Top Banner
Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoo ng for Censorship-Resistant Web Browsing
26

Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Dec 24, 2015

Download

Documents

Lauren Smith
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Jeremiah O’ConnorCS 683 Fall 2012

CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing

Page 2: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Main Problem!• Civil Liberties and Freedom of Information,

Big Brother• Oppressive regimes view information as a

huge threat to their corrupt ideals– Freedom of Information is “dangerous”

• Challenge: how to direct legitimate users to redirection proxies while preventing censors, who may pose as insiders, from discovering the proxy address and blocking them?

Page 3: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Main Culprit• Primary censor of article is China

– Blocks great amount of info (once blocked Gmail), Facebook, news sites, etc.

Page 4: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

HELP ME!!!!

Page 5: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

CensorSpoofer to the Rescue!!• Modern Framework for censorship- resistant web

browsing • Tackles challenge by taking advantage the

asymmetric nature of web browsing traffic and employing IP Spoofing– Separate the upstream (client to server)

and downstream (server to client) channels

-upstream: low bandwidth indirect channel messages (URLs), -downstream: high bandwidth direct

channel for downloading content

Page 6: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

About CensorSpoofer• To get past proxy, users typically use a redirection

proxy allowing users ability to access blocked sites.• Key: use IP address spoofing (packets with forged IP

address) to send data from proxy to user without revealing origin of proxy

• To avoid being identified by censor, CensorSpoofer impersonates an encrypted VoIP (Voice over IP) session to channel downstream data

• Authors explore additional steps to be taken to avoid detection (choosing a reasonable fake IP source address)

• Experiments show prototype can be successfully used for browsing while resisting blocking efforts by censors

Page 7: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Related Work• To bypass Internet censorship, systems such

as Dynaweb/freegate, Ultrasurf, and Psiphon created

• Others ways: Infranet, Tor, Triangle Boy• Based on simple idea: let user connect to one

of the proxies deployed outside the censor’s network, which can retrieve blocked web pages for the users

• However…still vulnerable to “Insider Attack”– censor pretends to be an ordinary user to locate the

proxies and then block them

Page 8: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Threat Model• State-level adversary (censor) who monitors the

network under its jurisdiction• Censor capable of IP filtering, deep packet

inspection, and DNS hijacking, and able to monitor, block, alter, and inject traffic anywhere in network

• Censor allows citizens basic access:– IM, Email, and VoIP– blocking basics would lead to economic losses and

political pressure

• Censor unwilling to interfere with internet connections of user, unless there is evidence the connection used to bypass censorship

Page 9: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

System Goals• CensorSpoofer goals:

– Unblockability: censor unable to block CensorSpoofer without sustaining unacceptable costs

– Perfect resistance to insider attacks: the censor should not be able to break unblockability or unobservability of CensorSpoofer even if almost all users are compromised

– Low Latency (time delay): be able to fetch and deliver web pages for users with low latency (does not support javascript)

– Deployability: be depoloyable by people with limited resources, without having support from network infrastructure

Page 10: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Overview CensorSpoofer Framework• Overview: In censored countries, users

cannot visit blocked websites and must connect to external proxies to access these websites

• Author’s Insights: For Web Browsing Upstream Traffic (ex. URLs), much lighter-weight than the downstream traffic

• Author’s design: Based on insights, author’s design a new circumvention framework for web browsing, uses asymmetric communication with separate upstream/downstream channels

Page 11: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

CensorSpoofer Framework• User pretends to communicate with an external dummy host

legitimately, and sends URLs to spoofer via low bandwidth indirect channel. Spoofer fetches blocked webpages, and injects censored data into the downstream flow towards the user by spoofing the dummy host’s IP

Page 12: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Downstream (Server to Client) Channel

• To hide spoofer’s IP address, author’s apply IP spoofing in the downstream flow

• What kind of traffic (TCP or UDP) for IP Spoofing?

• Authors focus on UDP traffic for IP spoofing

Page 13: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Upstream (Client to Server) Channel• To send upstream messages, each

user uses a steganographic (hiding data) channel embedded in indirect communications such as IM and Email

• Important challenge to address, possibility that the censor will perform blocking based on the recipients IM identifier or Email address

Page 14: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Design of CensorSpoofer

• CensorSpoofer framework able to be instantiated using various protocol choices– Designed based on VoIP

Page 15: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Background of SIP-based VoIP• VolP Internet service that transmits Voice

over IP based networks• SIP is one of most popular used VoIP

signal protocols, lightweight• Insert picture here• SIP is an application layer protocol

– 3 main elements in SIP systems• User agents• Location Services• Servers

Page 16: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Sketch of Prototype Implementation

• Spoofer prototype has 4 components: a SIP message handler, a RTP/ RTCP transmitter, an upstream message receiver, and a prefetching proxy

• Client: implemented client-side HTTP proxy to handle HTTP requests made by user’s browser and HTTP responses received from the RTP channel

Page 17: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Censorship Circumvention• Outline of Circumvention:

– 1. Client initializes SIP (Session Initiation Protocol) session with Spoofer by sending out normal INVITE message

– 2. After receiving message, Spoofer randomly selects dummy host and replies with manipulated OK message that looks like its from dummy host

– 3. When OK message comes, clients starts to send enctypted RTP/RTCP packets to client by spoofing dummy hosts IP address

– 4. Meanwhile clients sends URLs through a steganographic IM/Email channel to the spoofer

– 5. Spoofer fetches web pages and puts them into RTP packet payloads and sends them to client

– 6. To terminate session, client sends termination signal to the spoofer over the upstream channel, spoofer then sends a BYE message (with IP spoofing) to client to close the call

• Summarized:– Invitation based BootStrapping– Manipulating the OK Message– Selection of Dummy Hosts– Traffic Pattern and Bandwidth– Packet Loss

Page 18: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Security Analysis of CensorSpoofer:

• Geolocation Analysis• User Agent && Operating Systems

(OS) Fingerprinting• Traffic Manipulation• SIP Message Manipulation

Page 19: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Geolocation Analysis– Sophisticated censor could record all

IP addresses that have been bound to particular SIP ID over time, suspicious if 2 closely conducted SIP sessions are geographically far from each other• To deal with this, instead of picking

dummy hosts randomly, spoofer can choose set of dummy hosts close to each other ( IP - Geolocation DB)

Page 20: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

User Agent && Operating Systems (OS) Fingerprinting• SIP Messages have some random

identifiers (Ex. “To tag”, “From tag”) creating fingerprint– Also contain codecs (data

encoding/decoding device) supported by user agent

• Censor may detect users communicating with spoofer based on user-agent fingerprint

• Spoofer can create many user-agent profiles based on user-agent fingerprint of spoofer

Page 21: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Traffic Manipulation• Censor can manipulate traffic flows in order to

find users accessing circumvention system• Censor can block all RTP/RTCP packets sent to

callee, and check if callee still sends messages after certain time period (VoIP phones drop call after 30 sec. automatically)

• Price of mounting attack is very high– Censor unable to tell which flow carries

censored data, must drop all VoIP flows randomly (normal VoIP conversations interrupted

Page 22: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

SIP Message Manipulation• Censor attempts to manipulate SIP messages

– Can manipulate IP of callee in OK message, and check if any RTP/RTCP packets sent to user

• Spoofer can compute short keyed hash of dummy host’s IP using SRTP session key, and put hash value into some random identifiers(“To tag”) in the OK message– User who knows session key can use embedded

hash to verify integrity of dummy host’s IP– If user detects OK message manipulated,

abandon SIP session by not sending ACK respons

Page 23: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Dummy Host Selection• To asses ease of finding dummy hosts, used port

scanning algorithm using nmap– Randomly selected 10000 IPs (outside China) from

entire IP space, according ton an IP geolocation database.

• Found 1213 IPs (12.1%) meet author’s requirements; indicating large number of usable dummy hosts

• Measured stability of dummy hosts over short period of time, and longer period of time(See graphs)

Page 24: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.
Page 25: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Performance Evaluation• Improved performance by fixing some

limitations of current implementation– Current prototype does not start sending any

packet to client until receives entire response• Removing limitations reduces download time

– Primary performance bottleneck of CensorSpoofer is RTP (Real-Time Transport Protocol) channel that carries the voice data• Answer: use higher-bandwidth downstream

channel

Page 26: Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.

Conclusion• Suggest new circumvention

framework, CensorSpoofer, by exploiting asymmetric nature of web browsing

• Implemented a proof-of-concept prototype for CensorSpoofer, and the experimental results showed that CensorSpoofer has reasonable performance for real-world deployment