Collateral damage of Internet content blocking

Slides:



Advertisements
Similar presentations
1 Chapter 22 Network layer Delivery, Forwarding and Routing.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
© 2015 Imperva, Inc. All rights reserved. Collateral DDoS Ido Leibovich, ADC.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Practical Uses of Zabbix. Content Introduction4 Solutions by Area5 Solutions by Industry6 Unconventional Use Cases9 © Zabbix 2012 | 2.
Украина: Электронное правительство в служении демократии Щербакова Наталия 16 ноября 2007 г. Санкт-Петербург, Россия.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
 Internet Regulation  Some people think that Internet Regulations and Business exchange are the same. That is why many consider this a controversial.
1 INTRODUCTION OF THE LAWS ON ABUSE OF DOMINANT POSITION AND ABUSE OF MONOPONY POSITION IN VIETNAM Speaker: Mr. Trinh Anh Tuan Official Vietnam Competition.
Firewall and its working By Mithila Palamakula. Firewall  Sits between two networks  Used to protect one from the other  Places a bottleneck between.
Filtering in Firewall By Fantastic 5. Agenda What is Firewall? Types Of Firewall Pros and Cons Of Different Firewalls What Firewall can do? What Firewall.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Protecting Students on the School Computer Network Enfield High School.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Legal Status of Cloud Provider Kozhevnikova Yuliana Unesco Chair on copyright Institute of Legal Regulation Higher School of Economics, Moscow,
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
PERIMETER SECURITY PROTECTING THE BOUNDARIES OF YOUR INFORMATION SECURITY SYSTEM.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Chapter 4: Implementing Firewall Technologies
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security Benefits of Firewall Protection
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Internet Society © 1992–2016 Internet-related government policy, corporate decisions, and technical-development choices influence the extent to which the.
DSN (Domain Name System)
Lab A: Planning an Installation
PRESENTATION ON THE ONLINE GAMBLING - REGULATION 2 March 2012
The Disadvantages of ICT
Enabling Secure Internet Access with TMG
Towards an Evolvable Internet Architecture
Network Security Analysis Name : Waleed Al-Rumaih ID :
“Size of DNS” Size of the DNS can be describe from the time before it was created all the computer on a network used to receive a host file named HOST.TXT,
Practical Censorship Evasion Leveraging Content Delivery Networks
Click to edit Master subtitle style
Troubleshooting IP Communications
Introduction to Networking
Introduction to Networking
Firewalls.
Internet Association Japan Akio Kokubu
Chapter 5 Network and Transport Layers
Welcome To : Group 1 VC Presentation
IS4550 Security Policies and Implementation
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
All data occupies physical space, even if we don't think of it as such.
Internet Abuse by Russian LEAs
Effects of DoS.
Firewalls Purpose of a Firewall Characteristic of a firewall
IS4680 Security Auditing for Compliance
Firewalls Routers, Switches, Hubs VPNs
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Firewalls Jiang Long Spring 2002.
Implementation of ENUM on telecommunication networks
AbbottLink™ - IP Address Overview
PRESENTATION OF MONTENEGRO
(DNS – Domain Name System)
Presentation transcript:

Collateral damage of Internet content blocking ENOG14, 10.10.2017 Samorukov, Netart Group, Isavnin, Internet Protection Society

States wants to restrict access to some information (and services) to “protect citizens” (Illegality and ilicitness of content is out of the scope of this presentation). Also, non-democratic states or states with government controlled telco monopolies with possible full Internet shutdowns are not covered. Давайте посмотрим на современные, демократические государства.

The Internet Simple Network - Agile Edge inexpensive equipment ⇒ faster development Protocols developed to work, not to comply “interests”. successful protocols and solutions survives

Russia Internet was succesfully developed (nearly) without attention from state and regulations. But Internet became one of powerful media, to be ignored by state. Motivation (public or not) of legistators/regulators, exact acts are out of the scope of this presentation. Just impression and some results.

Russian content blocking (for children)

Russian content blocking legislation: content must be blocked, no matter how it’s possible regulation: let’s block content where we can regulate it (licensed companies) (no consultation to industry required) Someone heard about URL, and hostname, and IP address. order to block ineffective block even more

Technical measures RKN as illegal content registry. nontransparent procedures for adding resources to the registry really doubtful technical measures unclear and untransparent blocking supervision hardly achievable content removal Technical regulation evolution: “download registry, block as you can” to “we want you to use DPI! (from selected vendor)” Подзаконные акты могут быть прочитаны неоднозначно. Рекомендация к использованию DPI начинает попахивать одним поставщиком.

Internet Ecosystem Internet Infrastructure Content End User Delivery Access Transit

Damage by “content blocking” (everywhere) Internet Infrastructure Content End User Delivery Access Transit

Network operators Network operators trying to minimize monetary costs of blocking (network is not designed to do blocking) Block at recursive DNS Block by packet filter Forward “suspicious” packets for further investigation (proxy, DPI) … and other tricks

Technical DAMAGE Network is no longer simple DNS resolution interference (recursive is no longer recursive) More powerful network devices required (additional matching/forwarding) Additional equipment required “DPI” - computational power ~<active users>*<number resources to block> More points of failure Basic principles of Internet are broken. А ещё есть принцип про посылать консервативно, принимать лояльно. Ещё один прикол с ДПИ. Complicated recursive DNS configuration (not exactly recursive) More firewall rules Longer routing tables Expensive DPI equipment (or even inexistant)

Business DAMAGE More expensive equipment - less money for development More administrative procedure Risk of fines (remember untransparent supervision) Some markets lost - no one outside Russia need IP Transit with Russian filtering.

Malicious DAMAGE Abuse of the registry by DNS resolutions (at the start and after introduction of fines)

DAMAGE to hosting and content delivery More administrative procedures - sometimes ignored by RKN Collateral blocking (see rublacklist.net) - and CDNs and popular clouds Nontransparent removal from the registry

Reputational DAMAGE Some cases now at ECHR collateral blocking censorship-like blocking (kasparov.ru, grani.ru) abuse of power (LinkedIn, DailyMotion, Facebook to prepare)

INANITY Users can avoid, if they want Resources can dodge, is they really want No proof of blocking effectiveness: - No evidence of gay identification decrease - No evidence of drug consumption decrease - No evidence of copyright holder profits increase etc… - ...

More to come: Quasi-licensing for internet actors registry of personal data operators registry of internet-intermediaries, bloggers registry of news-aggregation services registry of online cinemas more to come!... Requirements for quasi-licensees: identify users, restrict foreign ownership, follow RKN reglaments И всё это нужно чтобы эффективнее блокироать и контроллировать.

HOT UPDATE: New order Об утверждении порядка взаимодействия Федеральной службы по надзору в сфере связи, информационных технологий и массовых коммуникаций с владельцем информационно-телекоммуникационных сетей, информационных ресурсов, посредством которых обеспечивается доступ к информационным ресурсам, информационно-телекоммуникационным сетям, доступ к которым ограничен на территории Российской Федерации в соответствии с Федеральным законом «Об информации, информационных технологиях и о защите информации», оператором поисковых систем, распространяющим в сети «Интернет» рекламу, которая направлена на привлечение внимания потребителей, находящихся на территории Российской Федерации, к федеральной государственной информационной системе, содержащей перечень информационных ресурсов, информационно-телекоммуникационных сетей, доступ к которым ограничен на территории Российской Федерации в соответствии с Федеральным законом «Об информации, информационных технологиях и о защите информации», об утверждении порядка подключения и доступа владельцев информационно-телекоммуникационных сетей, информационных ресурсов, посредством которых обеспечивается доступ к информационным ресурсам, информационно-телекоммуникационным сетям, доступ к которым ограничен на территории Российской Федерации в соответствии с Федеральным законом «Об информации, информационных технологиях и о защите информации», операторов поисковых систем, распространяющих в сети «Интернет» рекламу, которая направлена на привлечение внимания потребителей, находящихся на территории Российской Федерации, к федеральной государственной информационной системе, содержащей перечень информационных ресурсов, информационно-телекоммуникационных сетей, доступ к которым ограничен на территории Российской Федерации в соответствии с Федеральным законом «Об информации, информационных технологиях и о защите информации» и к информации, размещенной в ней, а также об утверждении режима обработки и использования информации, размещенной в федеральной государственной информационной системе, содержащей перечень информационных ресурсов, информационно-телекоммуникационных сетей, доступ к которым ограничен на территории Российской Федерации в соответствии с Федеральным законом «Об информации, информационных технологиях и о защите информации

HOT UPDATE2: Now, RKN “discusses” order on “How blockpage should and shouldn’t look like”

Тяжело жить в России без юмора.

UKRAINE Poroshenko “sanctions list”, addition to economical sanctions. No enforced requirement to block Russia-like legislation to come There are industrial associations, hope will be able to resist.

укркомнагляд-тян

Everywhere like this? (Вездетак?) НЕТ! (Что бы нам не говорили вездетакеры) Denmark Voluntary DNS filtering, (CP, Gambling, Copyright), strong IT association Czechia Not enforcable (Gambling), strong IT association Armenia Not enforcable (Gambling), strong IT association

Conclusion States, regulators, supervisory bodies does not understand and does not want to understand how Internet works. It’s time for us to come out of our comfort zone of “technical community”.

Questions?