cse 592 internet censorship (fall 2015) lecture 20 phillipa gill - stony brook u

21
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.

Upload: juliana-perry

Post on 18-Jan-2016

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

CSE 592INTERNET CENSORSHIP

(FALL 2015)

LECTURE 20

PHILLIPA GILL - STONY BROOK U.

Page 2: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

WHERE WE ARE

Last time:

• Alternative anonymity approaches

• Aqua• Dissent

Today:

• Review/discussion

• Covert channels

Page 3: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

REVIEW QUESTIONS – TOR BASICS

1. What does it mean to be anonymous? Informally? Formally?

2. Where might an adversary compromise an anonymity network?

3. Why is confidentiality not enough to ensure anonymity?

4. Why might law enforcement want to be anonymous?

5. Why might dissidents want to be anonymous?

6. Why do you need multiple groups to ensure anonymity?

7. What is onion routing?

8. What are some weaknesses of Tor?

Page 4: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

REVIEW – RELAY-BASED TIMING ATTACKS Why are these plots different for the different applications when we consider exit-relay or guard+exit-relay compromises but the same when we only consider guard-relay compromise?

Exit relay

Guard+Exit relayGuard relay

Page 5: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

REVIEW – AS AWARE TOR CLIENTS

• What features does LASTor use to select relays that Tor does not?

• What features does Tor used to select relays that LASTor does not?

• Why might it be a bad idea for the whole Tor network to adopt LASTor?

• What is different between LASTor and Astoria’s threat model?

• What are three fundamental challenges faced by AS-aware Tor clients?

• How does LASTor estimate network paths?

• How does Astoria estimate network paths?

• What evaluation metric does LASTor use for performance?

• What might this metric miss?

Page 6: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

WHERE WE ARE

Last time:

• Alternative anonymity approaches

• Aqua• Dissent

Today:

• Review/discussion

• Covert channels

Page 7: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

CHALLENGE

• Circumvention tools can get around censorship, but have a hard time not being observable

• Ie., they generally cannot hide the fact that users are using them

• E.g., Tor is not completely effective for circumvention because a censor can just block the IPs of known relays

• Users who are seen using these tools may face trouble from the government

• .. And the censor can leverage observability to stop the system

• Reduce availability

Page 8: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

SKYPE MORPH

• Tor obfuscation

• Disguises communication between client and Tor relay as a Skype video call.

• Pluggable transport: user can specify to disguise her traffic as a Skype video call and connect to a special SkypeMorph relay

• Basic process: Client’s Skype log in makes a “call” to the relay, but drops the call and exchanges Tor traffic over the connection.

• UDP-based implementation to match Skype.

• Improves existing traffic shaping to preserve inter-packet delay between consecutive packets

• Can perform better than regular steganography because the channel is encrypted (the data looks random anyways)

Page 9: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

GOALS

• Hard to identify: outputs encrypted traffic that resembles Skype video calls

• Hard to block: since SkypeMorph looks like Skype the censor can’t block it because they’d have to block all of Skype (unacceptable cost).

• Plausible deniability Would need to break into a users machine to prove they weren’t sending real skype traffic.

Page 10: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

BACKGROUND ON SKYPE

• Skype encrypts data using AES cipher and uses RSA certificates for authentication

• Some amount of message authentication: would not accept altered messages

• Three types of nodes ( 1) server which handles authentication; (2) normal “peer” nodes and (3) supernodes which faciliate communication for nodes behind NATs

• Some TCP connections for signaling. Client listens on a given UDP port which is customizable but will fall back to TCP if UDP fails.

• Variety of voice and video codecs to select amongst depending on bandwidth, etc.

Page 11: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

EXAMPLE OF SKYPE FLOW CONTROL

Page 12: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

SKYPE MORPH OVERVIEW

Page 13: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

RESULT

Page 14: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

FREEWAVE

Traffic obfuscation:

Hide covert traffic *within* an *actual* implementation of an application.

Server obfuscation:

Leverage oblivious participants in VOIP network

Page 15: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

NDSS 2013 17

FREEWAVE: IP OVER VOICE-OVER-IPTarget protocol: Voice-over IP (VoIP)

Why VoIP

• Widely used protocol (only 663 Million Skype users)• Collateral damage to block

• Encrypted

How to hide?

• The dial-up modems are back!

http://dedis.cs.yale.edu/dissent/papers/freewave-slides.pptx

Page 16: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

NDSS 2013 18

FREEWAVE ARCHITECTURE

ClientFreeWave

Server

http://dedis.cs.yale.edu/dissent/papers/freewave-slides.pptx

Page 17: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

THREAT MODEL + GOALS

• User connects to the Internet via a censoring ISP which precludes access to specific destinations.

• + limits access to circumvention tools• ISP does not want to compromise usability of the network

• E.g. political/economic pressures

Goals

• Unblockability: the systems needs to be unblockable by censors

• Unobservability: should hide the fact that users are using the circumvention system

• Security: anonymity, privacy and confidentiality of users need to be protected

• Deployment feasibilty: avoid dependencies on other systems (e.g ISPs)

• QoS: Needs to provide adequate bandwidth and latency appropriate for Web browsing.

Page 18: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

BASIC IDEA OF FREEWAVE

• User downloads the Freewave Client and enters her VoIP ID and makes a call to the FreeWave server (by entering its VoIP ID).

• Server is set up such that connections will go via an oblivious VoIP client (e.g., Skype supernode).

• Since VoIP connection is encrypted censor cannot ID server’s VoIP ID and censor it.

Components:

• VoIP client

• Virtual Sound Card (virtual sound card interface: any application can use it the same way a physical sound card is utilized).

• MoDem: application that translates network traffic into acoustic signals and vice versa (aka Modulator Demodulator)

• Proxy: Server uses this to relay traffic received via VoIP connections to its final destination.

Page 19: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

BASIC COMPONENTS

Page 20: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

PERFORMANCE

16-19 kbps

Page 21: CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U

NDSS 2013 23

FREEWAVE’S UNOBSERVABILITY

Traffic analysis (packet rates and sizes)

Fixed rate codecs (e.g., G.7 series)

• Not an issue Variable bit-rates (e.g., Skype’s SILK)

• Simple analysis

• Superimpose with recoded conversation