Lesson 10: Internet Surveillance and Censorship Flashcards

1
Q

What is DNS censorship?

A

DNS censorship is a network traffic filering strategy opted by a network to enforce control and censorship over internet infrastructureto suppress material which they deem as inappropriate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the properties of GFW (Great Firewall of China)?

A
  1. Locality of the nodes: majority view is that GFW nodes only exist at the ISP edges of the network
  2. Centralized management: a centralized blocklist is used to maintain same blocking behavior in different locations
  3. Load balancing: processes are clustered together based on source and destination IP addresses to send collective DNS injection messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DNS injection work?

A

DNS injection is the technique of sending fake DNS A records in response to blacklisted queries. The blacklist maybe on a specific domain or even by certain keywords present in the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three steps involved in DNS injection?

A
  1. DNS probe is sent to the open DNS resolvers
  2. The probe is checked against the blocklist of domains and keywords
  3. For domain level blocking, a fake DNS A record response is sent back. There are two levels of blocking domains: the first one is by directly blocking the domain, and the second one is by blocking it based on keywords present in the domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List five DNS censorship techniques and briefly describe their working principles.

A
  1. Packet dropping - all network traffic going to a set of specific IP addresses is discarded.
  2. DNS poisoning - fake record to redirect or mislead the user
  3. Content inspection - a proxy service which inspects the contents of all the packets in transmission and selectively serves them based on censorship policies
  4. Blocking with resets - sending TCP reset response to only to censored content queries
  5. Immediate reset of connections - sending TCP resets to all queries following a censored content query for fixed amount of time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which DNS censorship technique is susceptible to overblocking?

A

Packet dropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the strengths and weaknesses of the “packet dropping” DNS censorship technique?

A

Strengths: easy to implement, low cost.

Weaknesses: maintenance of a blocklist, overblocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the strengths and weaknesses of the “DNS poisoning” DNS censorship technique?

A

Strengths: no overblocking

Weaknesses: blocks entire domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the strengths and weaknesses of the “content inspection” DNS censorship technique?

A
  • Strengths: precise, flexibleWeaknesses: does not scale well
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the strengths and weaknesses of the “blocking with resets” DNS censorship technique?

A

Strength: easy to implement, low cost
Weaknesses: maintaining blocklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the strengths and weaknesses of the “immediate reset of connections” DNS censorship technique?

A

Strengths: easy to implement, low cost
Weaknesses: maintaining blocklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Our understanding of censorship around the world is relatively limited. Why is it the case? What are the challenges?

A
  1. Diverse measurements are required
  2. Need for scale
  3. Identifying the intent to restrict content access
  4. Ethics and minimizing risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the limitations of main censorship detection systems?

A

Relying on volunteer efforts make continuous and diverse measurements very difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of disruptions does Augur focus on identifying?

A

Augur focuses on identifying IP-based disruptions as opposed to DNS-based manipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Iris counter the issue of lack of diversity while studying DNS manipulation? What are the steps associated with the proposed process?

A

Iris uses open DNS resolvers located all over the globe.

  1. Scanning the Internet’s IPv4 space for open DNS resolvers
  2. Identifying Infrastructure DNS Resolvers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the steps involved in the global measurement process using DNS resolvers?

A
  1. Performing global DNS queries – Iris queries thousands of domains across thousands of open DNS resolvers. To establish a baseline for comparison, the creators included 3 DNS domains that were under their control to help calculate metrics used for evaluation DNS manipulation.
  2. Annotating DNS responses with auxiliary information – To enable the classification, Iris annotates the IP addresses with additional information such as their geo-location, AS, port 80 HTTP responses, etc. This information is available from the Censys dataset.
  3. Additional PTR and TLS scanning – One IP address could host several websites via virtual hosting. So, when Censys retrieves certificates from port 443, it could differ from one retrieved via TLS’s Server Name Indication (SNI) extension. This results in discrepancies that could cause Iris to label virtual hosting as DNS inconsistencies. To avoid this, Iris adds PTR and SNI certificates.
17
Q

What metrics does Iris use to identify DNS manipulation once data annotation is complete? Describe the metrics. Under what condition, do we declare the response as being manipulated?

A
  1. Consistency Metrics

Domain access should have some consistency, in terms of network properties, infrastructure, or content, even when accessed from different global vantage points. Using one of the domains Iris controls gives a set of high-confidence consistency baselines. Some consistency metrics used are IP address, Autonomous System, HTTP Content, HTTPS Certificate, PTRs for CDN.

  1. Independent Verifiability Metrics

In addition to the consistency metrics, they also use metrics that could be externally verified using external data sources. Some of the independent verifiability metrics used are HTTPS certificate (whether the IP address presents a valid, browser-trusted certificate for the correct domain name when queried without SNI) and HTTPS Certificate with SNI.

Ifanyconsistency metric or independent verifiability metric is satisfied, the response is correct. Otherwise, the response is classified as manipulated.

18
Q

How to identify DNS manipulation via machine learning with Iris?

A

Ifanyconsistency metric or independent verifiability metric is satisfied, the response is correct. Otherwise, the response is classified as manipulated.

19
Q

How is it possible to achieve connectivity disruption using the routing disruption approach?

A

A routing mechanism decides which part of the network can be reachable.

20
Q

How is it possible to achieve connectivity disruption using the packet filtering approach?

A

To disrupt a network’s connectivity, packet filtering can be used to block packets matching a certain criteria disrupting the normal forwarding action.

21
Q

Explain a scenario of connectivity disruption detection in the case when no filtering occurs.

A

An increment of IP Id by 2

22
Q

Explain a scenario of connectivity disruption detection in the case of inbound blocking.

A

An increment of IP Id by 1

23
Q

Explain a scenario of connectivity disruption detection in the case of outbound blocking.

A

Continous increment of IP Id as reflector attempts to resend packets.