Top Banner
Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last slide for acknowledgements!
36

Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

Dec 15, 2015

Download

Documents

Malakai Hollin
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

Censorship Resistance: Decoy Routing

Amir HoumansadrCS660: Advanced Information Assurance

Spring 2015

Content may be borrowed from other resources. See the last slide for acknowledgements!

Page 2: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

2

Classes of Information Hiding

• Digital watermarking• Steganography• Covert channels• Anonymous communications• Protocol obfuscation

CS660 - Advanced Information Assurance - UMassAmherst

Page 3: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

3

The Non-Democratic Republic of Repressistan

Gateway

Traditional circumvention

Blocked

Proxy

User’s ASXX IP Filtering

DNS HijackingDPI

Insider attaacksNetwork identifiers

DPIActive probes

Page 4: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

4

Decoy routing circumvention

• An alternative approach for circumvention– It builds circumvention into network infrastructure

• DR (Karlin et al., FOCI 2011)• Cirripede (Houmansadr et al., ACM CCS 2011)• Telex (Wustrow et al., USENIX Security 2011)

Page 5: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

Some background

Page 6: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

6

Internet topology 101

• The Internet is composed of Autonomous Systems (ASes)–An Autonomous System is a network

operated by a single organization

• 44,000 ASes are inter-connected based on their business relationships

Page 7: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

7

The Internet map of ASes

Page 8: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

8

Routing in the Internet

User’s ASCNN’s AS

Transit AS Transit AS

Page 9: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

9

The Non-Democratic Republic of Repressistan

Gateway

Decoy Routing Circumvention

Blocked

Proxy

User’s AS

Non-blocked

X

Decoy AS

Page 10: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

Cirripede

Page 11: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

11

Threat model

• Warden ISP– Monitor traffic– Block arbitrarily – Constraint: Do not

degrade the usability of the Internet• TLS is open

Client (C)

Warden ISP

Page 12: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

12Main idea

Overt Destination (OD)

Covert Destination (CD)

C

Page 13: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

13

Good ISP

Cirripede Architecture

Registration Server (RS)

Cirripede’sService Proxy

C

Deflecting Router (DR)

Page 14: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

14Client Registration

Registration Server (RS)

Good ISP

Client IP

C

OD

OD

OD

Uses TCP ISN steganography discussed earlier

Page 15: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

15

Registration

Client (C) Cirripede’s RSCollaborating DR

Page 16: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

16Covert communication

Client IP

RS

Cirripede’sService Proxy

OD

CD

C

Page 17: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

Routing Around Decoys

Schuchard et al., ACM CCS 2012

Page 18: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

18

The Non-Democratic Republic of Repressistan

Gateway

Blocked

Routing Around Decoys (RAD)

Decoy ASNon-blocked

Page 19: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

The Costs of Routing Around Decoys

Houmansadr et al., NDSS 2014

Page 20: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

20

This paper

• Concrete analysis based on real inter-domain routing data– As opposed to relying on the AS graph only

• While technically feasible, RAD imposes significant costs to censors

Page 21: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

21

• Main intuition: Internet paths are not equal!– Standard decision making in BGP aims to maximize

QoS and minimize costs

Page 22: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

22

The Non-Democratic Republic of Repressistan

Gateway

Blocked

1. Degraded Internet reachability

Decoy ASNon-blocked

Decoy AS

Page 23: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

23

Path preference in BGP

• ASes are inter-connected based on business relationships– Customer-to-provider– Peer-to-peer– Sibling-to-sibling

• Standard path preference:1. Customer2. Peer/Sibling3. Provider

Page 24: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

24

Valley-free routing

• A valley-free Internet path: each transit AS is paid by at least one neighbor AS in the path

• ISPs widely practice valley-free routing

Page 25: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

25

The Non-Democratic Republic of Repressistan

Gateway

Blocked

2. Non-valley-free routes

Decoy ASNon-blocked

Provider

Customer Provider

Page 26: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

26

The Non-Democratic Republic of Repressistan

Gateway

Blocked

3. More expensive paths

Decoy ASNon-blocked

Customer

Provider

Page 27: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

27

The Non-Democratic Republic of Repressistan

Gateway

Blocked

4. Longer paths

Decoy ASNon-blocked

Page 28: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

28

The Non-Democratic Republic of Repressistan

Gateway

Blocked

5. Higher path latencies

Decoy ASNon-blocked

Page 29: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

29

The Non-Democratic Republic of Repressistan

Gateway

Blocked

6. New transit ASes

Decoy ASNon-blocked

Edge AS

Page 30: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

30

The Non-Democratic Republic of Repressistan

Gateway

Blocked

7. Massive changes in transit load

Decoy ASNon-blocked

Transit AS

Transit AS

Loses transit traffic

Over-loads

Page 31: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

31

Simulations

• Use CBGP simulator for BGP– Python wrapper

• Datasets:– Geographic location (GeoLite dataset)– AS relations (CAIDA’s inferred AS relations)– AS ranking (CAIDA’s AS rank dataset)– Latency (iPlane’s Inter-PoP links dataset)– Network origin (iPlane’s Origin AS mapping dataset)

• Analyze RAD for– Various placement strategies– Various placement percentages– Various target/deploying Internet regions

Page 32: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

32

Costs for the Great Firewall of China

• A 2% random decoy placement disconnects China from 4% of the Internet

• Additionally:– 16% of routes become more expensive– 39% of Internet routes become longer– Latency increases by a factor of 8– The number of transit ASes increases by 150%– Transit loads change drastically (one AS increases

by a factor of 2800, the other decreases by 32%)

Page 33: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

33

Strategic placement

• RAD considers random selection for decoy ASes– This mostly selects edge ASes – Decoys should be deployed in transit ASes instead• For better unobservability• For better resistance to blocking

86% are edge ASes

Page 34: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

34

Strategic placement

4% unreachability

20% unreachability

43% unreachability

Page 35: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

35

Lessons

1. RAD is prohibitively costly to the censors– Monetary costs, as well as collateral damage

2. Strategic placement of decoys significantly increases the costs to the censors

3. The RAD attack is more costly to less-connected state-level censors

4. Even a regional placement is effective 5. Analysis of inter-domain routing requires a

fine-grained data-driven approach

Page 36: Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.

CS660 - Advanced Information Assurance - UMassAmherst

36

Acknowledgement

• Some pictures are obtained through Google search without being referenced