Ignoring the Great Firewall of China



Similar documents
Ignoring the Great Firewall of China

Ignoring the Great Firewall of China

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Chapter 8 Security Pt 2

Introduction of Intrusion Detection Systems

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Chapter 8 Network Security

CMS Operational Policy for Firewall Administration

A S B

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Attack Lab: Attacks on TCP/IP Protocols

IP Firewalls. an overview of the principles

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

CMPT 471 Networking II

Firewalls, Tunnels, and Network Intrusion Detection

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CS5008: Internet Computing

Classification of Firewalls and Proxies

CSCE 465 Computer & Network Security

How to Hack Millions of Routers. Craig Heffner, Seismic LLC

Transport Layer Protocols

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Host Fingerprinting and Firewalking With hping

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CIT 480: Securing Computer Systems. Firewalls

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Firewall Firewall August, 2003

CIT 480: Securing Computer Systems. Firewalls

Project 4: (E)DoS Attacks

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

INTRODUCTION TO FIREWALL SECURITY

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Understanding and Circumventing The Great Firewall of China

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

CS 356 Lecture 16 Denial of Service. Spring 2013

Network Security CS 192

PROFESSIONAL SECURITY SYSTEMS

Firewall Design Principles

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04

Firewalls Netasq. Security Management by NETASQ

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Linux Network Security

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

FIREWALL AND NAT Lecture 7a

Firewalls. Pehr Söderman KTH-CSC

Denial of Service Attacks

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

CIT 380: Securing Computer Systems

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Protecting Mobile Devices From TCP Flooding Attacks

How To Understand A Firewall

VPN Lesson 2: VPN Implementation. Summary

How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

General Network Security

Security Technology White Paper

Denial Of Service. Types of attacks

Firewalls. Chapter 3

Content Distribution Networks (CDN)

Solution of Exercise Sheet 5

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Intro to Firewalls. Summary

Detecting Forged TCP Reset Packets

Acquia Cloud Edge Protect Powered by CloudFlare

FortKnox Personal Firewall

Linux MDS Firewall Supplement

Stateful Firewalls. Hank and Foo

Project C (r. 1.0) By Nart Villeneuve

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

CloudFlare advanced DDoS protection

ELEN 689: Topics in Network Security: Firewalls. Ellen Mitchell Computing and Information Services 20 April 2006

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Firewall Tutorial. KAIST Dept. of EECS NC Lab.

CSE543 - Computer and Network Security Module: Firewalls

A Study of Technology in Firewall System

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Security vulnerabilities in the Internet and possible solutions

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Firewalls Overview and Best Practices. White Paper

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Network and Services Discovery

Divide and Conquer Real World Distributed Port Scanning

How to Hack Millions of Routers. Craig Heffner

DoS/DDoS Attacks and Protection on VoIP/UC

Network Intrusion Detection Systems. Beyond packet filtering

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Transcription:

An Overview of Ignoring the Great Firewall of China By: Matt Landau

Original Paper: Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson University of Cambridge, Computer Laboratory

Topics Background 3 Types of Content Blocking Systems How the Great Firewall Works The Firewall Design Countermeasures Political Concerns Conclusion

Background What is Censorship? What does China Censor? Why do they Censor?

What is Censorship? The suppression of ideas and information that certain persons - individuals, groups or government officials - find objectionable or dangerous. - The American Library Association Books won t stay banned. They won t burn. Ideas won t go to jail. In the long run of history, the censor and the inquisitor have always lost. The only weapon against bad ideas is better ideas. - Alfred Whitney Griswold, New York Times

What does China Censor? Rival political parties Popular non-government organizations (Falun Gong) Many foreign news sites (BBC, CBS, ABC) Historical Events and Topics (Tiananmen Square, Human Rights)

Why do they Censor? To control the meaning of words, concepts, and ideas The word free still existed... but could only be used in such statements as The dog is free from lice or This field is free from weeds. It could not be used in its old sense of politically free or intellectually free, since political and intellectual freedom no longer existed even as concepts, and were therefore of necessity nameless. - George Orwell, 1984

Why do they Censor? What does Tiananmen Square make you think of? Tanks? Soldiers? Massacre? Fall of Democracy? End of Freedom?

Three Types of Content Blocking Systems Packet Dropping DNS Poisoning Content Inspection - Proxy & IDS

Packet Dropping All traffic to a specific IP address is discarded Content hosted on that computer disappears Cheap and easy to implement

Packet Dropping Has 2 Problems: A list of IP addresses must be maintained and kept up-to-date Overblocking - Many websites are hosted on the same server and share an IP address For.com,.org, and.net domains 69.8% share an IP address with 50 or more websites.

DNS Poisoning Malicious DNS servers are setup to do one of two things when a lookup is performed Do not answer the request Answer with an incorrect IP address Does not suffer from overblocking There is difficulty in only blocking only the website while still allowing email on the domain

Content Inspection - Proxy All traffic passes through a proxy server that censors content on an item by item basis Extremely precise - block single images or web pages while leaving the rest of the site accessible Expensive to implement because of the speed required to analyze and filter all traffic in real-time

Content Inspection - IDS Use an Intrusion Detection System to perform content inspection If content matching key words is found it is discarded...or another action can be chosen to be performed More flexible than proxy-based content inspection Used by the Great Firewall of China

How the Great Firewall Works RST Packets Timers

RST Packets When keywords are found that the government wished to censor by the IDS it does not drop the packets. Instead if forges TCP RST packets to the client and the server so that they will both drop the connection

RST Packets Example of an uncensored page transmission as seen from the client cam(53382) china(http) [SYN] china(http) cam(53382) [SYN, ACK] cam(53382) china(http) [ACK] cam(53382) china(http) GET / HTTP/1.0<cr><lf><cr><lf> china(http) cam(53382) HTTP/1.1 200 OK (text/html)<cr><lf> etc. china(http) cam(53382)... more of the web page cam(53382) china(http) [ACK]... and so on until the page was complete

RST Packets Example of a censored page transmission as seen from the client cam(54190) china(http) [SYN] china(http) cam(54190) [SYN, ACK] TTL=39 cam(54190) china(http) [ACK] cam(54190) china(http) GET /?falun HTTP/1.0<cr><lf><cr><lf> china(http) cam(54190) [RST] TTL=47, seq=1, ack=1 china(http) cam(54190) [RST] TTL=47, seq=1461, ack=1 china(http) cam(54190) [RST] TTL=47, seq=4381, ack=1 china(http) cam(54190) HTTP/1.1 200 OK (text/html)<cr><lf> etc. cam(54190) china(http) [RST] TTL=64, seq=25, ack zeroed china(http) cam(54190)... more of the web page cam(54190) china(http) [RST] TTL=64, seq=25, ack zeroed china(http) cam(54190) [RST] TTL=47, seq=2921, ack=25

RST Packets Notice that the sequence numbers for the 3 RST packets are 1, 1461, and 4381 with identical TTLs This is because the firewall is incrementing the initial GET sequence number by 1460 and then by 1460 x 3 so that even if other packets have already been received hopefully one of the RST s will be within the sequence window This is done because many TCP/IP implementations now verify that RST packets are within the current sequence window to prevent malicious attacks

RST Packets Example of an censored page transmission as seen from the server cam(54190) china(http) [SYN] TTL=42 china(http) cam(54190) [SYN, ACK] cam(54190) china(http) [ACK] TTL=42 cam(54190) china(http) GET /?falun HTTP/1.0<cr><lf><cr><lf> china(http) cam(54190) HTTP/1.1 200 OK (text/html)<cr><lf> etc. china(http) cam(54190)... more of the web page cam(54190) china(http) [RST] TTL=61, seq=25, ack=1 cam(54190) china(http) [RST] TTL=61, seq=1485, ack=1 cam(54190) china(http) [RST] TTL=61, seq=4405, ack=1 cam(54190) china(http) [RST] TTL=61, seq=25, ack=1 cam(54190) china(http) [RST] TTL=61, seq=25, ack=2921 cam(54190) china(http) [RST] TTL=42, seq=25, ack zeroed cam(54190) china(http) [RST] TTL=42, seq=25, ack zeroed

RST Packets As can be seen RST packets are sent to the server as well as the client The only data that was received at the client is that which was sent before the server received it s first RST packet They also have identical TTLs

Timers After a connection has been reset all traffic between the two computers is blocked for a random period up to 1 hour, the average was 20 minutes This is done by sending a RST packet immediately following the SYN, ACK, SYN-ACK handshake It is not based on current content, only on the fact that recently there was blocked content

The Firewall Design Known Hardware Speculation Based on Analysis

Firewall Design Uses Cisco s Security Intrusion Detection System Packets arriving at Chinese routers are queued normally while also copied to an IDS device for inspection If the IDS determines the packet is bad 3 RST packets are sent to the client and server

Firewall Design Because the IDS is a separate device bad packets are not removed from the router s queue The firewall relies on the TCP/IP stack at both ends to drop the connection and relevant data

Countermeasures Ignoring RST packets Splitting Keywords DOS Attacks

Ignoring RST Packets Does not require a new TCP/IP stack Can be implemented in Linux using iptables iptables -A INPUT -p tcp --tcp-flags RST RST -j DROP Now all TCP packets with the RST flag set are discarded

Ignoring RST Packets cam(55817) china(http) [SYN] china(http) cam(55817) [SYN, ACK] TTL=41 cam(55817) china(http) [ACK] cam(55817) china(http) GET /?falun HTTP/1.0<cr><lf><cr><lf> china(http) cam(55817) [RST] TTL=49, seq=1 china(http) cam(55817) [RST] TTL=49, seq=1 china(http) cam(55817) [RST] TTL=49, seq=1 china(http) cam(55817) HTTP/1.1 200 OK (text/html)<cr><lf> etc china(http) cam(55817)... more of the web page cam(55817) china(http) [ACK] seq=25, ack=2921 china(http) cam(55817)... more of the web page china(http) cam(55817) [RST] TTL=49, seq=1461 china(http) cam(55817) [RST] TTL=49, seq=2921 china(http) cam(55817) [RST] TTL=49, seq=4381 cam(55817) china(http) [ACK] seq=25, ack=4381 china(http) cam(55817) [RST] TTL=49, seq=2921 china(http) cam(55817)... more of the web page china(http) cam(55817)... more of the web page cam(55817) china(http) [ACK] seq=25, ack=7301 china(http) cam(55817) [RST] TTL=49, seq=5841 china(http) cam(55817) [RST] TTL=49, seq=7301 china(http) cam(55817) [RST] TTL=49, seq=4381 china(http) cam(55817)... more of the web page china(http) cam(55817) [RST] TTL=49, seq=8761... and so on until the page was complete

Ignoring RST Packets As can be seen when RST packets are ignored the IDS continues to send more RST packets 3 at a time to both the client and server However, these packets are successfully ignored and the web page loads properly The firewall is completely ineffective

Denial of Service A connection between a computer inside and one outside the Great Firewall can be denied by sending spoofed packets containing blocked words. Could prevent traveling diplomats from accessing servers in their Chinese offices Could prevent Chinese government computers from receiving computer security updates

Denial of Service The authors found a reasonably effective attack could be maintained by a single user on a dail-up internet connection It is unknown if their are safeguards in place to detect these DOS attacks or allow diplomats to bypass the firewall

Political Concerns What if Chinese citizens are caught bypassing the firewall?

Political Concerns The firewall may log what the user is doing along with its content filtering This would allow the Chinese government to see that a user s computer is ignoring RST packets Encryption renders the firewall useless, but may be a red flag for investigation just by its use

Conclusions

Conclusions The Great Firewall of China inspects packets using an IDS to look for specific content When the content is detected spoofed RST packets are sent to both TCP endpoints to terminate the connection If RST packets are ignored at both ends the content flows normally and the firewall continues to send RST packets with no effect

The Internet interprets censorship as damage and routes around it. - John Gilmore Electronic Freedom Foundation [The End]