climbing china's great firewall · in most cases chinese alternatives to popular websites...

39
Climbing China’s Great Firewall Adam Casey Department of Computer Science University of Minnesota Morris UMM CSci Senior Seminar Conference April 15th 2018 Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 1 / 39

Upload: others

Post on 11-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Climbing China’s Great Firewall

Adam Casey

Department of Computer ScienceUniversity of Minnesota Morris

UMM CSci Senior Seminar Conference

April 15th 2018

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 1 / 39

Page 2: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Overview

People inside of China cannot access popular sites such as Facebook

In most cases Chinese alternatives to popular websites exist

Tools are being developed and updated by citizens to navigate aroundcensorship

At the same time the Chinese government is developing moreadvanced censorship tools

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 2 / 39

Page 3: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 3 / 39

Page 4: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 4 / 39

Page 5: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Introduction

Citizens in countries such as Syria, Iraq, Iran and China experiencegovernment internet censorship

1.3 Billion people live in China

China’s internet censorship mechanism referred to as the GreatFirewall of China (GFW)

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 5 / 39

Page 6: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 6 / 39

Page 7: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 7 / 39

Page 8: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

What is a DNS request?

What is a TCP packet?

Three-Way Handshake

Connection Termination

TCP Control Block (TCB)

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 8 / 39

Page 9: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

What is a DNS Request

Figure: Simplified diagram of a DNS request taken from [Ric]Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 9 / 39

Page 10: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

What is a TCP Packet?

Data broken up into discrete parts called packets

Each packet has a header, the data payload, and sometimes a trailerfor error correction

Header indicates type of packet, what port it’s heading to and otherdata

Each packet has a time to live or TTL

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 10 / 39

Page 11: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

What is a TCP Header?

Figure: Diagram of a TCP Header taken from [unk18]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 11 / 39

Page 12: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

What is a TCP Header?

Figure: Diagram of a TCP Header taken from [unk18]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 12 / 39

Page 13: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

What is a TCP Header?

Flag

Bit 107 109 110 111

ACK RST SYN FIN

Figure: Close-up of the relevant flags

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 13 / 39

Page 14: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

Three Way Handshake

Figure: TCP Three Way Handshake taken from [FHHC16]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 14 / 39

Page 15: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

Connection Termination

Figure: Diagram of TCP connection termination taken from [Unkb]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 15 / 39

Page 16: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundThe TCP Protocol

TCP Control Block

Data structure created by the TCP protocol

Keeps track of multiple connections outgoing and incoming

TCB control block on GFW used in combination with packetinspection to terminate connections with sensitive keywords

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 16 / 39

Page 17: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 17 / 39

Page 18: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundCDNs

Content Delivery NetworkRun by third party companies

Figure: CDN layout taken from [unka]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 18 / 39

Page 19: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 19 / 39

Page 20: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

BackgroundTor

Figure: Diagram of Tor nodes take from [Des16]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 20 / 39

Page 21: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 21 / 39

Page 22: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 22 / 39

Page 23: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

INTANGStrategies

Tool developed by Wang et al.

Packet manipulation

False TCB creation

TCB teardown

Data reassembly

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 23 / 39

Page 24: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

INTANGStrategies

False TCB creation

Send SYN insertion packet with modified sequence number

Packet has low TTL and/or wrong checksum and will not beaccepted by server

Initiate connection with correct sequence number

Traffic will be ignored by GFW due to unexpected sequence number

Each packet is given a default Time to live (TTL)

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 24 / 39

Page 25: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

INTANGStrategies

TCB Teardown

Uses the same idea as false TCB creation to create packets that arerejected by server

Packet has low TTL and/or wrong checksum and will not beaccepted by server

TCB on GFW will be torn down when it recieves RST, RST/ACK orFIN packet

Connection to server kept alive

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 25 / 39

Page 26: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 26 / 39

Page 27: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

INTANGResults

Do INTANG’s strategies actually work?

77 websites

50 trials eachIMC ’17, November 1–3, 2017, London, UK

Vantage Points Strategy Success Failure 1 Failure 2Min Max Avg. Min Max Avg. Min Max Avg.

Inside China

Improved TCB Teardown 89.2% 98.2% 95.8% 1.7% 6.7% 3.1% 0.0% 5.4% 1.1%Improved In-order Data Overlapping 86.7% 97.1% 94.5% 2.9% 8.9% 4.4% 0.0% 5.2% 1.1%TCB Creation + Resync/Desync 88.5% 98.1% 95.6% 1.9% 7.0% 3.3% 0.0% 5.5% 1.1%TCB Teardown + TCB Reversal 90.2% 98.2% 96.2% 1.7% 5.6% 2.6% 0.0% 5.7% 1.1%INTANG Performance 93.7% 100.0% 98.3% 0.0% 3.0% 0.9% 0.0% 3.5% 0.6%

Outside China

Improved TCB Teardown 85.6% 92.9% 89.8% 4.6% 7.6% 6.8% 0.3% 6.8% 3.5%Improved In-order Data Overlapping 89.4% 96.0% 92.7% 1.3% 6.2% 3.6% 0.6% 7.0% 3.7%TCB Creation + Resync/Desync 78.1% 95.6% 84.6% 2.4% 18.6% 12.9% 0.9% 4.0% 2.6%TCB Teardown + TCB Reversal 84.6% 93.1% 89.5% 5.5% 8.7% 7.1% 0.1% 7.9% 3.3%

Table 4: Success rate of new strategies

evolved GFW devices to “re-transition” into the resynchronizationstate.

We combine the TCB Reversal strategy with the TCB Teardownwith RST strategy. Speci�cally, as shown in Fig. 4, we �rst send afake SYN/ACK packet from the client to the server to create a falseTCB on the evolved GFW device. Next, we establish the legitimate3-way handshake, which invalid with respect to the evolved GFWdue to the existing TCB. Then we send a RST insertion packet toteardown the TCB on the old GFW model, followed by the HTTPrequest.

Avoiding interference from middleboxes or server. Whencrafting “insertion” packet, we choose the insertion packets wiselyso as to not experience interference from the middleboxes, and notresult in side-e�ects on the server. We primarily use TTL-basedinsertion packets since it is generally applicable. The key challengehere is to choose an accurate TTL value to hit the GFW, whilenot hitting server-side middleboxes or servers. We do that by �rstmeasuring the hop count from the client to the server using away similar as tcptraceroute. Then, we subtract a small � from themeasured hop count, to try and prevent the insertion packet fromreaching (hitting) the server-side middleboxes or the server. Inour evaluation, we heuristically choose � = 2, but INTANG caniteratively change this to converge to a good value.

In addition, we exploit the new MD5 and old timestamp insertionpackets, which allow the bypassing of the GFW without interferingwith middelboxes or the server. Table 5 summarizes how we chooseinsertion packets for each type of TCP packet.

Packet Type TTL MD5 Bad ACK TimestampSYN �RST � �Data � � � �

Table 5: Preferred construction of insertion packets

Results. We �rst analyze the results for individual evasion strate-gies. As seen from Table 4, the overall “Failure 2” rate is as low as1% for all the strategies, which (a) show that our new strategieshave a high success rate on the GFW which suggests that (b) ourhypotheses with regards to the GFW evolution seem accurate.

We �nd that both the Failures 1 and Failures 2 always happenwith regards to a few speci�c websites/IPs. One can presume that

this is caused by some unknown GFW behavior or middlebox in-terference. However, since these cases are not sustained (are veryrare), we argue that this is more likely to be due to middleboxinterference.

Overall, we �nd that high Failure 1 rates is the major reasonfor overall low success rates. An introspective look suggests thatbecause some servers/middleboxes accept packets regardless of the(wrong) ACK number or the presence of the MD5 option header,Failures 1 happen. Further, the TTL chosen is sometimes inaccuratedue to (a) network dynamics or (b) hitting server-side middleboxes;this results in undesired side-e�ects that increase “Failures 1”.

In addition, we �nd that for vantage points outside China, theTTL discrepancy unfortunately has a signi�cant drawback. Whenaccessing the servers in China, the GFW devices and the desiredservers are usually within a few hops of each other (sometimes co-located). As a result it is extremely hard to converge to a TTL valuefor the insertion packet, that satis�es the requirement of hitting theGFW but not the server. As a consequence, in these scenarios, useof this discrepancy can cause either type of failures. We see fromTable 4 that both the Failure 1 and Failure 2 rates are on average abit higher than for the vantage points inside China.

Finally, because INTANG can choose the best strategy and in-sertion packets for each server IP based on historic results, we alsoevaluated INTANG performance in an additional row in Table 4 forvantage points inside China. It shows an average success rate of98.3% which represents the performance with the optimal strategyspeci�c to each website and network path. This is without furtheroptimizing our implementation (e.g., measuring packet losses andadjusting the level of redundancy for insertion packets).

Take away: While we do magnify the causes for failures, thebiggest take away from this section is that our new hypothesizedbehaviors of the GFW seem to be fairly accurate, and that thenew strategies are seemingly very e�ective in realizing the goal ofevading the GFW, especially when the best strategies are chosenaccording to websites and network paths.

7.2 Evading TCP DNS CensorshipThe GFW censors UDP DNS requests with DNS poisoning. It cen-sors TCP DNS requests by injecting RST packets just like how itcensors HTTP connections. Thus, our evasion strategies can alsobe used to help evade TCP DNS censorship. As discussed in §6,INTANG converts UDP DNS requests into TCP DNS requests. To

124

Figure: Packet manipulation strategy success rates taken from [WCQ+17]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 27 / 39

Page 28: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 28 / 39

Page 29: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 29 / 39

Page 30: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

CachebrowserOverview

Tool developed by John Holowczak and Amir Houmansadr

Browses through CDNs for cached content

Gets around IP address filtering

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 30 / 39

Page 31: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

CachebrowserCDNs

Multiple websites at one IP

IPs change very frequently (sometimes as frequently as once a minute)

One website’s content is on multiple different edge servers to ensurequick access

Figure: CDN layout taken from [unka]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 31 / 39

Page 32: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

CachebrowserStrategies

Keeps and internal database of CDN hosted alternatives to websites

Makes requests to free unblocked DNS resolver website

If request to DNS resolver fails makes request to remote server usingSWEET

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 32 / 39

Page 33: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 33 / 39

Page 34: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

CachebrowserResults

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 200.0

0.5

1.0

1.5

2.0

2.5

Dow

nloa

dTi

me

(s)

0.0670.0720.073

0.277 0.1360.4360.3990.4150.389

0.5350.538 0.409

0.7260.849

1.9881.275

0.1671.040

0.4930.5350.536

Default Alt. Edge Server

(a) Akamai

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 200.0

0.2

0.4

0.6

0.8

1.0

1.2

1.4

1.6

Dow

nloa

dTi

me

(s)

0.0490.054

0.1110.049

0.4050.4050.405

0.0480.0490.049

0.7871.178

0.3360.333

0.9220.9110.915

0.0500.407

0.3400.049

Default Alt. Edge Server

(b) EdgeCast

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 200.0

0.5

1.0

1.5

2.0

Dow

nloa

dTi

me

(s)

0.2450.608

1.1591.675

0.6151.601

0.7210.736 0.572

1.7890.694

0.7150.7150.728

0.9360.260

0.3000.226

0.2450.283

0.233

Default Alt. Edge Server

(c) Amazon CloudFront

Figure 3: Comparing download time of a CDN content object from the “best” edge server returned by mapping system vs.other edge servers. The alternative edge servers are chosen to be geographically far distanced from the end-user.

istockphoto.com

nbc.com

facebook.com

Facebook Object

pinterest.com

theatlantic.com

0.0

0.5

1.0

1.5

2.0

2.5

3.0

Dow

nloa

dTi

me

(s)

0.910

0.479

0.000

1.124

0.245 0.049

1.397 1.204

0.467

1.329

0.704

0.340

Non-Censored CacheBrowser

(a) Client in China

istockphoto.com

nbc.com

facebook.com

Facebook Object

pinterest.com

theatlantic.com

0.0

0.5

1.0

1.5

2.0

2.5

3.0

Dow

nloa

dTi

me

(s)

0.424

0.067

0.193 0.011

0.245 0.049

0.878

0.493

0.477

0.457

0.704

0.704

2.534

2.381 2.218

1.504 1.349

1.349

Non-Censored CacheBrowser Tor

(b) Client in Amherst, MA, U.S.

Figure 4: Comparing download latency for several websites using three methods: non-censored (regular) download, usingCacheBrowser, and using Tor. We were not allowed to run Tor on our Chinese client. Also, in our China experiments, thereis no “Non-censored” measurement for facebook.com, which is blocked, and we use the HTTPS version of istockphoto.comfor its “Non-censored” measurement (it is blocked by keyword filtering only). All the other websites are not blocked in China.

in order to block forbidden content as well as to detect anddisable the use of any censorship circumvention system likeCacheBrowser. However, we assume that the censors are ra-tional, i.e., they refrain from any actions that will interferewith non-prohibited Internet activities of a significant num-ber of their non-circumvention citizens. In particular, weassume that the censors do not block all encrypted tra�cas encryption is essential for various popular non-forbiddenInternet services. Additionally, we assume that the cen-sors do not entirely block a commercial CDN provider (e.g.,by IP blacklisting all edge servers) merely because it servessome prohibited content publishers, since the CDN providerwill likely be hosting many non-forbidden content publish-ers as well. The censors, however, may perform —selective—blocking of CDN domain names and encrypted tra�c.

We assume that commercial CDN providers do not co-operate with censored users nor with content publishersin order to circumvent censorship, as this may jeopardizetheir business interests with economically-powerful state-level censors like China. A CDN provider may cooperatewith the censors, however, the cooperation is constrained tonot violate the jurisdiction of the CDN’s home country aswell as its business interests in other parts of the world. Forinstance, as we analyzed in Section 3, Akamai only partially

cooperates with the GFW in order to protect its business in-terests and reputation in other (non-censored) regions. Weassume that the CDN providers fully controlled by the cen-sors (e.g., Chinese CDN providers) will not even host anyforbidden content.

In this paper, we do not consider unobservability againstactive attacks and tra�c analysis, but discuss the challengesand possible solutions in the rest of this section.

6.2 PrivacyPrivacy form Circumvention Provider Proxy-basedcircumvention systems like Tor, Psiphon, and VPNs exposetheir users to significant privacy risks from the circumven-tion providers. For instance, malicious Tor relays can per-form a toolset of attacks [31] to comprise Tor users’ privacy,and a malicious VPN service (e.g., one run by a repres-sive government to spy on dissidents) can learn the users’browsing activities and even the content of their communi-cations. Such risks do not apply to CacheBrowser due to itspublisher-centric approach, i.e., no proxy is used.

A CacheBrowser client may use a remote Bootstrapper,e.g., the email-based system described earlier. The remoteBootstrapper can not see the content of the client’s commu-nications, but may learn the destinations she browses. Even

79

Figure: Graph of Cachebrowser latency versus alternative methods taken from[HH15]

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 34 / 39

Page 35: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Outline

1 Introduction

2 BackgroundThe TCP ProtocolCDNsTor

3 INTANGStrategiesResults

4 CachebrowserStrategiesResults

5 Conclusions

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 35 / 39

Page 36: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Conclusions

All discussed methods work so what is best?

Tor works in a way that makes viable in the long term, but it iscomparatively slow

INTANG works well for now but the GFW could be modified

Cachebrowser works only for content hosted on a CDN

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 36 / 39

Page 37: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

Conclusions

All discussed methods work so what is best?

Tor works in a way that makes viable in the long term, but it iscomparatively slow

INTANG works well for now but the GFW could be modified. Doesnot avoid IP address filtering.

Cachebrowser works only for content hosted on a CDN

Questions?

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 37 / 39

Page 38: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

References I

Nandan Desai, Unclosing the dark web - post 2, jun 2016.

Cheng-Yu Tsai Wei-Tai Cai Chia-Hao Lee Fu-Hau Hsu,Yan-Ling Hwang and KaiWei Chang, Trap: A three-way handshakeserver for tcp connection establishment, Nov 2016.

John Holowczak and Amir Houmansadr, Cachebrowser: Bypassingchinese censorship without proxies using cached content, Proceedingsof the 22Nd ACM SIGSAC Conference on Computer andCommunications Security (New York, NY, USA), CCS ’15, ACM,2015, pp. 70–83.

Robert Rich, Anatomy of a web request.

unknown, How content delivery networks work.

Unknown, Network programming in linux.

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 38 / 39

Page 39: Climbing China's Great Firewall · In most cases Chinese alternatives to popular websites exist Tools are being developed and updated by citizens to navigate around censorship At

References II

unknown, Transmission control protocol, Mar 2018.

Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, andSrikanth V. Krishnamurthy, Your state is not mine: A closer look atevading stateful internet censorship, Proceedings of the 2017 InternetMeasurement Conference (New York, NY, USA), IMC ’17, ACM,2017, pp. 114–127.

Adam Casey (University of MN Morris) Climbing China’s Great Firewall April 15th 2018 39 / 39