Bootstrapping Communications into an Anti-Censorship System
نویسندگان
چکیده
Adversary-resistant communication bootstrapping is a fundamental problem faced by many circumvention (anti-censorship) systems such as Tor. Censoring regimes actively harvest and block published Tor entry points and bridge nodes. More recently, some countries have resorted to reactive (follow-up) probing of the destination hosts of outbound encrypted traffic to identify unpublished Tor nodes. We present the design of a new architecture for bypassing censorship, called DEFIANCE, that extends Tor with resilience to both active harvesting and network scanning attacks. The first goal is accomplished using the DEFIANCE Rendezvous Protocol (RP), and the second is achieved using a novel handshake that we call Address-Change Signaling (ACS). We describe prototype implementations of both components, discuss the limits of our architecture, and evaluate what it would take for a determined adversary to defeat our system. While we develop our prototype components over Tor, their design can be easily extended to other circumvention systems.
منابع مشابه
CORDON—A Taxonomy of Internet Censorship Resistance Strategies
We present a taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and implemented systems. We categorize the strategies into the following six types to form the CORDON taxonomy: Collateral damage, where the damage caused by censorship would outweigh its benefits; Outside scope of influence, where the censor is powerless to act due to it having n...
متن کامل, Nathan Malkin , Ganesh Iyer , Serge Egelman , and David Wagner Tor ’ s Usability for Censorship Circumvention
Tor has grown beyond its original purpose as an anonymity tool and has become a widely-used cen sorship circumvention tool. This is the first study to ex amine Tor’s usability in this role. We evaluate, design, and test the Tor configuration interface by placing users in simulated censorship environments, instructing them to use Tor to circumvent censorship, and measuring their interactions w...
متن کاملTechnical analysis of the Ultrasurf proxying software
Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a technical analysis of the Ultrasurf software and network. We present the results of reverse engineering the Ultrasurf client program, give an in-depth study of the known Ultrasurf network, especially those portions that interface in some way with the client or the Internet, and discuss network...
متن کاملCommunications Disruption & Censorship under International Law: History Lessons
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communication...
متن کاملA Taxonomy of Censors and Anti-Censors: Part I-Impacts of Internet Censorship
The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of new...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012