Bootstrapping Communications into an Anti-Censorship System

نویسندگان

  • Patrick Lincoln
  • Ian Mason
  • Phillip A. Porras
  • Vinod Yegneswaran
  • Zachary Weinberg
  • Jeroen Massar
  • William Allen Simpson
  • Paul Vixie
  • Dan Boneh
چکیده

Adversary-resistant communication bootstrapping is a fundamental problem faced by many circumvention (anti-censorship) systems such as Tor. Censoring regimes actively harvest and block published Tor entry points and bridge nodes. More recently, some countries have resorted to reactive (follow-up) probing of the destination hosts of outbound encrypted traffic to identify unpublished Tor nodes. We present the design of a new architecture for bypassing censorship, called DEFIANCE, that extends Tor with resilience to both active harvesting and network scanning attacks. The first goal is accomplished using the DEFIANCE Rendezvous Protocol (RP), and the second is achieved using a novel handshake that we call Address-Change Signaling (ACS). We describe prototype implementations of both components, discuss the limits of our architecture, and evaluate what it would take for a determined adversary to defeat our system. While we develop our prototype components over Tor, their design can be easily extended to other circumvention systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CORDON—A Taxonomy of Internet Censorship Resistance Strategies

We present a taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and implemented systems. We categorize the strategies into the following six types to form the CORDON taxonomy: Collateral damage, where the damage caused by censorship would outweigh its benefits; Outside scope of influence, where the censor is powerless to act due to it having n...

متن کامل

, Nathan Malkin , Ganesh Iyer , Serge Egelman , and David Wagner Tor ’ s Usability for Censorship Circumvention

Tor has grown beyond its original purpose as an anonymity tool and has become a widely-used cen­ sorship circumvention tool. This is the first study to ex­ amine Tor’s usability in this role. We evaluate, design, and test the Tor configuration interface by placing users in simulated censorship environments, instructing them to use Tor to circumvent censorship, and measuring their interactions w...

متن کامل

Technical analysis of the Ultrasurf proxying software

Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a technical analysis of the Ultrasurf software and network. We present the results of reverse engineering the Ultrasurf client program, give an in-depth study of the known Ultrasurf network, especially those portions that interface in some way with the client or the Internet, and discuss network...

متن کامل

Communications Disruption & Censorship under International Law: History Lessons

With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communication...

متن کامل

A Taxonomy of Censors and Anti-Censors: Part I-Impacts of Internet Censorship

The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of new...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012