you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.”
onion routing project of the U.S. Naval Research Laboratory • Developed for the primary purpose of protecting government communications • The source code was released in 2002, the design paper was published in 2004
https://webstats.torproject.org/ • Anomaly-based censorship-detection system: https://metrics.torproject.org/ • Unblocking of the Tor Project website • Increase in emails sent to the Tor help desk at [email protected]
torproject.org • Smartfilter/Websense (2006): Tor used HTTP for fetching directory info, cut all HTTP GET requests for “/tor/...” • Iran (2009): throttled SSL traffic, got Tor for free because it looked like Firefox +Apache
have been blocked for a while • GFW will identify a Tor connection, initiate active scanning, attempt to establish a Tor connection with the destination host and, if successful, block the IP:port. • Private bridges are blocked as soon as a user in China connects
the Tor Project website, along with other legitimate sites, was found to be filtered by a number of mobile operators • Vodafone, Three, O2, and T-Mobile in the UK, as well as T-Mobile in the US • See http://ooni.nu/, the Tor Project blog, and the Mobile Internet Censorship report by the Open Rights Group for details
2011), DPI on SSL certificate expiration time (Sept 2011) • Iranian government ramped up censorship in three ways: deep packet inspection of SSL traffic, selective blocking of IP addresses, and some keyword filtering • Preparing for a “halal” Internet, first phase of this project will be rolled out in the beginning of September
IPsec, PPT-based technologies, and some SSL-based VPNs • Fingerprints Tor on the TLS client cipher list in the ClientHello record, parts of the Tor TLS server record, and probably more • Will want to reanalyze the data we have from this blocking event
only looking for Tor TLS server hellos sent by relays or bridges to Tor clients • Since the middle of July, DPI devices are also looking for TLS client hellos as sent by Tor clients < version 0.2.3.17-beta
as Etisalat, started blocking Tor using DPI on June 25 2012 • We are still analyzing the data from this blocking event • Tor bridges with a patch that removes 0x0039 from SERVER_CIPHER_LIST seem to work, so does Obfsproxy
one user in the Philippines, he was able to successfully connect to Tor without using a bridge • We have no other data about this blocking event, apart from the metrics user graph
must now include a whitelisted public key • Self-signed certificate will display a warning, incorrect certificate will fail hard • XP prior to SP3 will have issues with SHA256 signed certificates, including the one for torproject.org
events around the world, circumvention research, useful tools, etc • Contains information about all the blocking events I have covered today, minus Wireshark network captures • https://trac.torproject.org/projects/tor/ wiki/doc/OONI/censorshipwiki
easier to change how Tor traffic looks on the network, requires volunteers to set up special bridges • FlashProxy, StegoTorus, SkypeMorph, Dust • https://www.torproject.org/projects/ obfsproxy.html.en
Interference project • Can be used to collect high-quality data about Internet censorship and surveillance • Will eventually be able to determine how different DPI devices are blocking Tor