How China Is Blocking Tor

نویسندگان

  • Philipp Winter
  • Stefan Lindskog
چکیده

Abstract. Not only the free web is victim to China’s excessive censorship, but also the Tor anonymity network: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose countermeasures. Our work bolsters the understanding of China’s censorship capabilities and thus paves the way towards more effective evasion techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How the Great Firewall of China is Blocking Tor

Internet censorship in China is not just limited to the web: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose circumvention techniques. Our work bolsters the understanding of China’s censorship ...

متن کامل

Tor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk)

Tor is a free-software anonymizing overlay network that helps people around the world use the Internet in safety. Tor’s 2500 volunteer relays carry almost 10Gb/s of traffic for several hundred thousand users each day. While many in the research community know Tor as the primary fielded system in the anonymous communications literature [2], Tor has also played a central role in recent research o...

متن کامل

Detecting Censor Detection

Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls. We examine a specific case, that of obfuscated Tor bridges, and conduct experiments designed to discover how long it takes censors to block them (if they do block at all). Through a year’s worth of active measurements from China, Iran, Kazakhs...

متن کامل

Censors' Delay in Blocking Circumvention Proxies

Censors of the Internet must continually discover and block new circumvention proxy servers. We seek to understand this process; specifically, the length of the delay between when a proxy first becomes discoverable and when it is actually blocked. We measure this delay in the case of obfuscated Tor bridges, by testing their reachability before and after their introduction into Tor Browser. We t...

متن کامل

Blocking in Tor with Trusted Computing ( Short Paper : Work in Progress ) ∗

How does one block an anonymous user hiding behind an anonymous routing network? In this paper, we outline a security protocol that uses resourceconstrained trusted hardware to facilitate anonymous IP-address blocking in anonymizing networks such as Tor. Tor allows users to access Internet services privately by using a series of Tor routers to obfuscate the route from the client to the server, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1204.0447  شماره 

صفحات  -

تاریخ انتشار 2012