10.1145/3319535.3363189, November 2019, | ||||
<https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf>. | <https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf>. | |||
[Bock-2020] | [Bock-2020] | |||
Bock, K., Fax, Y., Reese, K., Singh, J., and D. Levin, | Bock, K., Fax, Y., Reese, K., Singh, J., and D. Levin, | |||
"Detecting and Evading Censorship-in-Depth: A Case Study | "Detecting and Evading Censorship-in-Depth: A Case Study | |||
of Iran’s Protocol Filter", 2020, | of Iran's Protocol Filter", January 2020, | |||
<https://geneva.cs.umd.edu/papers/evading-censorship-in- | <https://geneva.cs.umd.edu/papers/evading-censorship-in- | |||
depth.pdf>. | depth.pdf>. | |||
[Bock-2020b] | [Bock-2020b] | |||
Bock, K., iyouport, Anonymous, Merino, L., Fifield, D., | Bock, K., iyouport, Anonymous, Merino, L-H., Fifield, D., | |||
Houmansadr, A., and D. Levin, "Exposing and Circumventing | Houmansadr, A., and D. Levin, "Exposing and Circumventing | |||
China's Censorship of ESNI", 2020, | China's Censorship of ESNI", August 2020, | |||
<https://geneva.cs.umd.edu/posts/china-censors-esni/ | <https://geneva.cs.umd.edu/posts/china-censors-esni/ | |||
esni/>. | esni/>. | |||
[Bock-2021] | [Bock-2021] | |||
Bock, K., Bharadwaj, P., Singh, J., and D. Levin, "Your | Bock, K., Bharadwaj, P., Singh, J., and D. Levin, "Your | |||
Censor is My Censor: Weaponizing Censorship Infrastructure | Censor is My Censor: Weaponizing Censorship Infrastructure | |||
for Availability Attacks", 2021, | for Availability Attacks", | |||
DOI 10.1109/SPW53761.2021.00059, May 2021, | ||||
<https://geneva.cs.umd.edu/papers/woot21-weaponizing- | <https://geneva.cs.umd.edu/papers/woot21-weaponizing- | |||
availability.pdf>. | availability.pdf>. | |||
[Bock-2021b] | [Bock-2021b] | |||
Bock, K., Naval, G., Reese, K., and D. Levin, "Even | Bock, K., Naval, G., Reese, K., and D. Levin, "Even | |||
Censors Have a Backup: Examining China’s Double HTTPS | Censors Have a Backup: Examining China's Double HTTPS | |||
Censorship Middleboxes", 2021, | Censorship Middleboxes", FOCI '21: Proceedings of the ACM | |||
SIGCOMM 2021 Workshop on Free and Open Communications on | ||||
the Internet, Pages 1-7, DOI 10.1145/3473604.3474559, | ||||
August 2021, | ||||
<https://geneva.cs.umd.edu/papers/foci21.pdf>. | <https://geneva.cs.umd.edu/papers/foci21.pdf>. | |||
[Bortzmeyer-2015] | [Bortzmeyer-2015] | |||
Bortzmeyer, S., "DNS Censorship (DNS Lies) As Seen By RIPE | Bortzmeyer, S., "DNS Censorship (DNS Lies) As Seen By RIPE | |||
Atlas", 2015, | Atlas", December 2015, | |||
<https://labs.ripe.net/Members/stephane_bortzmeyer/dns- | <https://labs.ripe.net/Members/stephane_bortzmeyer/dns- | |||
censorship-dns-lies-seen-by-atlas-probes>. | censorship-dns-lies-seen-by-atlas-probes>. | |||
[Boyle-1997] | [Boyle-1997] | |||
Boyle, J., "Foucault in Cyberspace: Surveillance, | Boyle, J., "Foucault in Cyberspace: Surveillance, | |||
Sovereignty, and Hardwired Censors", 1997, | Sovereignty, and Hardwired Censors", 66 University of | |||
Cincinnati Law Review 177-205, 1997, | ||||
<https://scholarship.law.duke.edu/ | <https://scholarship.law.duke.edu/ | |||
faculty_scholarship/619/>. | faculty_scholarship/619/>. | |||
[Bristow-2013] | ||||
Bristow, M., "China's internet 'spin doctors‘", 2013, | ||||
<http://news.bbc.co.uk/2/hi/asia-pacific/7783640.stm>. | ||||
[Calamur-2013] | ||||
Calamur, K., "Prominent Egyptian Blogger Arrested", 2013, | ||||
<http://www.npr.org/blogs/thetwo-way/2013/11/29/247820503/ | ||||
prominent-egyptian-blogger-arrested>. | ||||
[Cao-2016] Cao, Y., Qian, Z., Wang, Z., Dao, T., Krishnamurthy, S., | [Cao-2016] Cao, Y., Qian, Z., Wang, Z., Dao, T., Krishnamurthy, S., | |||
and L. Marvel, "Off-Path TCP Exploits: Global Rate Limit | and L. Marvel, "Off-Path TCP Exploits: Global Rate Limit | |||
Considered Dangerous", 2016, | Considered Dangerous", August 2016, | |||
<https://www.usenix.org/system/files/conference/ | <https://www.usenix.org/system/files/conference/ | |||
usenixsecurity16/sec16_paper_cao.pdf>. | usenixsecurity16/sec16_paper_cao.pdf>. | |||
[CERT-2000] | [CERT-2000] | |||
CERT, "TCP SYN Flooding and IP Spoofing Attacks", 2000, | CERT, "CERT Advisory CA-1996-21 TCP SYN Flooding and IP | |||
<http://www.cert.org/historical/advisories/CA- | Spoofing Attacks", 2000, | |||
1996-21.cfm>. | <https://vuls.cert.org/confluence/display/historical/ | |||
CERT+Advisory+CA- | ||||
1996-21+TCP+SYN+Flooding+and+IP+Spoofing+Attacks>. | ||||
[Chai-2019] | [Chai-2019] | |||
Chai, Z., Ghafari, A., and A. Houmansadr, "On the | Chai, Z., Ghafari, A., and A. Houmansadr, "On the | |||
Importance of Encrypted-SNI (ESNI) to Censorship | Importance of Encrypted-SNI (ESNI) to Censorship | |||
Circumvention", 2019, | Circumvention", 2019, | |||
<https://www.usenix.org/system/files/ | <https://www.usenix.org/system/files/ | |||
foci19-paper_chai_update.pdf>. | foci19-paper_chai_update.pdf>. | |||
[Cheng-2010] | [Cheng-2010] | |||
Cheng, J., "Google stops Hong Kong auto-redirect as China | Cheng, J., "Google stops Hong Kong auto-redirect as China | |||
plays hardball", 2010, <http://arstechnica.com/tech- | plays hardball", June 2010, <http://arstechnica.com/tech- | |||
policy/2010/06/google-tweaks-china-to-hong-kong-redirect- | policy/2010/06/google-tweaks-china-to-hong-kong-redirect- | |||
same-results/>. | same-results/>. | |||
[Cimpanu-2019] | [Cimpanu-2019] | |||
Cimpanu, C., "Russia to disconnect from the internet as | Cimpanu, C., "Russia to disconnect from the internet as | |||
part of a planned test", 2019, | part of a planned test", February 2019, | |||
<https://www.zdnet.com/article/russia-to-disconnect-from- | <https://www.zdnet.com/article/russia-to-disconnect-from- | |||
the-internet-as-part-of-a-planned-test/>. | the-internet-as-part-of-a-planned-test/>. | |||
[CitizenLab-2018] | [CitizenLab-2018] | |||
Marczak, B., Dalek, J., McKune, S., Senft, A., Scott- | Marczak, B., Dalek, J., McKune, S., Senft, A., Scott- | |||
Railton, J., and R. Deibert, "Bad Traffic: Sandvine’s | Railton, J., and R. Deibert, "Bad Traffic: Sandvine's | |||
PacketLogic Devices Used to Deploy Government Spyware in | PacketLogic Devices Used to Deploy Government Spyware in | |||
Turkey and Redirect Egyptian Users to Affiliate Ads?", | Turkey and Redirect Egyptian Users to Affiliate Ads?", | |||
2018, <https://citizenlab.ca/2018/03/bad-traffic- | March 2018, <https://citizenlab.ca/2018/03/bad-traffic- | |||
sandvines-packetlogic-devices-deploy-government-spyware- | sandvines-packetlogic-devices-deploy-government-spyware- | |||
turkey-syria/>. | turkey-syria/>. | |||
[Clayton-2006] | [Clayton-2006] | |||
Clayton, R., "Ignoring the Great Firewall of China", 2006, | Clayton, R., Murdoch, S.J., and R.N.M. Watson, "Ignoring | |||
<http://link.springer.com/chapter/10.1007/11957454_2>. | the Great Firewall of China", Lecture Notes in Computer | |||
Science, Volume 4258, DOI 10.1007/11957454_2, 2006, | ||||
<https://link.springer.com/chapter/10.1007/11957454_2>. | ||||
[Condliffe-2013] | [Condliffe-2013] | |||
Condliffe, J., "Google Announces Massive New Restrictions | Condliffe, J., "Google Announces Massive New Restrictions | |||
on Child Abuse Search Terms", 2013, <http://gizmodo.com/ | on Child Abuse Search Terms", November 2013, | |||
google-announces-massive-new-restrictions-on-child-abus- | <http://gizmodo.com/google-announces-massive-new- | |||
1466539163>. | restrictions-on-child-abus-1466539163>. | |||
[Cowie-2011] | [Cowie-2011] | |||
Cowie, J., "Egypt Leaves the Internet", 2011, | Cowie, J., "Egypt Leaves The Internet", NANOG 51, February | |||
2011, | ||||
<https://archive.nanog.org/meetings/nanog51/presentations/ | <https://archive.nanog.org/meetings/nanog51/presentations/ | |||
Tuesday/LT-Cowie-Egypt%20Leaves%20The%20Internet.pdf>. | Tuesday/LT-Cowie-Egypt%20Leaves%20The%20Internet.pdf>. | |||
[Crandall-2010] | [Crandall-2010] | |||
Crandall, J., "Empirical Study of a National-Scale | Park, J.C. and J. Crandall, "Empirical Study of a | |||
Distributed Intrusion Detection System: Backbone-Level | National-Scale Distributed Intrusion Detection System: | |||
Filtering of HTML Responses in China", 2010, | Backbone-Level Filtering of HTML Responses in China", June | |||
<http://www.cs.unm.edu/~crandall/icdcs2010.pdf>. | 2010, <http://www.cs.unm.edu/~crandall/icdcs2010.pdf>. | |||
[Dada-2017] | [Dada-2017] | |||
Dada, T. and P. Micek, "Launching STOP: the #KeepItOn | Dada, T. and P. Micek, "Launching STOP: the #KeepItOn | |||
internet shutdown tracker", 2017, | internet shutdown tracker", September 2017, | |||
<https://www.accessnow.org/keepiton-shutdown-tracker/>. | <https://www.accessnow.org/keepiton-shutdown-tracker/>. | |||
[Dalek-2013] | [Dalek-2013] | |||
Dalek, J., "A Method for Identifying and Confirming the | Dalek, J., Haselton, B., Noman, H., Senft, A., Crete- | |||
Use of URL Filtering Products for Censorship", 2013, | Nishihata, M., Gill, P., and R. J. Deibert, "A Method for | |||
Identifying and Confirming the Use of URL Filtering | ||||
Products for Censorship", IMC '13: Proceedings of the 2013 | ||||
conference on Internet measurement conference, Pages | ||||
23-30, DOI 10.1145/2504730.2504763, October 2013, | ||||
<http://conferences.sigcomm.org/imc/2013/papers/imc112s- | <http://conferences.sigcomm.org/imc/2013/papers/imc112s- | |||
dalekA.pdf>. | dalekA.pdf>. | |||
[Ding-1999] | [Ding-1999] | |||
Ding, C., Chi, C. H., Deng, J., and C. L. Dong, | Ding, C., Chi, C. H., Deng, J., and C. L. Dong, | |||
"Centralized Content-Based Web Filtering and Blocking: How | "Centralized Content-Based Web Filtering and Blocking: How | |||
Far Can It Go?", 1999, | Far Can It Go?", IEEE SMC'99 Conference Proceedings, | |||
DOI 10.1109/ICSMC.1999.825218, October 1999, | ||||
<http://citeseerx.ist.psu.edu/viewdoc/ | <http://citeseerx.ist.psu.edu/viewdoc/ | |||
download?doi=10.1.1.132.3302&rep=rep1&type=pdf>. | download?doi=10.1.1.132.3302&rep=rep1&type=pdf>. | |||
[DMLP-512] Digital Media Law Project, "Protecting Yourself Against | [DMLP-512] Digital Media Law Project, "Protecting Yourself Against | |||
Copyright Claims Based on User Content", 2012, | Copyright Claims Based on User Content", May 2012, | |||
<http://www.dmlp.org/legal-guide/protecting-yourself- | <https://www.dmlp.org/legal-guide/protecting-yourself- | |||
against-copyright-claims-based-user-content>. | against-copyright-claims-based-user-content>. | |||
[Dobie-2007] | [Dobie-2007] | |||
Dobie, M., "Junta tightens media screw", 2007, | Dobie, M., "Junta tightens media screw", BBC News, | |||
September 2007, | ||||
<http://news.bbc.co.uk/2/hi/asia-pacific/7016238.stm>. | <http://news.bbc.co.uk/2/hi/asia-pacific/7016238.stm>. | |||
[EC-2012] European Commission, "Summary of the results of the Public | [EC-2012] European Commission, "Summary of the results of the Public | |||
Consultation on the future of electronic commerce in the | Consultation on the future of electronic commerce in the | |||
Internal Market and the implementation of the Directive on | Internal Market and the implementation of the Directive on | |||
electronic commerce (2000/31/EC)", 2012, | electronic commerce (2000/31/EC)", January 2012, | |||
<https://ec.europa.eu/information_society/newsroom/image/ | <https://ec.europa.eu/information_society/newsroom/image/ | |||
document/2017-4/ | document/2017-4/ | |||
consultation_summary_report_en_2010_42070.pdf>. | consultation_summary_report_en_2010_42070.pdf>. | |||
[EC-gambling-2012] | [EC-gambling-2012] | |||
European Commission, "Online gambling in the Internal | European Commission, "Online gambling in the Internal | |||
Market", 2012, <https://eur-lex.europa.eu/legal- | Market Accompanying the document Communication from the | |||
Commission to the European Parliament, the Council, the | ||||
Economic and Social Committee and the Committee of the | ||||
Regions Towards a comprehensive framework for online | ||||
gambling", 2012, <https://eur-lex.europa.eu/legal- | ||||
content/EN/TXT/?uri=CELEX:52012SC0345>. | content/EN/TXT/?uri=CELEX:52012SC0345>. | |||
[EC-gambling-2019] | [EC-gambling-2019] | |||
European Commission, "Evaluation of regulatory tools for | European Commission, "Evaluation of regulatory tools for | |||
enforcing online gambling rules and channeling demand | enforcing online gambling rules and channelling demand | |||
towards controlled offers", 2019, | towards controlled offers", January 2019, | |||
<https://ec.europa.eu/growth/content/evaluation- | <https://ec.europa.eu/growth/content/evaluation- | |||
regulatory-tools-enforcing-online-gambling-rules-and- | regulatory-tools-enforcing-online-gambling-rules-and- | |||
channelling-demand-towards-1_en>. | channelling-demand-towards-1_en>. | |||
[EFF2017] Malcom, J., Stoltz, M., Rossi, G., and V. Paxson, "Which | [EFF-2017] Malcom, J., Rossi, G., and M. Stoltz, "Which Internet | |||
Internet registries offer the best protection for domain | registries offer the best protection for domain owners?", | |||
owners?", 2017, <https://www.eff.org/files/2017/08/02/ | Electronic Frontier Foundation, July 2017, | |||
<https://www.eff.org/files/2017/08/02/ | ||||
domain_registry_whitepaper.pdf>. | domain_registry_whitepaper.pdf>. | |||
[ekr-2021] Rescorla, E., "Overview of Apple's Client-side CSAM | [ekr-2021] Rescorla, E., "Overview of Apple's Client-side CSAM | |||
Scanning", 2021, | Scanning", August 2021, | |||
<https://educatedguesswork.org/posts/apple-csam-intro/>. | <https://educatedguesswork.org/posts/apple-csam-intro/>. | |||
[Ellul-1973] | ||||
Ellul, J., "Propaganda: The Formation of Men's Attitudes", | ||||
1973, <https://www.penguinrandomhouse.com/books/46234/ | ||||
propaganda-by-jacques-ellul/>. | ||||
[Elmenhorst-2021] | [Elmenhorst-2021] | |||
Elmenhorst, K., Schuetz, B., Basso, S., and N. | Elmenhorst, K., Schuetz, B., Aschenbruck, N., and S. | |||
Aschenbruck, "Web Censorship Measurements of HTTP/3 over | Basso, "Web Censorship Measurements of HTTP/3 over QUIC", | |||
QUIC", 2021, | IMC '21: Proceedings of the 21st ACM Internet Measurement | |||
Conference, Pages 276-282, DOI 10.1145/3487552.3487836, | ||||
November 2021, | ||||
<https://dl.acm.org/doi/pdf/10.1145/3487552.3487836>. | <https://dl.acm.org/doi/pdf/10.1145/3487552.3487836>. | |||
[Elmenhorst-2022] | [Elmenhorst-2022] | |||
Elmenhorst, K., "A Quick Look at QUIC Censorship", 2022, | Elmenhorst, K., "A Quick Look at QUIC Censorship", April | |||
2022, | ||||
<https://www.opentech.fund/news/a-quick-look-at-quic/>. | <https://www.opentech.fund/news/a-quick-look-at-quic/>. | |||
[Eneman-2010] | [Eneman-2010] | |||
Eneman, M., "ISPs filtering of child abusive material: A | Eneman, M., "Internet service provider (ISP) filtering of | |||
critical reflection of its effectiveness", 2010, | child-abusive material: A critical reflection of its | |||
<https://www.gu.se/forskning/ | effectiveness", DOI 10.1080/13552601003760014, June 2010, | |||
publikation/?publicationId=96592>. | <https://www.tandfonline.com/doi/ | |||
abs/10.1080/13552601003760014>. | ||||
[Ensafi-2013] | [Ensafi-2013] | |||
Ensafi, R., "Detecting Intentional Packet Drops on the | Ensafi, R., Knockel, J., Alexander, G., and J.R. Crandall, | |||
Internet via TCP/IP Side Channels", 2013, | "Detecting Intentional Packet Drops on the Internet via | |||
TCP/IP Side Channels: Extended Version", | ||||
DOI 10.48550/arXiv.1312.5739, December 2013, | ||||
<http://arxiv.org/pdf/1312.5739v1.pdf>. | <http://arxiv.org/pdf/1312.5739v1.pdf>. | |||
[Fareed-2008] | ||||
Fareed, M., "China joins a turf war", 2008, | ||||
<http://www.theguardian.com/media/2008/sep/22/ | ||||
chinathemedia.marketingandpr>. | ||||
[Fifield-2015] | [Fifield-2015] | |||
Fifield, D., Lan, C., Hynes, R., Wegmann, P., and V. | Fifield, D., Lan, C., Hynes, R., Wegmann, P., and V. | |||
Paxson, "Blocking-resistant communication through domain | Paxson, "Blocking-resistant communication through domain | |||
fronting", 2015, | fronting", DOI 10.1515/popets-2015-0009, May 2015, | |||
<https://petsymposium.org/2015/papers/03_Fifield.pdf>. | <https://petsymposium.org/2015/papers/03_Fifield.pdf>. | |||
[Gao-2014] Gao, H., "Tiananmen, Forgotten", 2014, | ||||
<http://www.nytimes.com/2014/06/04/opinion/tiananmen- | ||||
forgotten.html>. | ||||
[Gatlan-2019] | [Gatlan-2019] | |||
Gatlan, S., "South Korea is Censoring the Internet by | Gatlan, S., "South Korea is Censoring the Internet by | |||
Snooping on SNI Traffic", 2019, | Snooping on SNI Traffic", February 2019, | |||
<https://www.bleepingcomputer.com/news/security/south- | <https://www.bleepingcomputer.com/news/security/south- | |||
korea-is-censoring-the-internet-by-snooping-on-sni- | korea-is-censoring-the-internet-by-snooping-on-sni- | |||
traffic/>. | traffic/>. | |||
[Gilad] Gilad, Y. and A. Herzberg, "Off-Path TCP Injection | [Gilad] Gilad, Y. and A. Herzberg, "Off-Path TCP Injection | |||
Attacks", 2014, <https://doi.org/10.1145/2597173>. | Attacks", ACM Transactions on Information and System | |||
Security, Volume 16, Issue 4, Article No.: 13, pp. 1-32, | ||||
DOI 10.1145/2597173, April 2014, | ||||
<https://doi.org/10.1145/2597173>. | ||||
[Glanville-2008] | [Glanville-2008] | |||
Glanville, J., "The Big Business of Net Censorship", 2008, | Glanville, J., "The big business of net censorship", The | |||
Guardian, November 2008, | ||||
<http://www.theguardian.com/commentisfree/2008/nov/17/ | <http://www.theguardian.com/commentisfree/2008/nov/17/ | |||
censorship-internet>. | censorship-internet>. | |||
[Google-2018] | [Google-2018] | |||
"Google Cloud Networking Incident #18018", 2018, | "Google Cloud Networking Incident #18018", November 2018, | |||
<https://status.cloud.google.com/incident/cloud- | <https://status.cloud.google.com/incident/cloud- | |||
networking/18018>. | networking/18018>. | |||
[Google-RTBF] | [Google-RTBF] | |||
Google, Inc., "Search removal request under data | Google, Inc., "Search removal request under data | |||
protection law in Europe", 2015, | protection law in Europe", 2015, | |||
<https://support.google.com/legal/contact/ | <https://support.google.com/legal/contact/ | |||
lr_eudpa?product=websearch>. | lr_eudpa?product=websearch>. | |||
[Grover-2019] | [Grover-2019] | |||
Grover, G., Singh, K., and E. Hickok, "Reliance Jio is | Grover, G., Singh, K., and E. Hickok, Ed., "Reliance Jio | |||
using SNI inspection to block websites", 2019, | is using SNI inspection to block websites", November 2019, | |||
<https://cis-india.org/internet-governance/blog/reliance- | <https://cis-india.org/internet-governance/blog/reliance- | |||
jio-is-using-sni-inspection-to-block-websites>. | jio-is-using-sni-inspection-to-block-websites>. | |||
[Guardian-2014] | [HADOPI] Hadopi, "Hadopi | Haute Autorité pour la diffusion des | |||
The Gaurdian, "Chinese blogger jailed under crackdown on | oeuvres et la protection des droits sur internet", | |||
'internet rumours'", 2014, | <https://www.hadopi.fr/>. | |||
<http://www.theguardian.com/world/2014/apr/17/chinese- | ||||
blogger-jailed-crackdown-internet-rumours-qin-zhihui>. | ||||
[HADOPI-2020] | ||||
Haute Autorité pour la Diffusion des oeuvres et la | ||||
Protection des Droits sur Internet, "Présentation", 2020, | ||||
<https://www.hadopi.fr/en/node/3668>. | ||||
[Halley-2008] | [Halley-2008] | |||
Halley, B., "How DNS cache poisoning works", 2014, | Halley, B., "How DNS cache poisoning works", October 2008, | |||
<https://www.networkworld.com/article/2277316/tech- | <https://www.networkworld.com/article/2277316/tech- | |||
primers/tech-primers-how-dns-cache-poisoning-works.html>. | primers/tech-primers-how-dns-cache-poisoning-works.html>. | |||
[Heacock-2009] | [Heacock-2009] | |||
Heacock, R., "China Shuts Down Internet in Xinjiang Region | Heacock, R., "China shuts down Internet in Xinjiang region | |||
After Riots", 2009, <https://opennet.net/blog/2009/07/ | after riots", OpenNet Initiative, July 2009, | |||
china-shuts-down-internet-xinjiang-region-after-riots>. | <https://opennet.net/blog/2009/07/china-shuts-down- | |||
internet-xinjiang-region-after-riots>. | ||||
[Hepting-2011] | [Hepting-2011] | |||
Wikipedia, "Hepting vs. AT&T", 2011, | Wikipedia, "Hepting v. AT&T", September 2023, | |||
<https://en.wikipedia.org/wiki/Hepting_v._AT%26T>. | <https://en.wikipedia.org/wiki/ | |||
Hepting_v._AT%26T&oldid=1175143505>. | ||||
[Hertel-2015] | [Hertel-2015] | |||
Hertel, O., "Comment les autorités peuvent bloquer un site | Hertel, O., "Comment les autorités peuvent bloquer un site | |||
Internet", 2015, <https://www.sciencesetavenir.fr/high- | Internet" [How authorities can block a website], March | |||
tech/comment-les-autorites-peuvent-bloquer-un-site- | 2015, <https://www.sciencesetavenir.fr/high-tech/comment- | |||
internet_35828>. | les-autorites-peuvent-bloquer-un-site-internet_35828>. | |||
[Hjelmvik-2010] | [Hjelmvik-2010] | |||
Hjelmvik, E., "Breaking and Improving Protocol | Hjelmvik, E. and W. John, "Breaking and Improving Protocol | |||
Obfuscation", 2010, | Obfuscation", Technical Report No. 2010-05, ISSN | |||
1652-926X, July 2010, | ||||
<https://www.iis.se/docs/hjelmvik_breaking.pdf>. | <https://www.iis.se/docs/hjelmvik_breaking.pdf>. | |||
[Hopkins-2011] | ||||
Hopkins, C., "Communications Blocked in Libya, Qatari | ||||
Blogger Arrested: This Week in Online Tyranny", 2011, | ||||
<http://readwrite.com/2011/03/03/ | ||||
communications_blocked_in_libya_this_week_in_onlin>. | ||||
[Husak-2016] | [Husak-2016] | |||
Husak, M., Cermak, M., Jirsik, T., and P. Celeda, "HTTPS | Husák, M., Čermák, M., Jirsík, T., and P. Čeleda, "HTTPS | |||
traffic analysis and client identification using passive | traffic analysis and client identification using passive | |||
SSL/TLS fingerprinting", 2016, | SSL/TLS fingerprinting", DOI 10.1186/s13635-016-0030-7, | |||
<https://link.springer.com/article/10.1186/ | February 2016, <https://link.springer.com/article/10.1186/ | |||
s13635-016-0030-7>. | s13635-016-0030-7>. | |||
[I-D.ietf-quic-transport] | [ICANN-2012] | |||
Iyengar, J. and M. Thomson, "QUIC: A UDP-Based Multiplexed | ICANN Security and Stability Advisory Committee, "Guidance | |||
and Secure Transport", Work in Progress, Internet-Draft, | for Preparing Domain Name Orders, Seizures & Takedowns", | |||
draft-ietf-quic-transport-34, 14 January 2021, | January 2012, | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-quic- | <https://www.icann.org/en/system/files/files/guidance- | |||
transport-34>. | domain-seizures-07mar12-en.pdf>. | |||
[I-D.ietf-tls-esni] | ||||
Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS | ||||
Encrypted Client Hello", Work in Progress, Internet-Draft, | ||||
draft-ietf-tls-esni-15, 3 October 2022, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-tls- | ||||
esni-15>. | ||||
[I-D.ietf-tls-sni-encryption] | ||||
Huitema, C. and E. Rescorla, "Issues and Requirements for | ||||
Server Name Identification (SNI) Encryption in TLS", Work | ||||
in Progress, Internet-Draft, draft-ietf-tls-sni- | ||||
encryption-09, 28 October 2019, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-tls-sni- | ||||
encryption-09>. | ||||
[ICANN-SSAC-2012] | [ICANN-SSAC-2012] | |||
ICANN Security and Stability Advisory Committee (SSAC), | ICANN Security and Stability Advisory Committee (SSAC), | |||
"SAC 056: SSAC Advisory on Impacts of Content Blocking via | "SAC 056: SSAC Advisory on Impacts of Content Blocking via | |||
the Domain Name System", 2012, | the Domain Name System", October 2012, | |||
<https://www.icann.org/en/system/files/files/sac- | <https://www.icann.org/en/system/files/files/sac- | |||
056-en.pdf>. | 056-en.pdf>. | |||
[ICANN2012] | ||||
ICANN Security and Stability Advisory Committee, "Guidance | ||||
for Preparing Domain Name Orders, Seizures & Takedowns", | ||||
2012, <https://www.icann.org/en/system/files/files/ | ||||
guidance-domain-seizures-07mar12-en.pdf>. | ||||
[Jones-2014] | [Jones-2014] | |||
Jones, B., "Automated Detection and Fingerprinting of | Jones, B., Lee, T-W., Feamster, N., and P. Gill, | |||
Censorship Block Pages", 2014, | "Automated Detection and Fingerprinting of Censorship | |||
Block Pages", IMC '14: Proceedings of the 2014 Conference | ||||
on Internet Measurement Conference, Pages 299-304, | ||||
DOI 10.1145/2663716.2663722, November 2014, | ||||
<http://conferences2.sigcomm.org/imc/2014/papers/ | <http://conferences2.sigcomm.org/imc/2014/papers/ | |||
p299.pdf>. | p299.pdf>. | |||
[Khattak-2013] | [Khattak-2013] | |||
Khattak, S., "Towards Illuminating a Censorship Monitor's | Khattak, S., Javed, M., Anderson, P.D., and V. Paxson, | |||
Model to Facilitate Evasion", 2013, <http://0b4af6cdc2f0c5 | "Towards Illuminating a Censorship Monitor's Model to | |||
998459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.co | Facilitate Evasion", August 2013, <http://0b4af6cdc2f0c599 | |||
m/12389-foci13-khattak.pdf>. | 8459-c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/ | |||
12389-foci13-khattak.pdf>. | ||||
[Knight-2005] | [Knight-2005] | |||
Knight, W., "Iranian net censorship powered by US | Knight, W., "Iranian net censorship powered by US | |||
technology", 2005, <https://www.newscientist.com/article/ | technology", June 2005, | |||
dn7589-iranian-net-censorship-powered-by-us-technology/>. | <https://www.newscientist.com/article/dn7589-iranian-net- | |||
censorship-powered-by-us-technology/>. | ||||
[Knockel-2021] | [Knockel-2021] | |||
Knockel, J. and L. Ruan, "Measuring QQMail's automated | Knockel, J. and L. Ruan, "Measuring QQMail's automated | |||
email censorship in China", 2021, | email censorship in China", FOCI '21: Proceedings of the | |||
ACM SIGCOMM 2021 Workshop on Free and Open Communications | ||||
on the Internet, Pages 8-15, DOI 10.1145/3473604.3474560, | ||||
April 2021, | ||||
<https://dl.acm.org/doi/10.1145/3473604.3474560>. | <https://dl.acm.org/doi/10.1145/3473604.3474560>. | |||
[Kopel-2013] | ||||
Kopel, K., "Operation Seizing Our Sites: How the Federal | ||||
Government is Taking Domain Names Without Prior Notice", | ||||
2013, <http://dx.doi.org/doi:10.15779/Z384Q3M>. | ||||
[Kravtsova-2012] | [Kravtsova-2012] | |||
Kravtsova, Y., "Cyberattacks Disrupt Opposition's | Kravtsova, Y., "Cyberattacks Disrupt Opposition's | |||
Election", 2012, | Election", The Moscow Times, October 2012, | |||
<http://www.themoscowtimes.com/news/article/cyberattacks- | <http://www.themoscowtimes.com/news/article/cyberattacks- | |||
disrupt-oppositions-election/470119.html>. | disrupt-oppositions-election/470119.html>. | |||
[Leyba-2019] | [Leyba-2019] | |||
Leyba, K., Edwards, B., Freeman, C., Crandall, J., and S. | Leyba, K., Edwards, B., Freeman, C., Crandall, J., and S. | |||
Forrest, "Borders and Gateways: Measuring and Analyzing | Forrest, "Borders and gateways: measuring and analyzing | |||
National AS Chokepoints", 2019, | national as chokepoints", COMPASS '19: Proceedings of the | |||
<https://forrest.biodesign.asu.edu/data/publications/2019- | 2nd ACM SIGCAS Conference on Computing and Sustainable | |||
compass-chokepoints.pdf>. | Societies, pages 184-194, DOI 10.1145/3314344.3332502, | |||
July 2019, <https://doi.org/10.1145/3314344.3332502>. | ||||
[Li-2017] Li, F., Razaghpanah, A., Kakhki, A., Niaki, A., Choffnes, | [Li-2017] Li, F., Razaghpanah, A., Molavi Kakhki, A., Akhavan Niaki, | |||
D., Gill, P., and A. Mislove, "lib•erate, (n) : A library | A., Choffnes, D., Gill, P., and A. Mislove, "lib•erate, | |||
for exposing (traffic-classification) rules and avoiding | (n): a library for exposing (traffic-classification) rules | |||
them efficiently", 2017, | and avoiding them efficiently", | |||
DOI 10.1145/3131365.3131376, November 2017, | ||||
<https://david.choffnes.com/pubs/liberate-imc17.pdf>. | <https://david.choffnes.com/pubs/liberate-imc17.pdf>. | |||
[Lomas-2019] | [Lomas-2019] | |||
Lomas, N., "Github removes Tsunami Democràtic’s APK after | Lomas, N., "Github removes Tsunami Democràtic's APK after | |||
a takedown order from Spain", 2019, | a takedown order from Spain", October 2019, | |||
<https://techcrunch.com/2019/10/30/github-removes-tsunami- | <https://techcrunch.com/2019/10/30/github-removes-tsunami- | |||
democratics-apk-after-a-takedown-order-from-spain/>. | democratics-apk-after-a-takedown-order-from-spain/>. | |||
[MANRS] Siddiqui, A., "Lesson Learned: Twitter Shored Up Its | ||||
Routing Security", 2022, <https://www.manrs.org/2022/03/ | ||||
lesson-learned-twitter-shored-up-its-routing-security/>. | ||||
[Marczak-2015] | [Marczak-2015] | |||
Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, | Marczak, B., Weaver, N., Dalek, J., Ensafi, R., Fifield, | |||
D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., | D., McKune, S., Rey, A., Scott-Railton, J., Deibert, R., | |||
and V. Paxson, "An Analysis of China’s “Great Cannon”", | and V. Paxson, "An Analysis of China's "Great Cannon"", | |||
2015, | August 2015, | |||
<https://www.usenix.org/system/files/conference/foci15/ | <https://www.usenix.org/system/files/conference/foci15/ | |||
foci15-paper-marczak.pdf>. | foci15-paper-marczak.pdf>. | |||
[Muncaster-2013] | [Muncaster-2013] | |||
Muncaster, P., "Malaysian election sparks web blocking/ | Muncaster, P., "Malaysian election sparks web blocking/ | |||
DDoS claims", 2013, | DDoS claims", The Register, May 2013, | |||
<http://www.theregister.co.uk/2013/05/09/ | <http://www.theregister.co.uk/2013/05/09/ | |||
malaysia_fraud_elections_ddos_web_blocking/>. | malaysia_fraud_elections_ddos_web_blocking/>. | |||
[Murdoch-2011] | [Murdoch-2008] | |||
Murdoch, S. J. and R. Anderson, "Access Denied: Tools and | Murdoch, S. J. and R. Anderson, "Tools and Technology of | |||
Technology of Internet Filtering", 2011, | Internet Filtering" in "Access Denied: The Practice and | |||
<http://access.opennet.net/wp-content/uploads/2011/12/ | Policy of Global Internet Filtering", | |||
accessdenied-chapter-3.pdf>. | DOI 10.7551/mitpress/7617.003.0006, 2008, | |||
<https://doi.org/10.7551/mitpress/7617.003.0006>. | ||||
[NA-SK-2019] | [NA-SK-2019] | |||
Morgus, R., Sherman, J., and S. Nam, "Analysis: South | Morgus, R., Sherman, J., and S. Nam, "Analysis: South | |||
Korea's New Tool for Filtering Illegal Internet Content", | Korea's New Tool for Filtering Illegal Internet Content", | |||
2019, <https://www.newamerica.org/cybersecurity- | March 2019, <https://www.newamerica.org/cybersecurity- | |||
initiative/c2b/c2b-log/analysis-south-koreas-sni- | initiative/c2b/c2b-log/analysis-south-koreas-sni- | |||
monitoring/>. | monitoring/>. | |||
[Nabi-2013] | [Nabi-2013] | |||
Nabi, Z., "The Anatomy of Web Censorship in Pakistan", | Nabi, Z., "The Anatomy of Web Censorship in Pakistan", | |||
2013, <http://0b4af6cdc2f0c5998459-c0245c5c937c5dedcca3f17 | August 2013, <http://0b4af6cdc2f0c5998459-c0245c5c937c5ded | |||
64ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf>. | cca3f1764ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf | |||
>. | ||||
[NBC-2014] NBC News, "Exclusive: Snowden Docs Show UK Spies Attacked | ||||
Anonymous, Hackers", February 2014, | ||||
<http://www.nbcnews.com/feature/edward-snowden-interview/ | ||||
exclusive-snowden-docs-show-uk-spies-attacked-anonymous- | ||||
hackers-n21361>. | ||||
[Netsec-2011] | [Netsec-2011] | |||
n3t2.3c, "TCP-RST Injection", 2011, | n3t2.3c, "TCP-RST Injection", October 2011, | |||
<https://nets.ec/TCP-RST_Injection>. | <https://nets.ec/TCP-RST_Injection>. | |||
[OONI-2018] | [OONI-2018] | |||
Evdokimov, L., "Iran Protests: DPI blocking of Instagram | Evdokimov, L., "Iran Protests: DPI blocking of Instagram | |||
(Part 2)", 2018, | (Part 2)", February 2018, | |||
<https://ooni.org/post/2018-iran-protests-pt2/>. | <https://ooni.org/post/2018-iran-protests-pt2/>. | |||
[OONI-2019] | [OONI-2019] | |||
Singh, S., Filastò, A., and M. Xynou, "China is now | Singh, S., Filastò, A., and M. Xynou, "China is now | |||
blocking all language editions of Wikipedia", 2019, | blocking all language editions of Wikipedia", May 2019, | |||
<https://ooni.org/post/2019-china-wikipedia-blocking/>. | <https://ooni.org/post/2019-china-wikipedia-blocking/>. | |||
[Orion-2013] | [Orion-2013] | |||
Orion, E., "Zimbabwe election hit by hacking and DDoS | Orion, E., "Zimbabwe election hit by hacking and DDoS | |||
attacks", 2013, | attacks", Wayback Machine archive, August 2013, <https://w | |||
<http://www.theinquirer.net/inquirer/news/2287433/ | eb.archive.org/web/20130825010947/http://www.theinquirer.n | |||
zimbabwe-election-hit-by-hacking-and-ddos-attacks>. | et/inquirer/news/2287433/zimbabwe-election-hit-by-hacking- | |||
and-ddos-attacks>. | ||||
[Patil-2019] | [Patil-2019] | |||
Patil, S. and N. Borisov, "What Can You Learn from an | Patil, S. and N. Borisov, "What can you learn from an | |||
IP?", 2019, <https://irtf.org/anrw/2019/ | IP?", Proceedings of the Applied Networking Research | |||
Workshop, Pages 45-51, DOI 10.1145/3340301.3341133, July | ||||
2019, <https://irtf.org/anrw/2019/ | ||||
anrw2019-final44-acmpaginated.pdf>. | anrw2019-final44-acmpaginated.pdf>. | |||
[Porter-2010] | [Porter-2005] | |||
Porter, T., "The Perils of Deep Packet Inspection", 2010, | Porter, T., "The Perils of Deep Packet Inspection", 2010, | |||
<http://www.symantec.com/connect/articles/perils-deep- | <http://www.symantec.com/connect/articles/perils-deep- | |||
packet-inspection>. | packet-inspection>. | |||
[Rambert-2021] | [Rambert-2021] | |||
Rampert, R., Weinberg, Z., Barradas, D., and N. Christin, | Rampert, R., Weinberg, Z., Barradas, D., and N. Christin, | |||
"Chinese Wall or Swiss Cheese? Keyword filtering in the | "Chinese Wall or Swiss Cheese? Keyword filtering in the | |||
Great Firewall of China", 2021, | Great Firewall of China", DOI 10.1145/3442381.3450076, | |||
April 2021, | ||||
<https://www.andrew.cmu.edu/user/nicolasc/publications/ | <https://www.andrew.cmu.edu/user/nicolasc/publications/ | |||
Rambert-WWW21.pdf>. | Rambert-WWW21.pdf>. | |||
[Reda-2017] | [Reda-2017] | |||
Reda, J., "New EU law prescribes website blocking in the | Reda, F., "New EU law prescribes website blocking in the | |||
name of 'consumer protection'", 2017, | name of "consumer protection"", November 2017, | |||
<https://juliareda.eu/2017/11/eu-website-blocking/>. | <https://felixreda.eu/2017/11/eu-website-blocking/>. | |||
[RFC0793] Postel, J., "Transmission Control Protocol", RFC 793, | ||||
DOI 10.17487/RFC0793, September 1981, | ||||
<https://www.rfc-editor.org/rfc/rfc793>. | ||||
[RFC6066] Eastlake 3rd, D., "Transport Layer Security (TLS) | [RFC6066] Eastlake 3rd, D., "Transport Layer Security (TLS) | |||
Extensions: Extension Definitions", RFC 6066, | Extensions: Extension Definitions", RFC 6066, | |||
DOI 10.17487/RFC6066, January 2011, | DOI 10.17487/RFC6066, January 2011, | |||
<https://www.rfc-editor.org/rfc/rfc6066>. | <https://www.rfc-editor.org/info/rfc6066>. | |||
[RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., | [RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., | |||
Trammell, B., Huitema, C., and D. Borkmann, | Trammell, B., Huitema, C., and D. Borkmann, | |||
"Confidentiality in the Face of Pervasive Surveillance: A | "Confidentiality in the Face of Pervasive Surveillance: A | |||
Threat Model and Problem Statement", RFC 7624, | Threat Model and Problem Statement", RFC 7624, | |||
DOI 10.17487/RFC7624, August 2015, | DOI 10.17487/RFC7624, August 2015, | |||
<https://www.rfc-editor.org/rfc/rfc7624>. | <https://www.rfc-editor.org/info/rfc7624>. | |||
[RFC7754] Barnes, R., Cooper, A., Kolkman, O., Thaler, D., and E. | [RFC7754] Barnes, R., Cooper, A., Kolkman, O., Thaler, D., and E. | |||
Nordmark, "Technical Considerations for Internet Service | Nordmark, "Technical Considerations for Internet Service | |||
Blocking and Filtering", RFC 7754, DOI 10.17487/RFC7754, | Blocking and Filtering", RFC 7754, DOI 10.17487/RFC7754, | |||
March 2016, <https://www.rfc-editor.org/rfc/rfc7754>. | March 2016, <https://www.rfc-editor.org/info/rfc7754>. | |||
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | |||
and P. Hoffman, "Specification for DNS over Transport | and P. Hoffman, "Specification for DNS over Transport | |||
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | |||
2016, <https://www.rfc-editor.org/rfc/rfc7858>. | 2016, <https://www.rfc-editor.org/info/rfc7858>. | |||
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | |||
(DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, | (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, | |||
<https://www.rfc-editor.org/rfc/rfc8484>. | <https://www.rfc-editor.org/info/rfc8484>. | |||
[RSF-2005] Reporters Sans Frontieres, "Technical ways to get around | [RFC8744] Huitema, C., "Issues and Requirements for Server Name | |||
censorship", 2005, <http://archives.rsf.org/print- | Identification (SNI) Encryption in TLS", RFC 8744, | |||
blogs.php3?id_article=15013>. | DOI 10.17487/RFC8744, July 2020, | |||
<https://www.rfc-editor.org/info/rfc8744>. | ||||
[Rushe-2015] | [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | |||
Multiplexed and Secure Transport", RFC 9000, | ||||
DOI 10.17487/RFC9000, May 2021, | ||||
<https://www.rfc-editor.org/info/rfc9000>. | ||||
[RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)", | ||||
STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022, | ||||
<https://www.rfc-editor.org/info/rfc9293>. | ||||
[Rushe-2014] | ||||
Rushe, D., "Bing censoring Chinese language search results | Rushe, D., "Bing censoring Chinese language search results | |||
for users in the US", 2013, | for users in the US", The Guardian, February 2014, | |||
<http://www.theguardian.com/technology/2014/feb/11/bing- | <http://www.theguardian.com/technology/2014/feb/11/bing- | |||
censors-chinese-language-search-results>. | censors-chinese-language-search-results>. | |||
[RWB2020] Reporters Without Borders, "2020 World Press Freedom | [RWB-2020] Reporters Without Borders (RSF), "2020 World Press Freedom | |||
Index: Entering a decisive decade for journalism, | Index: 'Entering a decisive decade for journalism, | |||
exacerbated by coronavirus", 2020, <https://rsf.org/ | exacerbated by coronavirus'", April 2020, | |||
en/2020-world-press-freedom-index-entering-decisive- | <https://rsf.org/en/2020-world-press-freedom-index- | |||
decade-journalism-exacerbated-coronavirus>. | entering-decisive-decade-journalism-exacerbated- | |||
coronavirus>. | ||||
[Sandvine-2014] | [Sandvine-2015] | |||
Sandvine, "Technology Showcase on Traffic Classification: | Sandvine, "Internet Traffic Classification: A Sandvine | |||
Why Measurements and Freeform Policy Matter", 2014, | Technology Showcase", 2015, | |||
<https://www.sandvine.com/downloads/general/technology/ | <https://www.researchgate.net/profile/Nirmala-Svsg/post/ | |||
sandvine-technology-showcases/sandvine-technology- | Anybody-working-on-Internet-traffic- | |||
showcase-traffic-classification.pdf>. | classification/attachment/59d63a5779197b807799782d/ | |||
AS%3A405810988503040%401473764287142/download/traffic- | ||||
classification-identifying-and-measuring-internet- | ||||
traffic.pdf>. | ||||
[Satija-2021] | [Satija-2021] | |||
Satija, S. and R. Chatterjee, "BlindTLS: Circumventing | Satija, S. and R. Chatterjee, "BlindTLS: Circumventing | |||
TLS-based HTTPS censorship", 2021, | TLS-based HTTPS censorship", FOCI '21: Proceedings of the | |||
ACM SIGCOMM 2021 Workshop on Free and Open Communications | ||||
on the Internet, Pages 43-49, DOI 10.1145/3473604.3474564, | ||||
August 2021, | ||||
<https://sambhav.info/files/blindtls-foci21.pdf>. | <https://sambhav.info/files/blindtls-foci21.pdf>. | |||
[Schoen-2007] | [Schoen-2007] | |||
Schoen, S., "EFF tests agree with AP: Comcast is forging | Schoen, S., "EFF tests agree with AP: Comcast is forging | |||
packets to interfere with user traffic", 2007, | packets to interfere with user traffic", October 2007, | |||
<https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap- | <https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap- | |||
comcast-forging-packets-to-interfere>. | comcast-forging-packets-to-interfere>. | |||
[Schone-2014] | ||||
Schone, M., Esposito, R., Cole, M., and G. Greenwald, | ||||
"Snowden Docs Show UK Spies Attacked Anonymous, Hackers", | ||||
2014, <http://www.nbcnews.com/feature/edward-snowden- | ||||
interview/exclusive-snowden-docs-show-uk-spies-attacked- | ||||
anonymous-hackers-n21361>. | ||||
[Senft-2013] | [Senft-2013] | |||
Senft, A., "Asia Chats: Analyzing Information Controls and | , Crete-Nishihata, M., Dalek, J., Hardy, S., Hilts, A., | |||
Privacy in Asian Messaging Applications", 2013, | Kleemola, K., Ng, J., Poetranto, I., Senft, A., Sinpeng, | |||
A., Sonne, B., and G. Wiseman, "Asia Chats: Analyzing | ||||
Information Controls and Privacy in Asian Messaging | ||||
Applications", November 2013, | ||||
<https://citizenlab.org/2013/11/asia-chats-analyzing- | <https://citizenlab.org/2013/11/asia-chats-analyzing- | |||
information-controls-privacy-asian-messaging- | information-controls-privacy-asian-messaging- | |||
applications/>. | applications/>. | |||
[Shbair-2015] | [Shbair-2015] | |||
Shbair, W. M., Cholez, T., Goichot, A., and I. Chrisment, | Shbair, W. M., Cholez, T., Goichot, A., and I. Chrisment, | |||
"Efficiently Bypassing SNI-based HTTPS Filtering", 2015, | "Efficiently Bypassing SNI-based HTTPS Filtering", May | |||
<https://hal.inria.fr/hal-01202712/document>. | 2015, <https://hal.inria.fr/hal-01202712/document>. | |||
[SIDN2020] Moura, G., "Detecting and Taking Down Fraudulent Webshops | [Siddiqui-2022] | |||
at the .nl ccTLD", 2020, | Siddiqui, A., "Lesson Learned: Twitter Shored Up Its | |||
Routing Security", March 2022, | ||||
<https://www.manrs.org/2022/03/lesson-learned-twitter- | ||||
shored-up-its-routing-security/>. | ||||
[SIDN-2020] | ||||
Moura, G., "Detecting and Taking Down Fraudulent Webshops | ||||
at the .nl ccTLD", February 2020, | ||||
<https://labs.ripe.net/Members/giovane_moura/detecting- | <https://labs.ripe.net/Members/giovane_moura/detecting- | |||
and-taking-down-fraudulent-webshops-at-a-cctld>. | and-taking-down-fraudulent-webshops-at-a-cctld>. | |||
[Singh-2019] | [Singh-2019] | |||
Singh, K., Grover, G., and V. Bansal, "How India Censors | Singh, K., Grover, G., and V. Bansal, "How India Censors | |||
the Web", 2019, <https://arxiv.org/abs/1912.08590>. | the Web", DOI 10.48550/arXiv.1912.08590, December 2019, | |||
<https://arxiv.org/abs/1912.08590>. | ||||
[Sophos-2015] | [Sophos-2023] | |||
Sophos, "Understanding Sophos Web Filtering", 2015, | Sophos, "Sophos Firewall: Web filtering basics", 2023, | |||
<https://www.sophos.com/en-us/support/ | <https://support.sophos.com/support/s/article/KB- | |||
knowledgebase/115865.aspx>. | 000036518?language=en_US>. | |||
[SSAC-109-2020] | [SSAC-109-2020] | |||
ICANN Security and Stability Advisory Committee, "SAC109: | ICANN Security and Stability Advisory Committee (SSAC), | |||
The Implications of DNS over HTTPS and DNS over TLS", | "SAC109: The Implications of DNS over HTTPS and DNS over | |||
2020, <https://www.icann.org/en/system/files/files/sac- | TLS", March 2020, | |||
<https://www.icann.org/en/system/files/files/sac- | ||||
109-en.pdf>. | 109-en.pdf>. | |||
[Tang-2016] | [Tang-2016] | |||
Tang, C., "In-depth analysis of the Great Firewall of | Tang, C., "In-depth analysis of the Great Firewall of | |||
China", 2016, | China", December 2016, | |||
<https://www.cs.tufts.edu/comp/116/archive/fall2016/ | <https://www.cs.tufts.edu/comp/116/archive/fall2016/ | |||
ctang.pdf>. | ctang.pdf>. | |||
[Thomson-2012] | [Thomson-2012] | |||
Thomson, I., "Syria Cuts off Internet and Mobile | Thomson, I., "Syria cuts off internet and mobile | |||
Communication", 2012, | communication", The Register, November 2012, | |||
<http://www.theregister.co.uk/2012/11/29/ | <http://www.theregister.co.uk/2012/11/29/ | |||
syria_internet_blackout/>. | syria_internet_blackout/>. | |||
[Tor-2020] The Tor Project, "Tor: Pluggable Transports", 2020, | [TLS-ESNI] Rescorla, E., Oku, K., Sullivan, N., and C. A. Wood, "TLS | |||
Encrypted Client Hello", Work in Progress, Internet-Draft, | ||||
draft-ietf-tls-esni-17, 9 October 2023, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-tls- | ||||
esni-17>. | ||||
[Tor-2019] Tor, "Tor: Pluggable Transports", 2019, | ||||
<https://2019.www.torproject.org/docs/pluggable- | <https://2019.www.torproject.org/docs/pluggable- | |||
transports.html.en>. | transports.html.en>. | |||
[Trustwave-2015] | [Trustwave-2015] | |||
Trustwave, "Filter: SNI extension feature and HTTPS | Trustwave, "Filter : SNI extension feature and HTTPS | |||
blocking", 2015, | blocking", 2015, | |||
<https://www3.trustwave.com/software/8e6/hlp/r3000/ | <https://www3.trustwave.com/software/8e6/hlp/r3000/ | |||
files/1system_filter.html>. | files/1system_filter.html>. | |||
[Tschantz-2016] | [Tschantz-2016] | |||
Tschantz, M., Afroz, S., Anonymous, A., and V. Paxson, | Tschantz, M., Afroz, S., Anonymous, and V. Paxson, "SoK: | |||
"SoK: Towards Grounding Censorship Circumvention in | Towards Grounding Censorship Circumvention in Empiricism", | |||
Empiricism", 2016, | DOI 10.1109/SP.2016.59, May 2016, | |||
<https://oaklandsok.github.io/papers/tschantz2016.pdf>. | <https://oaklandsok.github.io/papers/tschantz2016.pdf>. | |||
[Van-der-Sar-2007] | ||||
Van der Sar, E., "How To Bypass Comcast's BitTorrent | ||||
Throttling", October 2012, <https://torrentfreak.com/how- | ||||
to-bypass-comcast-bittorrent-throttling-071021>. | ||||
[Verkamp-2012] | [Verkamp-2012] | |||
Verkamp, J. P. and M. Gupta, "Inferring Mechanics of Web | Verkamp, J. P. and M. Gupta, "Inferring Mechanics of Web | |||
Censorship Around the World", 2012, | Censorship Around the World", August 2012, | |||
<https://www.usenix.org/system/files/conference/foci12/ | <https://www.usenix.org/system/files/conference/foci12/ | |||
foci12-final1.pdf>. | foci12-final1.pdf>. | |||
[Victor-2019] | [Victor-2019] | |||
Victor, D., "Blizzard Sets Off Backlash for Penalizing | Victor, D., "Blizzard Sets Off Backlash for Penalizing | |||
Hearthstone Gamer in Hong Kong", 2019, | Hearthstone Gamer in Hong Kong", The New York Times, | |||
October 2019, | ||||
<https://www.nytimes.com/2019/10/09/world/asia/blizzard- | <https://www.nytimes.com/2019/10/09/world/asia/blizzard- | |||
hearthstone-hong-kong.html>. | hearthstone-hong-kong.html>. | |||
[Villeneuve-2011] | [Villeneuve-2011] | |||
Villeneuve, N., "Open Access: Chapter 8, Control and | Villeneuve, N. and M. Crete-Nishihata, "Open Access: | |||
Resistance, Attacks on Burmese Opposition Media", 2011, | Chapter 8, Control and Resistance, Attacks on Burmese | |||
Opposition Media", January 2011, | ||||
<http://access.opennet.net/wp-content/uploads/2011/12/ | <http://access.opennet.net/wp-content/uploads/2011/12/ | |||
accesscontested-chapter-08.pdf>. | accesscontested-chapter-08.pdf>. | |||
[VonLohmann-2008] | [VonLohmann-2008] | |||
VonLohmann, F., "FCC Rules Against Comcast for BitTorrent | VonLohmann, F., "FCC Rules Against Comcast for BitTorrent | |||
Blocking", 2008, <https://www.eff.org/deeplinks/2008/08/ | Blocking", August 2008, | |||
fcc-rules-against-comcast-bit-torrent-blocking>. | <https://www.eff.org/deeplinks/2008/08/fcc-rules-against- | |||
comcast-bit-torrent-blocking>. | ||||
[Wagner-2009] | [Wagner-2009] | |||
Wagner, B., "Deep Packet Inspection and Internet | Wagner, B., "Deep Packet Inspection and Internet | |||
Censorship: International Convergence on an ‘Integrated | Censorship: International Convergence on an 'Integrated | |||
Technology of Control'", 2009, | Technology of Control'", Global Voices Advocacy, 2009, | |||
<http://advocacy.globalvoicesonline.org/wp- | <http://advocacy.globalvoicesonline.org/wp- | |||
content/uploads/2009/06/deeppacketinspectionandinternet- | content/uploads/2009/06/deeppacketinspectionandinternet- | |||
censorship2.pdf>. | censorship2.pdf>. | |||
[Wagstaff-2013] | [Wagstaff-2013] | |||
Wagstaff, J., "In Malaysia, online election battles take a | Wagstaff, J., "In Malaysia, online election battles take a | |||
nasty turn", 2013, | nasty turn", NBC News, May 2013, | |||
<http://www.reuters.com/article/2013/05/04/uk-malaysia- | <https://www.nbcnews.com/tech/tech-news/malaysia-online- | |||
election-online-idUKBRE94309G20130504>. | election-battles-take-nasty-turn-flna6c9783842>. | |||
[Wang-2017] | [Wang-2017] | |||
Wang, Z., Cao, Y., Qian, Z., Song, C., and S. | Wang, Z., Cao, Y., Qian, Z., Song, C., and S.V. | |||
Krishnamurthy, "Your State is Not Mine: A Closer Look at | Krishnamurthy, "Your State is Not Mine: A Closer Look at | |||
Evading Stateful Internet Censorship", 2017, | Evading Stateful Internet Censorship", | |||
DOI 10.1145/3131365.3131374, November 2017, | ||||
<https://www.cs.ucr.edu/~zhiyunq/pub/ | <https://www.cs.ucr.edu/~zhiyunq/pub/ | |||
imc17_censorship_tcp.pdf>. | imc17_censorship_tcp.pdf>. | |||
[Wang-2020] | [Wang-2020] | |||
Wang, Z., Zhu, S., Cao, Y., Qian, Z., Song, C., | Wang, Z., Zhu, S., Cao, Y., Qian, Z., Song, C., | |||
Krishnamurthy, S., Chan, K., and T. Braun, "SYMTCP: | Krishnamurthy, S.V., Chan, K.S., and T.D. Braun, "SYMTCP: | |||
Eluding Stateful Deep Packet Inspection with Automated | Eluding Stateful Deep Packet Inspection with Automated | |||
Discrepancy Discovery", 2020, | Discrepancy Discovery", DOI 10.14722/ndss.2020.24083, | |||
February 2020, | ||||
<https://www.cs.ucr.edu/~zhiyunq/pub/ndss20_symtcp.pdf>. | <https://www.cs.ucr.edu/~zhiyunq/pub/ndss20_symtcp.pdf>. | |||
[Weaver-2009] | [Weaver-2009] | |||
Weaver, N., Sommer, R., and V. Paxson, "Detecting Forged | Weaver, N., Sommer, R., and V. Paxson, "Detecting Forged | |||
TCP Packets", 2009, <http://www.icir.org/vern/papers/ | TCP Reset Packets", September 2009, | |||
reset-injection.ndss09.pdf>. | <http://www.icir.org/vern/papers/reset- | |||
injection.ndss09.pdf>. | ||||
[Whittaker-2013] | [Whittaker-2013] | |||
Whittaker, Z., "1,168 keywords Skype uses to censor, | Whittaker, Z., "1,168 keywords Skype uses to censor, | |||
monitor its Chinese users", 2013, | monitor its Chinese users", March 2013, | |||
<http://www.zdnet.com/1168-keywords-skype-uses-to-censor- | <http://www.zdnet.com/1168-keywords-skype-uses-to-censor- | |||
monitor-its-chinese-users-7000012328/>. | monitor-its-chinese-users-7000012328/>. | |||
[Wikip-DoS] | [Wikip-DoS] | |||
Wikipedia, "Denial of Service Attacks", 2016, | Wikipedia, "Denial-of-service attack", March 2016, | |||
<https://en.wikipedia.org/w/index.php?title=Denial-of- | <https://en.wikipedia.org/w/index.php?title=Denial-of- | |||
service_attack&oldid=710558258>. | service_attack&oldid=710558258>. | |||
[Wilde-2012] | [Wilde-2012] | |||
Wilde, T., "Knock Knock Knockin' on Bridges Doors", 2012, | Wilde, T., "Knock Knock Knockin' on Bridges Doors", The | |||
<https://blog.torproject.org/blog/knock-knock-knockin- | Tor Project, July 2012, <https://blog.torproject.org/blog/ | |||
bridges-doors>. | knock-knock-knockin-bridges-doors>. | |||
[Winter-2012] | [Winter-2012] | |||
Winter, P., "How China is Blocking Tor", 2012, | Winter, P. and S. Lindskog, "How China Is Blocking Tor", | |||
<http://arxiv.org/pdf/1204.0447v1.pdf>. | April 2012, <http://arxiv.org/pdf/1204.0447v1.pdf>. | |||
[WP-Def-2020] | [WP-Def-2020] | |||
Wikipedia contributors, "Censorship", 2020, | Wikipedia, "Censorship", March 2020, | |||
<https://en.wikipedia.org/w/ | <https://en.wikipedia.org/w/ | |||
index.php?title=Censorship&oldid=943938595>. | index.php?title=Censorship&oldid=943938595>. | |||
[Wright-2013] | [Wright-2013] | |||
Wright, J. and Y. Breindl, "Internet filtering trends in | Wright, J. and Y. Breindl, "Internet filtering trends in | |||
liberal democracies: French and German regulatory | liberal democracies: French and German regulatory | |||
debates", 2013, | debates", DOI 10.14763/2013.2.122, April 2013, | |||
<https://policyreview.info/articles/analysis/internet- | <https://policyreview.info/articles/analysis/internet- | |||
filtering-trends-liberal-democracies-french-and-german- | filtering-trends-liberal-democracies-french-and-german- | |||
regulatory-debates>. | regulatory-debates>. | |||
[Zhu-2011] Zhu, T., "An Analysis of Chinese Search Engine Filtering", | [Zhu-2011] Zhu, T., Bronk, C., and D.S. Wallach, "An Analysis of | |||
2011, | Chinese Search Engine Filtering", | |||
DOI 10.48550/arXiv.1107.3794, July 2011, | ||||
<http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf>. | <http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf>. | |||
[Zmijewski-2014] | [Zmijewski-2014] | |||
Zmijewski, E., "Turkish Internet Censorship Takes a New | Zmijewski, E., "Turkish Internet Censorship Takes a New | |||
Turn", 2014, | Turn", Wayback Machine archive, March 2014, | |||
<https://blogs.oracle.com/internetintelligence/turkish- | <http://web.archive.org/web/20200726222723/ | |||
https://blogs.oracle.com/internetintelligence/turkish- | ||||
internet-censorship-takes-a-new-turn>. | internet-censorship-takes-a-new-turn>. | |||
Acknowledgments | ||||
This document benefited from discussions with and input from David | ||||
Belson, Stéphane Bortzmeyer, Vinicius Fortuna, Gurshabad Grover, | ||||
Andrew McConachie, Martin Nilsson, Michael Richardson, Patrick Vacek, | ||||
and Chris Wood. | ||||
Coauthor Hall performed work on this document before employment at | ||||
the Internet Society, and his affiliation listed in this document is | ||||
for identification purposes only. | ||||
Authors' Addresses | Authors' Addresses | |||
Joseph Lorenzo Hall | Joseph Lorenzo Hall | |||
Internet Society | Internet Society | |||
Email: hall@isoc.org | Email: hall@isoc.org | |||
Michael D. Aaron | Michael D. Aaron | |||
CU Boulder | CU Boulder | |||
Email: michael.drew.aaron@gmail.com | Email: michael.drew.aaron@gmail.com | |||
End of changes. 313 change blocks. | ||||
905 lines changed or deleted | 942 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |