GFW主动探测系统研究报告

英文原文来自 https://blog.torproject.org/blog/learning-more-about-gfws-active-probing...

Roya, David, Nick, nweaver, Vern, 和我刚刚完成了关于GFW主动探测系统的研究。这个系统在几年前就被用来探测翻墙工具,比如Tor。我们在之前的博文中介绍过GFW主动探测系统是如何工作的。但有几个问题我们没有回答。比如这个系统的物理结构是怎样的。那些用来主动探测的IP是归GFW所有的么? 有猜测GFW短时间内劫持了部分IP来用来主动探测,但没有证据。这次研究回答了这些问题。

因为这个实验是网络检测,我们从收集数据开始。我们创建了3个数据库,包括了GFW主动探测的小时/月份/年份的数据。这3个不同时段的数据库让我们从不同角度了解GFW主动探测的工作原理。我们公开了其中的两个数据库,你可以重复我们的实验,或者自己分析。

  • 通常来说,如果Tor的某个网桥代理被GFW检测并封锁,它会一直被封锁。但是这意味着网桥代理完全无法访问吗? 我们让中国的VPS一直连接我们控制的网桥代理。我们发现,每25小时,中国的VPS可以短暂的连接到我们的代理网桥。下图显示了这个现象。每个数据点表示中国的VPS试图与网桥代理建立连接。中国联通和中国教育网都有这个周期性现象。有时候,网络安全设备在更新规则时会默认允许所有流量,但我们不知道GFW周期性现象是不是因为这个原因导致的。

  • 我们找到了规律,GFW主动探测的TCP头暗示那几千个IP都来自与同一个地方。下图显示了数据包的初始序号和时间。每个数据点都是一个主动探测连接。如果每个主动探测都是从不同地方发出的,我们应该看到随机的数据点,因为数据包的初始序号是随机选择的。但是下图显示主动探测连接虽然来自不同IP,但是非常有规律。我们认为主动探测的初始序号是按照时间产生的。

 

  • 我们发现GFW主动探测不仅仅针对了Tor。GFW还对 SoftEther 和GoAgent进行了主动探测。这说明主动探测系统是模块化的。GFW工程师能比较简单的对新翻墙软件改进主动探测功能。

  • GFW能(部分的)模拟  vanilla Tor protocol, obfs2, and obfs3 来主动探测网桥代理。有趣的是, node-Tor 因为是使用JavaScript 编写而导致不同的代码实现,从而对主动探测免疫。人为修改了Tor回复能躲避GFW的主动探测,但这应该不是长久之计。

  • 在2012年,主动探测系统每15分钟扫描一次。但现在,主动探测系统能实时扫描。平均来说,中国用户连接Tor网桥代理后半秒内就有主动探测连接。

  • 我们使用 traceroute 发现,GFW的主动探测系统是有状态的,但没有办法重组TCP流。

 

幸运的是,我们有 pluggable transports 来防止主动探测。ScrambleSuitobfs4 能使用预先分享的密钥来防止主动探测。 Meek 使用CDN来代理流量,虽然这不能阻止主动探测,但封锁造成的额外伤害会很大。我们在开发翻墙工具的同时需要注重可用性。大力开发的翻墙工具若很难使用,是没有价值的。这是用户界面的重要性所在。

最后,这是我们的论文数据库和代码,和研究页面。若你有任何问题和反馈,欢迎联系我们

 

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Thu, Aug 10, 2023

1.4 million people used FreeBrowser to circumvent the Great Firewall of Turkmenistan

Since 2021, the authorities in Turkmenistan have taken exceptional measures to crack down on the use of circumvention tools. Citizens have been forced to swear on the Koran that they will not use a VPN. Circumvention tool websites have been systematically blocked. Arbitrary searches of mobile devices have also taken place and have even targeted school children and teachers.

The government has also blocked servers hosting VPNs which led to “near complete” internet shutdowns on several occasions in 2022. Current reports indicate that 66 hosting providers, 19 social networks and messaging platforms, and 10 leading content delivery networks (CDNs), are blocked in the country. The government presumably is unconcerned about the negative economic impact that such shutdowns can cause.

Fri, Mar 18, 2022

Well-intentioned decisions have just made it easier for Putin to control the Russian Internet

This article is in large part inspired by a recent article from Meduza (in Russian).

Since the beginning of the war in Ukraine, Russian users have had problems accessing government websites and online banking clients. Browsers began to mark these sites as unsafe and drop the connection. The reason is the revocation of digital security certificates by foreign certificate authorities (either as a direct consequence of sanctions or as an independent, good will move); without them, browsers do not trust sites and “protect” their users from them.

However, these actions, caused - or at least triggered by - a desire to punish Russia for their gruesome actions in Ukraine, will have long-lasting consequences for Russian netizens.

Digital certificates are needed to confirm that the site the user wants to visit is not fraudulent. The certificates contain encryption keys to establish a secure connection between the site and the user. It is very easy to understand whether a page on the Internet is protected by a certificate. One need just look at the address bar of the browser. If the address begins with the https:// prefix, and there is a lock symbol next to the address, the page is protected. By clicking on this lock, you can see the status of the connection, the name of the Certification Authority (CA) that issued the certificate, and its validity period.

There are several dozen commercial and non-commercial organizations in the world that have digital root certificates, but 3/4 of all certificates are issued by only five of the largest companies. Four of them are registered in the USA and one is registered in Belgium.

Mon, Aug 03, 2020

Announcing the Release of GreatFire AppMaker

GreatFire (https://en.greatfire.org/), a China-focused censorship monitoring organization, is proud to announce that we have developed and released a new anti-censorship tool that will enable any blocked media outlet, blogger, human rights group, or civil society organization to evade censors and get their content onto the phones of millions of readers and supporters in China and other countries that censor the Internet.

GreatFire has built an Android mobile app creator, called “GreatFire AppMaker”, that can be used by organizations to unblock their content for users in China and other countries. Organizations can visit a website (https://appmaker.greatfire.org/) which will compile an app that is branded with the organization’s own logo and will feature their own, formerly blocked content. The app will also contain a special, censorship-circumventing web browser so that users can access the uncensored World Wide Web. The apps will use multiple strategies, including machine learning, to evade advanced censorship tactics employed by the Chinese authorities.  This project will work equally well in other countries that have China-like censorship restrictions. For both organizations and end users, the apps will be free, fast, and extremely easy to use.

This project was inspired by China-based GreatFire’s first-hand experience with our own FreeBrowser app (https://freebrowser.org/en) and desire to help small NGOs who may not have the in-house expertise to circumvent Chinese censorship. GreatFire’s anti-censorship tools have worked in China when others do not. FreeBrowser directs Chinese internet users to normally censored stories from the app’s start page (http://manyvoices.news/).

Fri, Jul 24, 2020

Apple, anticompetition, and censorship

On July 20, 2020, GreatFire wrote to all 13 members of the Subcommittee on Antitrust, Commercial and Administrative Law of the U.S. House Committee on the Judiciary, requesting a thorough examination into Apple’s practice of censorship of its App Store, and an investigation into how the company collaborates with the Chinese authorities to maintain its unique position as one of the few foreign tech companies operating profitably in the Chinese digital market.  

This letter was sent a week before Apple CEO TIm Cook will be called for questioning in front of the Subcommittee on Antitrust, Commercial and Administrative Law. The CEOs of Amazon, Google and Facebook will also be questioned on July 27, as part of the Committee’s ongoing investigation into competition in the digital marketplace.

This hearing offers an opportunity to detail to the Subcommittee how Apple uses its closed operating ecosystem to not only abuse its market position but also to deprive certain users, most notably those in China, of their right to download and use apps related to privacy, secure communication, and censorship circumvention.

We hope that U.S. House representatives agree with our view that Apple should not be allowed to do elsewhere what would be considered as unacceptable in the U.S. Chinese citizens are not second class citizens. Private companies such as Apple compromise themselves and their self-proclaimed values of freedom and privacy when they collaborate with the Chinese government and its censors.

Mon, Jun 10, 2019

Apple Censoring Tibetan Information in China

Apple has a long history of censorship when it comes to information about Tibet. In 2009, it was revealed that several apps related to the Dalai Lama were not available in the China App Store. The developers of these apps were not notified that their apps were removed. When confronted with these instances of censorship, an Apple spokesperson simply said that the company “continues to comply with local laws”.

In December, 2017, at a conference in China, when asked about working with the Chinese authorities to censor the Apple App Store, Tim Cook proclaimed:

"Your choice is: do you participate, or do you stand on the sideline and yell at how things should be. And my own view very strongly is you show up and you participate, you get in the arena because nothing ever changes from the sideline."

In the ten years since Apple was first criticized for working with the Chinese authorities to silence already marginalized voices, what has changed? Apple continues to strictly follow the censorship orders of the Chinese authorities. When does Tim Cook expect that his company will help to bring about positive change in China?

Based on data generated from https://applecensorship.com, Apple has now censored 29 popular Tibetan mobile applications in the China App Store. Tibetan-themed apps dealing with news, religious study, tourism, and even games are being censored by Apple. A full list of the censored apps appear below.

Subscribe to our blog using RSS.

Comments

,jf skefjkn,kf w nlosein .l
Shaandaar Full Movie Watch Online

v,j bkj bjk vlenl vinev

sjfn
Happy New Year 2016 Images

sdnb ks bksbk bj

Happy Diwali 2015 Wishes

f,j dflf lkren flkrl k

Happy Diwali 2015 Wallpapers

You all lovePlayBox HDApp

Thanks for providing us such a useful information. Keep up the good work and continue providing us more quality.

Happy New Year Shayari

Nice blog....

Merry Christmas Quotes

Great stuff...

Happy New Year Quotes

Golden Globe Awards 2016 Live Stream || @ On January 10, 2016 set the date for the 73rd Annual Golden Globe Awards by The Hollywood Foreign Press.

http://goldenglobeawards2016livestream.com/

Justin Bieber Tickets Tours & Concert Updates
http://justinbieberconcert.co/

Knock! Knock! Knock!!! Hello……!!!! We are back with a big bang award show which is Golden Globe Award 2016. Great show, some great people, beautiful and spectacularly talented actresses/actors and lots of fun, entertainment, and suspense’re to be revealed.

This award has been continuing since 1943. Group of writers gathered together to frame the Hollywood Foreign Press Association and made liberally distributed award named Golden globe Award where they play momentous role in film making. The first award was being honored on best achievement in 1943 filmmaking and was held in January 1944, at the 20th Century –Fox studios. Successively, every year ceremonies were held in different venues for decades.

Golden Globe 2016 Live Stream||@The 73rd annual Golden Globes Awards Open ceremony Live Stream by The Hollywood

Foreign Press, On January 10, 2016 from Beverly Hilton Hotel.

The Golden Globes first Academy Awards 2016

http://goldenglobeawards2016live.com/

FOR UPCOMING MOVIE: http://moviejon.com/

The Golden Globe Awards Live Stream will take place at the Beverly Hilton Hotel on January 10. But first, the

nominees must be announced! The nominations live stream is expected to begin at 8:15 a.m. Eastern Time. Stay

tuned! Angela Bassett, Chloe Grace Moretz, Dennis Quaid, and America Ferrera will all participate in the event,

revealing the nominees in more than 20 different categories spanning film and television. They’ll be joined by

Corinne Foxx, the daughter of Jamie Foxx, who was recently announced as Miss Golden Globe for the 73rd annual

Golden Globes ceremony. Bassett is a Golden Globes winner, as is Ferrera, while Quaid is a former nominee.

When everyone’s afraid of superintelligent machines taking over the world and no one can run a The Golden Globes

first Academy Awards presentation was held on May 16, 1929, at a private dinner at the Hollywood Roosevelt Hotel

with an audience of about 270 people The post-awards party was held at the Mayfair Hotel The cost of guest

tickets for that night’s ceremony was $5 dollars [$69 as of 2015] Fifteen statuettes. And Now 2016 HFPA: 73rd

Annual Golden Globe Awards – Beverly Hilton with host Ricky Gervais. – Sunday, January 10, 2016 .

And I have just completed a GFW Active Detection System. The system in a few years ago was used to detect circumvention tools, such as Tor. We are introduced in a previous blog post how GFW active detection system works. But there are several questions we did not answer. For example, the physical structure of the system is like. Those for active detection of IP is owned by GFW all of it? There is speculation GFW short time hijacked a part of the IP to be used to take the initiative to detect, but there is no evidence. This study answers these questions.

Pokemon Games

Good post
Festivals123

Happy New Year 2017 Father Mother Wishes

Read more at: http://www.shayariwishes.com/happy-new-year/happy-new-year-2017-hindi-en...

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.