Practical Censorship Evasion Leveraging Content Delivery Networks

Slides:



Advertisements
Similar presentations
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Enabling Secure Internet Access with ISA Server
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP.
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
The Internet Useful Definitions and Concepts About the Internet.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Caching and Content Distribution Networks. Web Caching r As an example, we use the web to illustrate caching and other related issues browser Web Proxy.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
Norman SecureSurf Protect your users when surfing the Internet.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
© British Telecommunications plc Network Filtering.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Web Cache Redirection using a Layer-4 switch: Architecture, issues, tradeoffs, and trends Shirish Sathaye Vice-President of Engineering.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS.
MICROSOFT AJAX CDN (CONTENT DELIVERY NETWORK) Make Your ASP.NET site faster to retrieve.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Secure HTTP (HTTPS) Pat Morin COMP 2405.
4.01 How Web Pages Work.
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
Web fundamentals: Clients, Servers, and Communication
Chapter 10: Web Basics.
TMG Client Protection 6NPS – Session 7.
Module 3: Enabling Access to Internet Resources
Firewall Techniques Matt Cupp.
How HTTP Works Made by Manish Kushwaha.
HTTP and Abstraction on the Internet
Chapter 10: Web Basics.
DNS-sly: Avoiding Censorship through Network Complexity
Content Distribution Networks
CONNECTING TO THE INTERNET
Web Development Web Servers.
Ad-blocker circumvention System
Practical Censorship Evasion Leveraging Content Delivery Networks
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Network Load Balancing
Goals of soBGP Verify the origin of advertisements
Introduction to Networking
Configuring TMG as a Firewall
No Direction Home: The True cost of Routing Around Decoys
Providing Network Services
6.6 Firewalls Packet Filter (=filtering router)
IIS.
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
AKAMAI INTELLIGENT PLATFORM™
Goals Introduce the Windows Server 2003 family of operating systems
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
HTTP and Abstraction on the Internet / The Need for DNS
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Bruce Maggs relying on materials from
Content Delivery and Remote DNS services
Computer Networks Primary, Secondary and Root Servers
Advanced Computer Networks
4.01 How Web Pages Work.
DoH! Peter Van Roste GAC/ccNSO meeting - ICANN 64
Client-Server Model: Requesting a Web Page
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Bruce Maggs relying on materials from
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

Practical Censorship Evasion Leveraging Content Delivery Networks Presented by Nicole Hippolite

Motivation Internet censorship Censorship circumvention Limits access to websites Censorship circumvention Tor: onion routing Psiphon: VPN SSH and HTTP proxies VPN’s: Give access to private networks as if you were connected directly All above circumvention systems use proxies and can be detected and blocked by censors CDNBrowsing: Makes use of CDN platforms share a set of IP addresses Can still be detected by censors and blocked Website fingerprinting attacks on CDN Browsers Allows Censors to block circumvention attempts

Background –Content Delivery Network

Background CDNBrowsing CDNBrowsing Advantages IP filtering is no use Can only browse content hosted on CDNs No Proxies, just edge servers Location of edge servers CDNBrowsing Advantages Better QoS Lower cost of operation Better sustainability Doesn’t rely on third party entities to run proxies Ease of deployment CDN: Content delivery network

Background Circumvention detection methods IP filtering (doesn't usually work on CDNBrowsing) DNS interference (arbitrary edge browser to host web page mitigates this) Deep Packet Inspection Keyword/URL filtering Generally stopped by HTTPS encryption but we will talk about leakage in the next slide

Problem Content publishers need to delegate TLS certificates to edge servers Destination leakage in CDN HTTPS deployment leading to detection Shared TLS certificates CDN Domain certificates are when CDN provider obtains a certificate to certify its wildcard domain. CDN customer just needs to use subdomain to publish content SAN (Subject alternative name) certificate is an X.509 extension that allows multiple domain names to be included on a single certificate Individual TLS certificates SNI (server name identification) is an extension to the TLS protocol that allows a web server hosting multiple HTTPS domain names to return an individual TLS cert to a client requesting one of these domains Dedicated IP addresses are set to specific IP addresses to each of their customers allowing them to serve individual certificates for their customer content publishers Leakage: TLS certificates returned by an edge browser may reveal the customers domain name which allows the censors to use DPI SNI field carries the domain name in plain text, so censorship of forbidden domain names works Dedicated IP’s allow censors to identify forbidden CDNBrowsing connections based on the mapping between IP address and the forbidden customers (IP address filtering)

Problem Domain based website fingerprinting Webpages consist of CSS, JavaScript objects and advertisements Browser makes multiple HTTP requests to load a webpage Fingerprint based on the number of packets it exchanges with various domains

Solution: CDNReaper New CDNBrowsing system that Protects against discovery Rserver: local proxy ProxyServer: MITM interception Locally generated/privately stored trusted cert. Resolver: replaced Domain name with IP Scrambler: drops or adds traffic Bootstrapper: obtains CDN browser info Local Database: caches how to deal with connection

Solution CDNReaper applies one or more of the following techniques based on hosting CDN If the shared edge server of the CDN accept HTTPS requests for arbitrary customer websites, ask forbidden content from an arbitrary edge server. Edge server will respond with a CDN wildcard domain certificate If the dedicated edge servers accept HTTPS requests for other customer websites, contact the dedicated IP address of a non forbidden domain to request content for forbidden domain If edge servers allow connections to have empty SNI fields, remove the SNI entry in forbidden HTTPS connections If the edge servers allow non-matching SNI entries, replace a forbidden connections SNI with a non- forbidden domain name

Solution Removing HTTPS leakage Defeats traffic analysis Not one size fits all SNI leakage: CDNReaper replaces forbidden domain names with non forbidden names Deterministic IP addresses: HTTPS website can be accessed through edge servers. CDNReaper picks the edge server IP address TLS leakage: above mitigation also mitigate TLS leakage Defeats traffic analysis Scrambler modifies traffic by injecting decoy requests or removing redundant traffic from other domains

Solution Extend CDNBrowsing Classifying internet sites 6% Class 1: full CDN, protected HTTPS 7% Class 2: Full CDN, leaking HTTPS 15% Class3: full CDN, HTTPS only 64% Class 4: Partial CDN Class 5: private CDN 7% Class 6: non CDN Supporting partial CDN webpages Content wrappers Dynamic mirroring of dynamic non-CDN content Designed “MirrorMySite” User creates Heroku account and enter URL to be mirrored

Solution Supporting private CDN’s Use instances of sibling content publishers who share private CDNs and use the non-censored publishers to access forbidden content publishers

Criticism Overall very good results for censorship circumvention Bootstrapper for CDNReaper ISSUE: There is still 6% of webpages that have no content hosted by shared CDN, or is private CDN, so the unavailable webpage would be stored in Local Database as unavailable, or if there is insufficient information. IMPROVEMENT: Perhaps when that webpage has been accessed a certain number of times, analytics could be sent to them to show how many users they’re losing due to no CDN hosting/lack of information Dropping Traffic ISSUE: Advertisements and analytic requests have little impact on user experience so could be dropped to combat domain based website fingerprinting. This could cause websites to decrease CDN hosting? IMPROVEMENT: The client can modify the list of advertisement and analytics that can’t get dropped so this list should be updated regularly with a lower limit of advertisements that have to stay on the website Available for Chrome and Firefox Future work would be to implement CDNReaper as other browser plugins Comments on the article Limitation of proposed idea and how to overcome it Limitation should be my own, not one that’s already listed in the article

Thank you Questions??