Lesson 10: Internet Surveillance and Censorship Flashcards
What is DNS censorship?
DNS censorship is a network traffic filering strategy opted by a network to enforce control and censorship over internet infrastructureto suppress material which they deem as inappropriate.
What are the properties of GFW (Great Firewall of China)?
- Locality of the nodes: majority view is that GFW nodes only exist at the ISP edges of the network
- Centralized management: a centralized blocklist is used to maintain same blocking behavior in different locations
- Load balancing: processes are clustered together based on source and destination IP addresses to send collective DNS injection messages
How does DNS injection work?
DNS injection is the technique of sending fake DNS A records in response to blacklisted queries. The blacklist maybe on a specific domain or even by certain keywords present in the domain.
What are the three steps involved in DNS injection?
- DNS probe is sent to the open DNS resolvers
- The probe is checked against the blocklist of domains and keywords
- For domain level blocking, a fake DNS A record response is sent back. There are two levels of blocking domains: the first one is by directly blocking the domain, and the second one is by blocking it based on keywords present in the domain
List five DNS censorship techniques and briefly describe their working principles.
- Packet dropping - all network traffic going to a set of specific IP addresses is discarded.
- DNS poisoning - fake record to redirect or mislead the user
- Content inspection - a proxy service which inspects the contents of all the packets in transmission and selectively serves them based on censorship policies
- Blocking with resets - sending TCP reset response to only to censored content queries
- Immediate reset of connections - sending TCP resets to all queries following a censored content query for fixed amount of time
Which DNS censorship technique is susceptible to overblocking?
Packet dropping
What are the strengths and weaknesses of the “packet dropping” DNS censorship technique?
Strengths: easy to implement, low cost.
Weaknesses: maintenance of a blocklist, overblocking
What are the strengths and weaknesses of the “DNS poisoning” DNS censorship technique?
Strengths: no overblocking
Weaknesses: blocks entire domain
What are the strengths and weaknesses of the “content inspection” DNS censorship technique?
- Strengths: precise, flexibleWeaknesses: does not scale well
What are the strengths and weaknesses of the “blocking with resets” DNS censorship technique?
Strength: easy to implement, low cost
Weaknesses: maintaining blocklist
What are the strengths and weaknesses of the “immediate reset of connections” DNS censorship technique?
Strengths: easy to implement, low cost
Weaknesses: maintaining blocklist
Our understanding of censorship around the world is relatively limited. Why is it the case? What are the challenges?
- Diverse measurements are required
- Need for scale
- Identifying the intent to restrict content access
- Ethics and minimizing risks
What are the limitations of main censorship detection systems?
Relying on volunteer efforts make continuous and diverse measurements very difficult.
What kind of disruptions does Augur focus on identifying?
Augur focuses on identifying IP-based disruptions as opposed to DNS-based manipulations.
How does Iris counter the issue of lack of diversity while studying DNS manipulation? What are the steps associated with the proposed process?
Iris uses open DNS resolvers located all over the globe.
- Scanning the Internet’s IPv4 space for open DNS resolvers
- Identifying Infrastructure DNS Resolvers