| rfc9505v1.txt | rfc9505.txt | |||
|---|---|---|---|---|
| skipping to change at line 99 ¶ | skipping to change at line 99 ¶ | |||
| 5.4.1. Distributed Denial of Service (DDoS) | 5.4.1. Distributed Denial of Service (DDoS) | |||
| 5.4.2. Censorship in Depth | 5.4.2. Censorship in Depth | |||
| 6. Non-technical Interference | 6. Non-technical Interference | |||
| 6.1. Manual Filtering | 6.1. Manual Filtering | |||
| 6.2. Self-Censorship | 6.2. Self-Censorship | |||
| 6.3. Server Takedown | 6.3. Server Takedown | |||
| 6.4. Notice and Takedown | 6.4. Notice and Takedown | |||
| 6.5. Domain Name Seizures | 6.5. Domain Name Seizures | |||
| 7. Future Work | 7. Future Work | |||
| 8. IANA Considerations | 8. IANA Considerations | |||
| 9. Informative References | 9. Security Considerations | |||
| 10. Informative References | ||||
| Contributors | Contributors | |||
| Authors' Addresses | Authors' Addresses | |||
| 1. Introduction | 1. Introduction | |||
| Censorship is where an entity in a position of power -- such as a | Censorship is where an entity in a position of power -- such as a | |||
| government, organization, or individual -- suppresses communication | government, organization, or individual -- suppresses communication | |||
| that it considers objectionable, harmful, sensitive, politically | that it considers objectionable, harmful, sensitive, or inconvenient | |||
| incorrect, or inconvenient [WP-Def-2020]. Although censors that | [WP-Def-2020]. Although censors that engage in censorship must do so | |||
| engage in censorship must do so through legal, military, or other | through legal, military, or other means, this document focuses | |||
| means, this document focuses largely on technical mechanisms used to | largely on technical mechanisms used to achieve network censorship. | |||
| achieve network censorship. | ||||
| This document describes technical mechanisms that censorship regimes | This document describes technical mechanisms that censorship regimes | |||
| around the world use for blocking or impairing Internet traffic. See | around the world use for blocking or impairing Internet traffic. See | |||
| [RFC7754] for a discussion of Internet blocking and filtering in | [RFC7754] for a discussion of Internet blocking and filtering in | |||
| terms of implications for Internet architecture rather than end-user | terms of implications for Internet architecture rather than end-user | |||
| access to content and services. There is also a growing field of | access to content and services. There is also a growing field of | |||
| academic study of censorship circumvention (see the review article of | academic study of censorship circumvention (see the review article of | |||
| [Tschantz-2016]), results from which we seek to make relevant here | [Tschantz-2016]), results from which we seek to make relevant here | |||
| for protocol designers and implementers. | for protocol designers and implementers. | |||
| skipping to change at line 142 ¶ | skipping to change at line 142 ¶ | |||
| 2. Terminology | 2. Terminology | |||
| We describe three elements of Internet censorship: prescription, | We describe three elements of Internet censorship: prescription, | |||
| identification, and interference. This document contains three major | identification, and interference. This document contains three major | |||
| sections, each corresponding to one of these elements. Prescription | sections, each corresponding to one of these elements. Prescription | |||
| is the process by which censors determine what types of material they | is the process by which censors determine what types of material they | |||
| should censor, e.g., classifying pornographic websites as | should censor, e.g., classifying pornographic websites as | |||
| undesirable. Identification is the process by which censors classify | undesirable. Identification is the process by which censors classify | |||
| specific traffic or traffic identifiers to be blocked or impaired, | specific traffic or traffic identifiers to be blocked or impaired, | |||
| e.g., deciding that webpages containing "sex" in an HTTP header or | e.g., deciding that webpages containing "sex" in an HTTP header or | |||
| that accept traffic through the URL www.sex.example are likely to be | that accept traffic through the URL "www.sex.example" are likely to | |||
| undesirable. Interference is the process by which censors intercede | be undesirable. Interference is the process by which censors | |||
| in communication and prevent access to censored materials by blocking | intercede in communication and prevent access to censored materials | |||
| access or impairing the connection, e.g., implementing a technical | by blocking access or impairing the connection, e.g., implementing a | |||
| solution capable of identifying HTTP headers or URLs and ensuring | technical solution capable of identifying HTTP headers or URLs and | |||
| they are rendered wholly or partially inaccessible. | ensuring they are rendered wholly or partially inaccessible. | |||
| 3. Technical Prescription | 3. Technical Prescription | |||
| Prescription is the process of figuring out what censors would like | Prescription is the process of figuring out what censors would like | |||
| to block [Glanville-2008]. Generally, censors aggregate information | to block [Glanville-2008]. Generally, censors aggregate information | |||
| "to block" in blocklists, databases of image hashes [ekr-2021], or | "to block" in blocklists, databases of image hashes [ekr-2021], or | |||
| use real-time heuristic assessment of content [Ding-1999]. Some | use real-time heuristic assessment of content [Ding-1999]. Some | |||
| national networks are designed to more naturally serve as points of | national networks are designed to more naturally serve as points of | |||
| control [Leyba-2019]. There are also indications that online censors | control [Leyba-2019]. There are also indications that online censors | |||
| use probabilistic machine learning techniques [Tang-2016]. Indeed, | use probabilistic machine learning techniques [Tang-2016]. Indeed, | |||
| skipping to change at line 184 ¶ | skipping to change at line 184 ¶ | |||
| censors filter traffic from broad categories they would like to | censors filter traffic from broad categories they would like to | |||
| block, such as gambling or pornography [Knight-2005]. In these | block, such as gambling or pornography [Knight-2005]. In these | |||
| cases, these private services attempt to categorize every semi- | cases, these private services attempt to categorize every semi- | |||
| questionable website to allow for meta-tag blocking. Similarly, they | questionable website to allow for meta-tag blocking. Similarly, they | |||
| tune real-time content heuristic systems to map their assessments | tune real-time content heuristic systems to map their assessments | |||
| onto categories of objectionable content. | onto categories of objectionable content. | |||
| Countries that are more interested in retaining specific political | Countries that are more interested in retaining specific political | |||
| control typically have ministries or organizations that maintain | control typically have ministries or organizations that maintain | |||
| blocklists. Examples include the Ministry of Industry and | blocklists. Examples include the Ministry of Industry and | |||
| Information Technology in China, Ministry of Culture and Islamic | Information Technology in China, the Ministry of Culture and Islamic | |||
| Guidance in Iran, and specific to copyright in France [HADOPI] and | Guidance in Iran, and the organizations specific to copyright law in | |||
| across the EU for consumer protection law [Reda-2017]. | France [HADOPI] and consumer protection laaw across the EU | |||
| [Reda-2017]. | ||||
| Content-layer filtering of images and video requires institutions or | Content-layer filtering of images and video requires institutions or | |||
| organizations to store hashes of images or videos to be blocked in | organizations to store hashes of images or videos to be blocked in | |||
| databases, which can then be compared, with some degree of tolerance, | databases, which can then be compared, with some degree of tolerance, | |||
| to content that is sent, received, or stored using centralized | to content that is sent, received, or stored using centralized | |||
| content applications and services [ekr-2021]. | content applications and services [ekr-2021]. | |||
| 4. Technical Identification | 4. Technical Identification | |||
| 4.1. Points of Control | 4.1. Points of Control | |||
| skipping to change at line 329 ¶ | skipping to change at line 330 ¶ | |||
| these common behaviors for further reference. | these common behaviors for further reference. | |||
| 4.2.1. HTTP Request Header Identification | 4.2.1. HTTP Request Header Identification | |||
| An HTTP header contains a lot of useful information for traffic | An HTTP header contains a lot of useful information for traffic | |||
| identification. Although "host" is the only required field in an | identification. Although "host" is the only required field in an | |||
| HTTP request header (for HTTP/1.1 and later), an HTTP method field is | HTTP request header (for HTTP/1.1 and later), an HTTP method field is | |||
| necessary to do anything useful. As such, "method" and "host" are | necessary to do anything useful. As such, "method" and "host" are | |||
| the two fields used most often for ubiquitous censorship. A censor | the two fields used most often for ubiquitous censorship. A censor | |||
| can sniff traffic and identify a specific domain name (host) and | can sniff traffic and identify a specific domain name (host) and | |||
| usually a page name (GET /page) as well. This identification | usually a page name (for example, GET /page) as well. This | |||
| technique is usually paired with transport header identification (see | identification technique is usually paired with transport header | |||
| Section 4.3.1) for a more robust method. | identification (see Section 4.3.1) for a more robust method. | |||
| Trade-offs: Request Identification is a technically straightforward | ||||
| identification method that can be easily implemented at the | ||||
| backbone or ISP level. The hardware needed for | ||||
| this sort of identification is cheap and easy to acquire, making it | Trade-offs: HTTP request header identification is a technically | |||
| desirable when budget and scope are a concern. HTTPS (Hypertext | straightforward identification method that can be easily implemented | |||
| Transport Protocol Secure) will encrypt the relevant request and | at the backbone or ISP level. The hardware needed for this sort of | |||
| response fields, so pairing with transport identification (see | identification is cheap and easy to acquire, making it desirable when | |||
| Section 4.3.1) is necessary for HTTPS filtering. However, some | budget and scope are a concern. HTTPS (Hypertext Transport Protocol | |||
| countermeasures can trivially defeat simple forms of HTTP Request | Secure) will encrypt the relevant request and response fields, so | |||
| Header Identification. For example, two cooperating endpoints -- an | pairing with transport identification (see Section 4.3.1) is | |||
| instrumented web server and client -- could encrypt or otherwise | necessary for HTTPS filtering. However, some countermeasures can | |||
| obfuscate the "host" header in a request, potentially thwarting | trivially defeat simple forms of HTTP request header identification. | |||
| techniques that match against "host" header values. | For example, two cooperating endpoints -- an instrumented web server | |||
| and client -- could encrypt or otherwise obfuscate the "host" header | ||||
| in a request, potentially thwarting techniques that match against | ||||
| "host" header values. | ||||
| Empirical Examples: Studies exploring censorship mechanisms have | Empirical Examples: Studies exploring censorship mechanisms have | |||
| found evidence of HTTP header/ URL filtering in many countries, | found evidence of HTTP header and/or URL filtering in many countries, | |||
| including Bangladesh, Bahrain, China, India, Iran, Malaysia, | including Bangladesh, Bahrain, China, India, Iran, Malaysia, | |||
| Pakistan, Russia, Saudi Arabia, South Korea, Thailand, and Turkey | Pakistan, Russia, Saudi Arabia, South Korea, Thailand, and Turkey | |||
| [Verkamp-2012] [Nabi-2013] [Aryan-2013]. Commercial technologies are | [Verkamp-2012] [Nabi-2013] [Aryan-2013]. Commercial technologies are | |||
| often purchased by censors [Dalek-2013]. These commercial | often purchased by censors [Dalek-2013]. These commercial | |||
| technologies use a combination of HTTP Request Identification and | technologies use a combination of HTTP request header identification | |||
| transport header identification to filter specific URLs. Dalek et | and transport header identification to filter specific URLs. Dalek | |||
| al. and Jones et al. identified the use of these products in the wild | et al. and Jones et al. identified the use of these products in the | |||
| [Dalek-2013] [Jones-2014]. | wild [Dalek-2013] [Jones-2014]. | |||
| 4.2.2. HTTP Response Header Identification | 4.2.2. HTTP Response Header Identification | |||
| While HTTP Request Header Identification relies on the information | While HTTP request header identification relies on the information | |||
| contained in the HTTP request from client to server, response | contained in the HTTP request from client to server, HTTP response | |||
| identification uses information sent in response by the server to | header identification uses information sent in response by the server | |||
| client to identify undesirable content. | to client to identify undesirable content. | |||
| Trade-offs: As with HTTP Request Header Identification, the | Trade-offs: As with HTTP request header identification, the | |||
| techniques used to identify HTTP traffic are well-known, cheap, and | techniques used to identify HTTP traffic are well-known, cheap, and | |||
| relatively easy to implement. However, they are made useless by | relatively easy to implement. However, they are made useless by | |||
| HTTPS because HTTPS encrypts the response and its headers. | HTTPS because HTTPS encrypts the response and its headers. | |||
| The response fields are also less helpful for identifying content | The response fields are also less helpful for identifying content | |||
| than request fields, as "Server" could easily be identified using | than request fields, as "Server" could easily be identified using | |||
| HTTP Request Header identification, and "Via" is rarely relevant. | HTTP request header identification, and "Via" is rarely relevant. | |||
| HTTP Response censorship mechanisms normally let the first n packets | HTTP response censorship mechanisms normally let the first n packets | |||
| through while the mirrored traffic is being processed; this may allow | through while the mirrored traffic is being processed; this may allow | |||
| some content through, and the user may be able to detect that the | some content through, and the user may be able to detect that the | |||
| censor is actively interfering with undesirable content. | censor is actively interfering with undesirable content. | |||
| Empirical Examples: In 2009, Jong Park et al. at the University of | Empirical Examples: In 2009, Jong Park et al. at the University of | |||
| New Mexico demonstrated that the Great Firewall of China (GFW) has | New Mexico demonstrated that the Great Firewall of China (GFW) has | |||
| used this technique [Crandall-2010]. However, Jong Park et al. found | used this technique [Crandall-2010]. However, Jong Park et al. found | |||
| that the GFW discontinued this practice during the course of the | that the GFW discontinued this practice during the course of the | |||
| study. Due to the overlap in HTTP response filtering and keyword | study. Due to the overlap in HTTP response filtering and keyword | |||
| filtering (see Section 4.2.4), it is likely that most censors rely on | filtering (see Section 4.2.4), it is likely that most censors rely on | |||
| skipping to change at line 401 ¶ | skipping to change at line 401 ¶ | |||
| towards censoring TLS (and by extension HTTPS). Most of these | towards censoring TLS (and by extension HTTPS). Most of these | |||
| techniques relate to the Server Name Indication (SNI) field, | techniques relate to the Server Name Indication (SNI) field, | |||
| including censoring SNI, Encrypted SNI (ESNI), or omitted SNI. | including censoring SNI, Encrypted SNI (ESNI), or omitted SNI. | |||
| Censors can also censor HTTPS content via server certificates. Note | Censors can also censor HTTPS content via server certificates. Note | |||
| that TLS 1.3 acts as a security component of QUIC. | that TLS 1.3 acts as a security component of QUIC. | |||
| 4.2.3.1. Server Name Indication (SNI) | 4.2.3.1. Server Name Indication (SNI) | |||
| In encrypted connections using TLS, there may be servers that host | In encrypted connections using TLS, there may be servers that host | |||
| multiple "virtual servers" at a given network address, and the client | multiple "virtual servers" at a given network address, and the client | |||
| will need to specify in the Client Hello message which domain name it | will need to specify in the ClientHello message which domain name it | |||
| seeks to connect to (so that the server can respond with the | seeks to connect to (so that the server can respond with the | |||
| appropriate TLS certificate) using, the SNI TLS extension [RFC6066]. | appropriate TLS certificate) using, the SNI TLS extension [RFC6066]. | |||
| The Client Hello message is unencrypted for TCP-based TLS. When | The ClientHello message is unencrypted for TCP-based TLS. When using | |||
| using QUIC, the Client Hello message is encrypted, but its | QUIC, the ClientHello message is encrypted, but its confidentiality | |||
| confidentiality is not effectively protected because the initial | is not effectively protected because the initial encryption keys are | |||
| encryption keys are derived using a value that is visible on the | derived using a value that is visible on the wire. Since SNI is | |||
| wire. Since SNI is often sent in the clear (as are the cert fields | often sent in the clear (as are the cert fields sent in response), | |||
| sent in response), censors and filtering software can use it (and | censors and filtering software can use it (and response cert fields) | |||
| response cert fields) as a basis for blocking, filtering, or | as a basis for blocking, filtering, or impairment by dropping | |||
| impairment by dropping connections to domains that match prohibited | connections to domains that match prohibited content (e.g., | |||
| content (e.g., bad.foo.example may be censored while good.foo.example | "bad.foo.example" may be censored while "good.foo.example" is not) | |||
| is not) [Shbair-2015]. There are ongoing standardization efforts in | [Shbair-2015]. There are ongoing standardization efforts in the TLS | |||
| the TLS Working Group to encrypt SNI [RFC8744] [TLS-ESNI], and recent | Working Group to encrypt SNI [RFC8744] [TLS-ESNI], and recent | |||
| research shows promising results in the use of ESNI in the face of | research shows promising results in the use of ESNI in the face of | |||
| SNI-based filtering [Chai-2019] in some countries. | SNI-based filtering [Chai-2019] in some countries. | |||
| Domain fronting has been one popular way to avoid identification by | Domain fronting has been one popular way to avoid identification by | |||
| censors [Fifield-2015]. To avoid identification by censors, | censors [Fifield-2015]. To avoid identification by censors, | |||
| applications using domain fronting put a different domain name in the | applications using domain fronting put a different domain name in the | |||
| SNI extension than in the Host: header, which is protected by HTTPS. | SNI extension than in the "host" header, which is protected by HTTPS. | |||
| The visible SNI would indicate an unblocked domain, while the blocked | The visible SNI would indicate an unblocked domain, while the blocked | |||
| domain remains hidden in the encrypted application header. Some | domain remains hidden in the encrypted application header. Some | |||
| encrypted messaging services relied on domain fronting to enable | encrypted messaging services relied on domain fronting to enable | |||
| their provision in countries employing SNI-based filtering. These | their provision in countries employing SNI-based filtering. These | |||
| services used the cover provided by domains for which blocking at the | services used the cover provided by domains for which blocking at the | |||
| domain level would be undesirable to hide their true domain names. | domain level would be undesirable to hide their true domain names. | |||
| However, the companies holding the most popular domains have since | However, the companies holding the most popular domains have since | |||
| reconfigured their software to prevent this practice. It may be | reconfigured their software to prevent this practice. It may be | |||
| possible to achieve similar results using potential future options to | possible to achieve similar results using potential future options to | |||
| encrypt SNI. | encrypt SNI. | |||
| Trade-offs: Some clients do not send the SNI extension (e.g., clients | Trade-offs: Some clients do not send the SNI extension (e.g., clients | |||
| that only support versions of SSL and not TLS), rendering this method | that only support versions of SSL and not TLS), rendering this method | |||
| ineffective (see Section 4.2.3.3). In addition, this technique | ineffective (see Section 4.2.3.3). In addition, this technique | |||
| requires deep packet inspection (DPI) techniques that can be | requires deep packet inspection (DPI) techniques that can be | |||
| computationally and infrastructurally expensive, especially when | expensive in terms of computational complexity and infrastructure, | |||
| applied to QUIC where DPI requires key extraction and decryption of | especially when applied to QUIC where DPI requires key extraction and | |||
| the Client Hello in order to read the SNI. Improper configuration of | decryption of the ClientHello in order to read the SNI. Improper | |||
| an SNI-based block can result in significant over-blocking, e.g., | configuration of an SNI-based block can result in significant over- | |||
| when a second-level domain like populardomain.example is | blocking, e.g., when a second-level domain like | |||
| inadvertently blocked. In the case of ESNI, pressure to censor may | "populardomain.example" is inadvertently blocked. In the case of | |||
| transfer to other points of intervention, such as content and | ESNI, pressure to censor may transfer to other points of | |||
| application providers. | intervention, such as content and application providers. | |||
| Empirical Examples: There are many examples of security firms that | Empirical Examples: There are many examples of security firms that | |||
| offer SNI-based filtering products [Trustwave-2015] [Sophos-2015] | offer SNI-based filtering products [Trustwave-2015] [Sophos-2023] | |||
| [Shbair-2015]. The governments of China, Egypt, Iran, Qatar, South | [Shbair-2015]. The governments of China, Egypt, Iran, Qatar, South | |||
| Korea, Turkey, Turkmenistan, and the United Arab Emirates all do | Korea, Turkey, Turkmenistan, and the United Arab Emirates all do | |||
| widespread SNI filtering or blocking [OONI-2018] [OONI-2019] | widespread SNI filtering or blocking [OONI-2018] [OONI-2019] | |||
| [NA-SK-2019] [CitizenLab-2018] [Gatlan-2019] [Chai-2019] | [NA-SK-2019] [CitizenLab-2018] [Gatlan-2019] [Chai-2019] | |||
| [Grover-2019] [Singh-2019]. SNI blocking against QUIC traffic was | [Grover-2019] [Singh-2019]. SNI blocking against QUIC traffic was | |||
| first observed in Russia in March 2022 [Elmenhorst-2022]. | first observed in Russia in March 2022 [Elmenhorst-2022]. | |||
| 4.2.3.2. Encrypted SNI (ESNI) | 4.2.3.2. Encrypted SNI (ESNI) | |||
| With the data leakage present with the SNI field, a natural response | With the data leakage present with the SNI field, a natural response | |||
| is to encrypt it, which is forthcoming in TLS 1.3 with Encrypted | is to encrypt it, which is forthcoming in TLS 1.3 with Encrypted | |||
| Client Hello (ECH). Prior to ECH, the ESNI extension is available to | Client Hello (ECH). Prior to ECH, the ESNI extension is available to | |||
| prevent the data leakage caused by SNI, which encrypts only the SNI | prevent the data leakage caused by SNI, which encrypts only the SNI | |||
| field. Unfortunately, censors can target connections that use the | field. Unfortunately, censors can target connections that use the | |||
| ESNI extension specifically for censorship. This guarantees over- | ESNI extension specifically for censorship. This guarantees over- | |||
| blocking for the censor but can be worth the cost if ESNI is not yet | blocking for the censor but can be worth the cost if ESNI is not yet | |||
| widely deployed within the country. ECH is the emerging standard for | widely deployed within the country. ECH is the emerging standard for | |||
| protecting the entire TLS Client Hello, but it is not yet widely | protecting the entire TLS ClientHello, but it is not yet widely | |||
| deployed. | deployed. | |||
| Trade-offs: The cost to censoring ESNI is significantly higher than | Trade-offs: The cost to censoring ESNI is significantly higher than | |||
| SNI to a censor, as the censor can no longer target censorship to | SNI to a censor, as the censor can no longer target censorship to | |||
| specific domains and guarantees over-blocking. In these cases, the | specific domains and guarantees over-blocking. In these cases, the | |||
| censor uses the over-blocking to discourage the use of ESNI entirely. | censor uses the over-blocking to discourage the use of ESNI entirely. | |||
| Empirical Examples: In 2020, China began censoring all uses of ESNI | Empirical Examples: In 2020, China began censoring all uses of ESNI | |||
| [Bock-2020b], even for innocuous connections. The censorship | [Bock-2020b], even for innocuous connections. The censorship | |||
| mechanism for China's ESNI censorship differs from how China censors | mechanism for China's ESNI censorship differs from how China censors | |||
| skipping to change at line 495 ¶ | skipping to change at line 495 ¶ | |||
| Trade-offs: The approach of censoring all connections that omit the | Trade-offs: The approach of censoring all connections that omit the | |||
| SNI field is guaranteed to over-block, though connections that omit | SNI field is guaranteed to over-block, though connections that omit | |||
| the SNI field should be relatively rare in the wild. | the SNI field should be relatively rare in the wild. | |||
| Empirical Examples: In the past, researchers have observed censors in | Empirical Examples: In the past, researchers have observed censors in | |||
| Russia blocking connections that omit the SNI field [Bock-2020b]. | Russia blocking connections that omit the SNI field [Bock-2020b]. | |||
| 4.2.3.4. Server Response Certificate | 4.2.3.4. Server Response Certificate | |||
| During the TLS handshake after the TLS Client Hello, the server will | During the TLS handshake after the TLS ClientHello, the server will | |||
| respond with the TLS certificate. This certificate also contains the | respond with the TLS certificate. This certificate also contains the | |||
| domain the client is trying to access, creating another avenue that | domain the client is trying to access, creating another avenue that | |||
| censors can use to perform censorship. This technique will not work | censors can use to perform censorship. This technique will not work | |||
| in TLS 1.3, as the certificate will be encrypted. | in TLS 1.3, as the certificate will be encrypted. | |||
| Trade-offs: Censoring based on the server certificate requires DPI | Trade-offs: Censoring based on the server certificate requires DPI | |||
| techniques that can be more computationally expensive compared to | techniques that can be more computationally expensive compared to | |||
| other methods. Additionally, the certificate is sent later in the | other methods. Additionally, the certificate is sent later in the | |||
| TLS handshake compared to the SNI field, forcing the censor to track | TLS handshake compared to the SNI field, forcing the censor to track | |||
| the connection longer. | the connection longer. | |||
| skipping to change at line 680 ¶ | skipping to change at line 680 ¶ | |||
| Port is useful for allowlisting certain applications. | Port is useful for allowlisting certain applications. | |||
| By combining IP address, port, and protocol information found in the | By combining IP address, port, and protocol information found in the | |||
| transport header, shallow packet inspection can be used by a censor | transport header, shallow packet inspection can be used by a censor | |||
| to identify specific TCP or UDP endpoints. UDP endpoint blocking has | to identify specific TCP or UDP endpoints. UDP endpoint blocking has | |||
| been observed in the context of QUIC blocking [Elmenhorst-2021]. | been observed in the context of QUIC blocking [Elmenhorst-2021]. | |||
| Trade-offs: Header identification is popular due to its simplicity, | Trade-offs: Header identification is popular due to its simplicity, | |||
| availability, and robustness. | availability, and robustness. | |||
| Header identification is trivial to implement, but is difficult to | Header identification is trivial to implement in some routers, but is | |||
| implement in backbone or ISP routers at scale, and is therefore | difficult to implement in backbone or ISP routers at scale, and is | |||
| typically implemented with DPI. Blocklisting an IP is equivalent to | therefore typically implemented with DPI. Blocklisting an IP is | |||
| installing a specific route on a router (such as a /32 route for IPv4 | equivalent to installing a specific route on a router (such as a /32 | |||
| addresses and a /128 route for IPv6 addresses). However, due to | route for IPv4 addresses and a /128 route for IPv6 addresses). | |||
| limited flow table space, this cannot scale beyond a few thousand IPs | However, due to limited flow table space, this cannot scale beyond a | |||
| at most. IP blocking is also relatively crude. It often leads to | few thousand IPs at most. IP blocking is also relatively crude. It | |||
| over-blocking and cannot deal with some services like Content | often leads to over-blocking and cannot deal with some services like | |||
| Distribution Networks (CDNs) that host content at hundreds or | Content Distribution Networks (CDNs) that host content at hundreds or | |||
| thousands of IP addresses. Despite these limitations, IP blocking is | thousands of IP addresses. Despite these limitations, IP blocking is | |||
| extremely effective because the user needs to proxy their traffic | extremely effective because the user needs to proxy their traffic | |||
| through another destination to circumvent this type of | through another destination to circumvent this type of | |||
| identification. In addition, IP blocking is effective against all | identification. In addition, IP blocking is effective against all | |||
| protocols above IP, e.g., TCP and QUIC. | protocols above IP, e.g., TCP and QUIC. | |||
| Port blocking is generally not useful because many types of content | Port blocking is generally not useful because many types of content | |||
| share the same port, and it is possible for censored applications to | share the same port, and it is possible for censored applications to | |||
| change their port. For example, most HTTP traffic goes over port 80, | change their port. For example, most HTTP traffic goes over port 80, | |||
| so the censor cannot differentiate between restricted and allowed web | so the censor cannot differentiate between restricted and allowed web | |||
| skipping to change at line 721 ¶ | skipping to change at line 721 ¶ | |||
| 4.3.2. Protocol Identification | 4.3.2. Protocol Identification | |||
| Censors sometimes identify entire protocols to be blocked using a | Censors sometimes identify entire protocols to be blocked using a | |||
| variety of traffic characteristics. For example, Iran impairs the | variety of traffic characteristics. For example, Iran impairs the | |||
| performance of HTTPS traffic, a protocol that prevents further | performance of HTTPS traffic, a protocol that prevents further | |||
| analysis, to encourage users to switch to HTTP, a protocol that they | analysis, to encourage users to switch to HTTP, a protocol that they | |||
| can analyze [Aryan-2013]. A simple protocol identification would be | can analyze [Aryan-2013]. A simple protocol identification would be | |||
| to recognize all TCP traffic over port 443 as HTTPS, but a more | to recognize all TCP traffic over port 443 as HTTPS, but a more | |||
| sophisticated analysis of the statistical properties of payload data | sophisticated analysis of the statistical properties of payload data | |||
| and flow behavior would be more effective, even when port 443 is not | and flow behavior would be more effective, even when port 443 is not | |||
| used [Hjelmvik-2010] [Sandvine-2014]. | used [Hjelmvik-2010] [Sandvine-2015]. | |||
| If censors can detect circumvention tools, they can block them. | If censors can detect circumvention tools, they can block them. | |||
| Therefore, censors like China are extremely interested in identifying | Therefore, censors like China are extremely interested in identifying | |||
| the protocols for censorship circumvention tools. In recent years, | the protocols for censorship circumvention tools. In recent years, | |||
| this has devolved into a competition between censors and | this has devolved into a competition between censors and | |||
| circumvention tool developers. As part of this competition, China | circumvention tool developers. As part of this competition, China | |||
| developed an extremely effective protocol identification technique | developed an extremely effective protocol identification technique | |||
| that researchers call "active probing" or "active scanning". | that researchers call "active probing" or "active scanning". | |||
| In active probing, the censor determines whether hosts are running a | In active probing, the censor determines whether hosts are running a | |||
| skipping to change at line 787 ¶ | skipping to change at line 787 ¶ | |||
| Another feature of some modern censorship systems is residual | Another feature of some modern censorship systems is residual | |||
| censorship, a punitive form of censorship whereby after a censor | censorship, a punitive form of censorship whereby after a censor | |||
| disrupts a forbidden connection, the censor continues to target | disrupts a forbidden connection, the censor continues to target | |||
| subsequent connections, even if they are innocuous [Bock-2021]. | subsequent connections, even if they are innocuous [Bock-2021]. | |||
| Residual censorship can take many forms and often relies on the | Residual censorship can take many forms and often relies on the | |||
| methods of technical interference described in the next section. | methods of technical interference described in the next section. | |||
| An important facet of residual censorship is precisely what the | An important facet of residual censorship is precisely what the | |||
| censor continues to block after censorship is initially triggered. | censor continues to block after censorship is initially triggered. | |||
| There are three common options available to an adversary: 2-tuple | There are three common options available to an adversary: 2-tuple | |||
| (client IP, server IP), 3-tuple (client IP, server IP+port), or | (client IP, server IP), 3-tuple (client IP, server IP, server port), | |||
| 4-tuple (client IP+port, server IP+port). Future connections that | or 4-tuple (client IP, client port, server IP, server port). Future | |||
| match the tuple of information the censor records will be disrupted | connections that match the tuple of information the censor records | |||
| [Bock-2021]. | will be disrupted [Bock-2021]. | |||
| Residual censorship can sometimes be difficult to identify and can | Residual censorship can sometimes be difficult to identify and can | |||
| often complicate censorship measurement. | often complicate censorship measurement. | |||
| Trade-offs: The impact of residual censorship is to provide users | Trade-offs: The impact of residual censorship is to provide users | |||
| with further discouragement from trying to access forbidden content, | with further discouragement from trying to access forbidden content, | |||
| though it is not clear how successful it is at accomplishing this. | though it is not clear how successful it is at accomplishing this. | |||
| Empirical Examples: China has used 3-tuple residual censorship in | Empirical Examples: China has used 3-tuple residual censorship in | |||
| conjunction with their HTTP censorship for years, and researchers | conjunction with their HTTP censorship for years, and researchers | |||
| skipping to change at line 823 ¶ | skipping to change at line 823 ¶ | |||
| There are a variety of mechanisms that censors can use to block or | There are a variety of mechanisms that censors can use to block or | |||
| filter access to content by altering responses from the DNS | filter access to content by altering responses from the DNS | |||
| [AFNIC-2013] [ICANN-SSAC-2012], including blocking the response, | [AFNIC-2013] [ICANN-SSAC-2012], including blocking the response, | |||
| replying with an error message, or responding with an incorrect | replying with an error message, or responding with an incorrect | |||
| address. Note that there are now encrypted transports for DNS | address. Note that there are now encrypted transports for DNS | |||
| queries in DNS over HTTPS [RFC8484] and DNS over TLS [RFC7858] that | queries in DNS over HTTPS [RFC8484] and DNS over TLS [RFC7858] that | |||
| can mitigate interference with DNS queries between the stub and the | can mitigate interference with DNS queries between the stub and the | |||
| resolver. | resolver. | |||
| Responding to a DNS query with an incorrect address can be achieved | Responding to a DNS query with an incorrect address can be achieved | |||
| with on-path interception, off-path cache poisoning, and lying by the | with on-path interception, off-path cache poisoning, or lying by the | |||
| name server. | name server. | |||
| "DNS mangling" is a network-level technique of on-path interception | "DNS mangling" is a network-level technique of on-path interception | |||
| where an incorrect IP address is returned in response to a DNS query | where an incorrect IP address is returned in response to a DNS query | |||
| to a censored destination. Some Chinese networks, for example, do | to a censored destination. Some Chinese networks, for example, do | |||
| this. (We are not aware of any other wide-scale uses of mangling.) | this. (We are not aware of any other wide-scale uses of mangling.) | |||
| On those Chinese networks, each DNS request in transit is examined | On those Chinese networks, each DNS request in transit is examined | |||
| (presumably by network inspection technologies such as DPI), and if | (presumably by network inspection technologies such as DPI), and if | |||
| it matches a censored domain, a false response is injected. End | it matches a censored domain, a false response is injected. End | |||
| users can see this technique in action by simply sending DNS requests | users can see this technique in action by simply sending DNS requests | |||
| skipping to change at line 875 ¶ | skipping to change at line 875 ¶ | |||
| There are also cases of what is colloquially called "DNS lying", | There are also cases of what is colloquially called "DNS lying", | |||
| where a censor mandates that the DNS responses provided -- by an | where a censor mandates that the DNS responses provided -- by an | |||
| operator of a recursive resolver such as an Internet Access Provider | operator of a recursive resolver such as an Internet Access Provider | |||
| -- be different than what an authoritative name server would provide | -- be different than what an authoritative name server would provide | |||
| [Bortzmeyer-2015]. | [Bortzmeyer-2015]. | |||
| Trade-offs: These forms of DNS interference require the censor to | Trade-offs: These forms of DNS interference require the censor to | |||
| force a user to traverse a controlled DNS hierarchy (or intervening | force a user to traverse a controlled DNS hierarchy (or intervening | |||
| network on which the censor serves as an active pervasive attacker | network on which the censor serves as an active pervasive attacker | |||
| [RFC7624] to rewrite DNS responses) for the mechanism to be | [RFC7624] to rewrite DNS responses) for the mechanism to be | |||
| effective. It can be circumvented by using alternative DNS resolvers | effective. DNS interference can be circumvented by using alternative | |||
| (such as any of the public DNS resolvers) that may fall outside of | DNS resolvers (such as any of the public DNS resolvers) that may fall | |||
| the jurisdictional control of the censor or Virtual Private Network | outside of the jurisdictional control of the censor or Virtual | |||
| (VPN) technology. DNS mangling and cache poisoning also imply | Private Network (VPN) technology. DNS mangling and cache poisoning | |||
| returning an incorrect IP to those attempting to resolve a domain | also imply returning an incorrect IP to those attempting to resolve a | |||
| name, but in some cases the destination may be technically | domain name, but in some cases the destination may be technically | |||
| accessible. For example, over HTTP, the user may have another method | accessible. For example, over HTTP, the user may have another method | |||
| of obtaining the IP address of the desired site and may be able to | of obtaining the IP address of the desired site and may be able to | |||
| access it if the site is configured to be the default server | access it if the site is configured to be the default server | |||
| listening at this IP address. Target blocking has also been a | listening at this IP address. Target blocking has also been a | |||
| problem, as occasionally users outside of the censor's region will be | problem, as occasionally users outside of the censor's region will be | |||
| directed through DNS servers or DNS-rewriting network equipment | directed through DNS servers or DNS-rewriting network equipment | |||
| controlled by a censor, causing the request to fail. The ease of | controlled by a censor, causing the request to fail. The ease of | |||
| circumvention paired with the large risk of content blocking and | circumvention paired with the large risk of content blocking and | |||
| target blocking make DNS interference a partial, difficult, and less- | target blocking make DNS interference a partial, difficult, and less- | |||
| than-ideal censorship mechanism. | than-ideal censorship mechanism. | |||
| skipping to change at line 916 ¶ | skipping to change at line 916 ¶ | |||
| Empirical Examples: DNS interference, when properly implemented, is | Empirical Examples: DNS interference, when properly implemented, is | |||
| easy to identify based on the shortcomings identified above. Turkey | easy to identify based on the shortcomings identified above. Turkey | |||
| relied on DNS interference for its country-wide block of websites, | relied on DNS interference for its country-wide block of websites, | |||
| including Twitter and YouTube, for almost a week in March of 2014. | including Twitter and YouTube, for almost a week in March of 2014. | |||
| The ease of circumvention resulted in an increase in the popularity | The ease of circumvention resulted in an increase in the popularity | |||
| of Twitter until Turkish ISPs implemented an IP blocklist to achieve | of Twitter until Turkish ISPs implemented an IP blocklist to achieve | |||
| the governmental mandate [Zmijewski-2014]. Ultimately, Turkish ISPs | the governmental mandate [Zmijewski-2014]. Ultimately, Turkish ISPs | |||
| started hijacking all requests to Google and Level 3's international | started hijacking all requests to Google and Level 3's international | |||
| DNS resolvers [Zmijewski-2014]. DNS interference, when incorrectly | DNS resolvers [Zmijewski-2014]. DNS interference, when incorrectly | |||
| implemented, has resulted in some of the largest "censorship | implemented, has resulted in some of the largest censorship | |||
| disasters". In January 2014, China started directing all requests | disasters. In January 2014, China started directing all requests | |||
| passing through the Great Fire Wall to a single domain | passing through the Great Fire Wall to a single domain | |||
| "dongtaiwang.com", due to an improperly configured DNS poisoning | "dongtaiwang.com", due to an improperly configured DNS poisoning | |||
| attempt. This incident is thought to be the largest Internet service | attempt. This incident is thought to be the largest Internet service | |||
| outage in history [AFP-2014] [Anon-SIGCOMM12]. Countries such as | outage in history [AFP-2014] [Anon-SIGCOMM12]. Countries such as | |||
| China, Iran, Turkey, and the United States have discussed blocking | China, Turkey, and the United States have discussed blocking entire | |||
| entire Top-Level Domains (TLDs) as well, but only Iran has acted by | Top-Level Domains (TLDs) as well [Albert-2011]. DNS blocking is | |||
| blocking all Israeli (.il) domains [Albert-2011]. DNS blocking is | ||||
| commonly deployed in European countries to deal with undesirable | commonly deployed in European countries to deal with undesirable | |||
| content, such as child abuse content (Norway, United Kingdom, | content, such as | |||
| Belgium, Denmark, Finland, France, Germany, Ireland, Italy, Malta, | ||||
| the Netherlands, Poland, Spain, and Sweden [Wright-2013] | * child abuse content (Norway, United Kingdom, Belgium, Denmark, | |||
| [Eneman-2010]), online gambling (Belgium, Bulgaria, Czech Republic, | Finland, France, Germany, Ireland, Italy, Malta, the Netherlands, | |||
| Cyprus, Denmark, Estonia, France, Greece, Hungary, Italy, Latvia, | Poland, Spain, and Sweden [Wright-2013] [Eneman-2010]), | |||
| Lithuania, Poland, Portugal, Romania, Slovakia, Slovenia, and Spain | ||||
| (see Section 6.3.2 of [EC-gambling-2012], [EC-gambling-2019])), | * online gambling (Belgium, Bulgaria, Czech Republic, Cyprus, | |||
| copyright infringement (all European Economic Area countries), hate- | Denmark, Estonia, France, Greece, Hungary, Italy, Latvia, | |||
| speech and extremism (France [Hertel-2015]), and terrorism content | Lithuania, Poland, Portugal, Romania, Slovakia, Slovenia, and | |||
| (France [Hertel-2015]). | Spain (see Section 6.3.2 of [EC-gambling-2012], | |||
| [EC-gambling-2019])), | ||||
| * copyright infringement (all European Economic Area countries), | ||||
| * hate speech and extremism (France [Hertel-2015]), and | ||||
| * terrorism content (France [Hertel-2015]). | ||||
| 5.2. Transport Layer | 5.2. Transport Layer | |||
| 5.2.1. Performance Degradation | 5.2.1. Performance Degradation | |||
| While other interference techniques outlined in this section mostly | While other interference techniques outlined in this section mostly | |||
| focus on blocking or preventing access to content, it can be an | focus on blocking or preventing access to content, it can be an | |||
| effective censorship strategy in some cases to not entirely block | effective censorship strategy in some cases to not entirely block | |||
| access to a given destination or service but instead to degrade the | access to a given destination or service but instead to degrade the | |||
| performance of the relevant network connection. The resulting user | performance of the relevant network connection. The resulting user | |||
| skipping to change at line 997 ¶ | skipping to change at line 1003 ¶ | |||
| one of its primary technical censorship mechanisms [Ensafi-2013]. | one of its primary technical censorship mechanisms [Ensafi-2013]. | |||
| Iran has also used packet dropping as the mechanism for throttling | Iran has also used packet dropping as the mechanism for throttling | |||
| SSH [Aryan-2013]. These are but two examples of a ubiquitous | SSH [Aryan-2013]. These are but two examples of a ubiquitous | |||
| censorship practice. Notably, packet dropping during the handshake | censorship practice. Notably, packet dropping during the handshake | |||
| or working connection is the only interference technique observed for | or working connection is the only interference technique observed for | |||
| QUIC traffic to date (e.g., in India, Iran, Russia, and Uganda | QUIC traffic to date (e.g., in India, Iran, Russia, and Uganda | |||
| [Elmenhorst-2021] [Elmenhorst-2022]). | [Elmenhorst-2021] [Elmenhorst-2022]). | |||
| 5.2.3. RST Packet Injection | 5.2.3. RST Packet Injection | |||
| Packet injection, generally, refers to a man-in-the-middle (MITM) | Packet injection, generally, refers to a machine-in-the-middle (MITM) | |||
| network interference technique that spoofs packets in an established | network interference technique that spoofs packets in an established | |||
| traffic stream. RST packets are normally used to let one side of a | traffic stream. RST packets are normally used to let one side of a | |||
| TCP connection know the other side has stopped sending information | TCP connection know the other side has stopped sending information | |||
| and that the receiver should close the connection. RST packet | and that the receiver should close the connection. RST packet | |||
| injection is a specific type of packet injection attack that is used | injection is a specific type of packet injection attack that is used | |||
| to interrupt an established stream by sending RST packets to both | to interrupt an established stream by sending RST packets to both | |||
| sides of a TCP connection; as each receiver thinks the other has | sides of a TCP connection; as each receiver thinks the other has | |||
| dropped the connection, the session is terminated. | dropped the connection, the session is terminated. | |||
| QUIC is not vulnerable to these types of injection attacks once the | QUIC is not vulnerable to these types of injection attacks once the | |||
| skipping to change at line 1025 ¶ | skipping to change at line 1031 ¶ | |||
| Trade-offs: Although ineffective against non-TCP protocols (QUIC, | Trade-offs: Although ineffective against non-TCP protocols (QUIC, | |||
| IPsec), RST packet injection has a few advantages that make it | IPsec), RST packet injection has a few advantages that make it | |||
| extremely popular as a technique employed for censorship. RST packet | extremely popular as a technique employed for censorship. RST packet | |||
| injection is an out-of-band interference mechanism, allowing the | injection is an out-of-band interference mechanism, allowing the | |||
| avoidance of the QoS bottleneck that one can encounter with inline | avoidance of the QoS bottleneck that one can encounter with inline | |||
| techniques such as packet dropping. This out-of-band property allows | techniques such as packet dropping. This out-of-band property allows | |||
| a censor to inspect a copy of the information, usually mirrored by an | a censor to inspect a copy of the information, usually mirrored by an | |||
| optical splitter, making it an ideal pairing for DPI and protocol | optical splitter, making it an ideal pairing for DPI and protocol | |||
| identification [Weaver-2009]. (This asynchronous version of a MITM | identification [Weaver-2009]. (This asynchronous version of a MITM | |||
| is often called a man-on-the-side (MOTS).) RST packet injection also | is often called a machine-on-the-side (MOTS).) RST packet injection | |||
| has the advantage of only requiring one of the two endpoints to | also has the advantage of only requiring one of the two endpoints to | |||
| accept the spoofed packet for the connection to be interrupted. | accept the spoofed packet for the connection to be interrupted. | |||
| The difficult part of RST packet injection is spoofing "enough" | The difficult part of RST packet injection is spoofing "enough" | |||
| correct information to ensure one endpoint accepts a RST packet as | correct information to ensure one endpoint accepts a RST packet as | |||
| legitimate; this generally implies a correct IP, port, and TCP | legitimate; this generally implies a correct IP, port, and TCP | |||
| sequence number. The sequence number is the hardest to get correct, | sequence number. The sequence number is the hardest to get correct, | |||
| as [RFC0793] specifies a RST packet should be in sequence to be | as [RFC9293] specifies that a RST packet should be in sequence to be | |||
| accepted, although that RFC also recommends allowing in-window | accepted, although that RFC also recommends allowing in-window | |||
| packets as "good enough". This in-window recommendation is | packets. This in-window recommendation is important; if it is | |||
| important; if it is implemented, it allows for successful Blind RST | implemented, it allows for successful Blind RST Injection attacks | |||
| Injection attacks [Netsec-2011]. When in-window sequencing is | [Netsec-2011]. When in-window sequencing is allowed, it is trivial | |||
| allowed, it is trivial to conduct a Blind RST Injection. While the | to conduct a Blind RST Injection. While the term "blind" injection | |||
| term "blind" injection implies the censor doesn't know any sensitive | implies the censor doesn't know any sensitive sequencing information | |||
| sequencing information about the TCP stream they are injecting into, | about the TCP stream they are injecting into, they can simply | |||
| they can simply enumerate all ~70000 possible windows. This is | enumerate all ~70000 possible windows. This is particularly useful | |||
| particularly useful for interrupting encrypted/obfuscated protocols | for interrupting encrypted/obfuscated protocols such as SSH or Tor | |||
| such as SSH or Tor [Gilad]. Some censorship evasion systems work by | [Gilad]. Some censorship evasion systems work by trying to confuse | |||
| trying to confuse the censor into tracking incorrect information, | the censor into tracking incorrect information, rendering their RST | |||
| rendering their RST packet injection useless [Khattak-2013] | packet injection useless [Khattak-2013] [Wang-2017] [Li-2017] | |||
| [Wang-2017] [Li-2017] [Bock-2019] [Wang-2020]. | [Bock-2019] [Wang-2020]. | |||
| RST packet injection relies on a stateful network, making it useless | RST packet injection relies on a stateful network, making it useless | |||
| against UDP connections. RST packet injection is among the most | against UDP connections. RST packet injection is among the most | |||
| popular censorship techniques used today given its versatile nature | popular censorship techniques used today given its versatile nature | |||
| and effectiveness against all types of TCP traffic. Recent research | and effectiveness against all types of TCP traffic. Recent research | |||
| shows that a TCP RST packet injection attack can even work in the | shows that a TCP RST packet injection attack can even work in the | |||
| case of an off-path attacker [Cao-2016]. | case of an off-path attacker [Cao-2016]. | |||
| Empirical Examples: RST packet injection, as mentioned above, is most | Empirical Examples: RST packet injection, as mentioned above, is most | |||
| often paired with identification techniques that require splitting, | often paired with identification techniques that require splitting, | |||
| skipping to change at line 1131 ¶ | skipping to change at line 1137 ¶ | |||
| because incorrect BGP routes that leak globally can be fixed, but | because incorrect BGP routes that leak globally can be fixed, but | |||
| leaks within a jurisdiction can only be corrected by an ISP/IXP for | leaks within a jurisdiction can only be corrected by an ISP/IXP for | |||
| local users. | local users. | |||
| Empirical Examples: In 2008, Pakistan Telecom censored YouTube at the | Empirical Examples: In 2008, Pakistan Telecom censored YouTube at the | |||
| request of the Pakistan government by changing its BGP routes for the | request of the Pakistan government by changing its BGP routes for the | |||
| website. The new routes were announced to the ISP's upstream | website. The new routes were announced to the ISP's upstream | |||
| providers and beyond. The entire Internet began directing YouTube | providers and beyond. The entire Internet began directing YouTube | |||
| routes to Pakistan Telecom and continued doing so for many hours. In | routes to Pakistan Telecom and continued doing so for many hours. In | |||
| 2018, nearly all Google services and Google Cloud customers, like | 2018, nearly all Google services and Google Cloud customers, like | |||
| Spotify, all lost more than one hour of service after it lost control | Spotify, all lost more than one hour of service after Google lost | |||
| of several million of its IP addresses. Those IP prefixes were being | control of several million of its IP addresses. Those IP prefixes | |||
| misdirected to China Telecom, a Chinese government-owned ISP | were being misdirected to China Telecom, a Chinese government-owned | |||
| [Google-2018], in a manner similar to the BGP hijacking of US | ISP [Google-2018], in a manner similar to the BGP hijacking of US | |||
| government and military websites by China Telecom in 2010. ISPs in | government and military websites by China Telecom in 2010. ISPs in | |||
| both Russia (2022) and Myanmar (2021) have tried to hijack the same | both Russia (2022) and Myanmar (2021) have tried to hijack the same | |||
| Twitter prefix more than once [MANRS]. | Twitter prefix more than once [MANRS]. | |||
| 5.4. Multi-layer and Non-layer | 5.4. Multi-layer and Non-layer | |||
| 5.4.1. Distributed Denial of Service (DDoS) | 5.4.1. Distributed Denial of Service (DDoS) | |||
| Distributed Denial of Service attacks are a common attack mechanism | Distributed Denial of Service attacks are a common attack mechanism | |||
| used by "hacktivists" and malicious hackers. Censors have also used | used by "hacktivists" and malicious hackers. Censors have also used | |||
| DDoS in the past for a variety of reasons. There is a wide variety | DDoS in the past for a variety of reasons. There is a wide variety | |||
| of DDoS attacks [Wikip-DoS]. However, at a high level, two possible | of DDoS attacks [Wikip-DoS]. However, at a high level, two possible | |||
| impacts from the attack tend to occur: a flood attack results in the | impacts from the attack tend to occur: a flood attack results in the | |||
| service being unusable while resources are being spent to flood the | service being unusable while resources are being spent to flood the | |||
| service, and a crash attack aims to crash the service so resources | service, and a crash attack aims to crash the service so resources | |||
| can be reallocated elsewhere without "releasing" the service. | can be reallocated elsewhere without "releasing" the service. | |||
| Trade-offs: DDoS is an appealing mechanism when a censor would like | Trade-offs: DDoS is an appealing mechanism when a censor would like | |||
| to prevent all access to undesirable content, instead of only | to prevent all access (not just regional access) to undesirable | |||
| preventing access in their region for a limited period of time. The | content for a limited period of time. Temporal impermanence is | |||
| latter is really the only uniquely beneficial feature for DDoS as a | really the only uniquely beneficial feature of DDoS as a technique | |||
| technique employed for censorship. The resources required to carry | employed for censorship. The resources required to carry out a | |||
| out a successful DDoS against major targets are computationally | successful DDoS against major targets are computationally expensive, | |||
| expensive, usually requiring rental or ownership of a malicious | usually requiring rental or ownership of a malicious distributed | |||
| distributed platform such as a botnet, and they are imprecise. DDoS | platform such as a botnet, and they are imprecise. DDoS is an | |||
| is an incredibly crude censorship technique and appears to largely be | incredibly crude censorship technique and appears to largely be used | |||
| used as a timely, easy-to-access mechanism for blocking undesirable | as a timely, easy-to-access mechanism for blocking undesirable | |||
| content for a limited period of time. | content for a limited period of time. | |||
| Empirical Examples: In 2012, the U.K.'s signals intelligence | Empirical Examples: In 2012, the U.K.'s signals intelligence | |||
| organization, the Government Communications Headquarters (GCHQ), used | organization, the Government Communications Headquarters (GCHQ), used | |||
| DDoS to temporarily shutdown Internet Relay Chat (IRC) chat rooms | DDoS to temporarily shutdown Internet Relay Chat (IRC) chat rooms | |||
| frequented by members of Anonymous using the Syn Flood DDoS method; | frequented by members of Anonymous using the Syn Flood DDoS method; | |||
| Syn Flood exploits the handshake used by TCP to overload the victim | Syn Flood exploits the handshake used by TCP to overload the victim | |||
| server with so many requests that legitimate traffic becomes slow or | server with so many requests that legitimate traffic becomes slow or | |||
| impossible [Schone-2014] [CERT-2000]. Dissenting opinion websites | impossible [NBC-2014] [CERT-2000]. Dissenting opinion websites are | |||
| are frequently victims of DDoS around politically sensitive events | frequently victims of DDoS around politically sensitive events like | |||
| like the DDoS in Burma [Villeneuve-2011]. Controlling parties in | the DDoS in Burma [Villeneuve-2011]. Controlling parties in Russia | |||
| Russia [Kravtsova-2012], Zimbabwe [Orion-2013], and Malaysia | [Kravtsova-2012], Zimbabwe [Orion-2013], and Malaysia | |||
| [Muncaster-2013] have been accused of using DDoS to interrupt | [Muncaster-2013] have been accused of using DDoS to interrupt | |||
| opposition support and access during elections. In 2015, China | opposition support and access during elections. In 2015, China | |||
| launched a DDoS attack using a true MITM system (dubbed "Great | launched a DDoS attack using a true MITM system (dubbed "Great | |||
| Cannon"), collocated with the Great Firewall, that was able to inject | Cannon"), collocated with the Great Firewall, that was able to inject | |||
| JavaScript code into web visits to a Chinese search engine that | JavaScript code into web visits to a Chinese search engine that | |||
| commandeered those user agents to send DDoS traffic to various sites | commandeered those user agents to send DDoS traffic to various sites | |||
| [Marczak-2015]. | [Marczak-2015]. | |||
| 5.4.2. Censorship in Depth | 5.4.2. Censorship in Depth | |||
| skipping to change at line 1247 ¶ | skipping to change at line 1253 ¶ | |||
| Self-censorship is difficult to document as it manifests primarily | Self-censorship is difficult to document as it manifests primarily | |||
| through a lack of undesirable content. Tools that encourage self- | through a lack of undesirable content. Tools that encourage self- | |||
| censorship may lead a prospective speaker to believe that speaking | censorship may lead a prospective speaker to believe that speaking | |||
| increases the risk of unfavorable outcomes for the speaker (technical | increases the risk of unfavorable outcomes for the speaker (technical | |||
| monitoring, identification requirements, etc.). Reporters Without | monitoring, identification requirements, etc.). Reporters Without | |||
| Borders exemplify methods of imposing self-censorship in their annual | Borders exemplify methods of imposing self-censorship in their annual | |||
| World Press Freedom Index reports [RWB-2020]. | World Press Freedom Index reports [RWB-2020]. | |||
| 6.3. Server Takedown | 6.3. Server Takedown | |||
| As mentioned in passing by [Murdoch-2011], servers must have a | As mentioned in passing by [Murdoch-2008], servers must have a | |||
| physical location somewhere in the world. If undesirable content is | physical location somewhere in the world. If undesirable content is | |||
| hosted in the censoring country, the servers can be physically | hosted in the censoring country, the servers can be physically | |||
| seized, or -- in cases where a server is virtualized in a cloud | seized, or -- in cases where a server is virtualized in a cloud | |||
| infrastructure where it may not necessarily have a fixed physical | infrastructure where it may not necessarily have a fixed physical | |||
| location -- the hosting provider can be required to prevent access. | location -- the hosting provider can be required to prevent access. | |||
| 6.4. Notice and Takedown | 6.4. Notice and Takedown | |||
| In many countries, legal mechanisms exist where an individual or | In many countries, legal mechanisms exist where an individual or | |||
| other content provider can issue a legal request to a content host | other content provider can issue a legal request to a content host | |||
| skipping to change at line 1312 ¶ | skipping to change at line 1318 ¶ | |||
| Lastly, the empirical examples demonstrate that censorship techniques | Lastly, the empirical examples demonstrate that censorship techniques | |||
| can evolve quickly, and experience shows that this document can only | can evolve quickly, and experience shows that this document can only | |||
| be a point-in-time statement. Future work might extend this document | be a point-in-time statement. Future work might extend this document | |||
| with updates and new techniques described using a comparable | with updates and new techniques described using a comparable | |||
| methodology. | methodology. | |||
| 8. IANA Considerations | 8. IANA Considerations | |||
| This document has no IANA actions. | This document has no IANA actions. | |||
| 9. Informative References | 9. Security Considerations | |||
| This document is a survey of existing literature on network | ||||
| censorship techniques. As such, it does not introduce any new | ||||
| security considerations to be taken into account beyond what is | ||||
| already discussed in each paper surveyed. | ||||
| 10. Informative References | ||||
| [AFNIC-2013] | [AFNIC-2013] | |||
| AFNIC, "Report of the AFNIC Scientific Council: | AFNIC, "Report of the AFNIC Scientific Council: | |||
| Consequences of DNS-based Internet filtering", January | Consequences of DNS-based Internet filtering", January | |||
| 2013, | 2013, | |||
| <http://www.afnic.fr/medias/documents/conseilscientifique/ | <http://www.afnic.fr/medias/documents/conseilscientifique/ | |||
| SC-consequences-of-DNS-based-Internet-filtering.pdf>. | SC-consequences-of-DNS-based-Internet-filtering.pdf>. | |||
| [AFP-2014] AFP, "China Has Massive Internet Breakdown Reportedly | [AFP-2014] AFP, "China Has Massive Internet Breakdown Reportedly | |||
| Caused By Their Own Censoring Tools", January 2014, | Caused By Their Own Censoring Tools", January 2014, | |||
| skipping to change at line 1350 ¶ | skipping to change at line 1363 ¶ | |||
| 2013, <https://en.greatfire.org/blog/2013/jan/github- | 2013, <https://en.greatfire.org/blog/2013/jan/github- | |||
| blocked-china-how-it-happened-how-get-around-it-and-where- | blocked-china-how-it-happened-how-get-around-it-and-where- | |||
| it-will-take-us>. | it-will-take-us>. | |||
| [Anonymous-2014] | [Anonymous-2014] | |||
| Anonymous, "Towards a Comprehensive Picture of the Great | Anonymous, "Towards a Comprehensive Picture of the Great | |||
| Firewall's DNS Censorship", August 2014, | Firewall's DNS Censorship", August 2014, | |||
| <https://www.usenix.org/system/files/conference/foci14/ | <https://www.usenix.org/system/files/conference/foci14/ | |||
| foci14-anonymous.pdf>. | foci14-anonymous.pdf>. | |||
| [AP-2012] Associated Press, "Sattar Beheshit, Iranian Blogger, Was | ||||
| Beaten In Prison According To Prosecutor", 2012, | ||||
| <http://www.huffingtonpost.com/2012/12/03/sattar-beheshit- | ||||
| iran_n_2233125.html>. | ||||
| [Aryan-2013] | [Aryan-2013] | |||
| Aryan, S., Aryan, H., and J. A. Halderman, "Internet | Aryan, S., Aryan, H., and J. A. Halderman, "Internet | |||
| Censorship in Iran: A First Look", 2012, | Censorship in Iran: A First Look", 2012, | |||
| <https://jhalderm.com/pub/papers/iran-foci13.pdf>. | <https://jhalderm.com/pub/papers/iran-foci13.pdf>. | |||
| [BBC-2013] BBC News, "Google and Microsoft agree steps to block abuse | [BBC-2013] BBC News, "Google and Microsoft agree steps to block abuse | |||
| images", November 2013, | images", November 2013, | |||
| <http://www.bbc.com/news/uk-24980765>. | <http://www.bbc.com/news/uk-24980765>. | |||
| [BBC-2013b] | [BBC-2013b] | |||
| BBC, "China employs two million microblog monitors state | BBC, "China employs two million microblog monitors state | |||
| media say", 2013, | media say", 2013, | |||
| <http://www.bbc.com/news/world-asia-china-2439695>. | <https://www.bbc.com/news/world-asia-china-24396957>. | |||
| [Bentham-1791] | ||||
| Bentham, J., "Panopticon Or the Inspection House", 1791, | ||||
| <https://www.google.com/books/edition/_/ | ||||
| Ec4TAAAAQAAJ?hl=en>. | ||||
| [Bock-2019] | [Bock-2019] | |||
| Bock, K., Hughey, G., Qiang, X., and D. Levin, "Geneva: | Bock, K., Hughey, G., Qiang, X., and D. Levin, "Geneva: | |||
| Evolving Censorship Evasion Strategies", | Evolving Censorship Evasion Strategies", | |||
| DOI 10.1145/3319535.3363189, November 2019, | DOI 10.1145/3319535.3363189, November 2019, | |||
| <https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf>. | <https://geneva.cs.umd.edu/papers/geneva_ccs19.pdf>. | |||
| [Bock-2020] | [Bock-2020] | |||
| Bock, K., Fax, Y., Reese, K., Singh, J., and D. Levin, | Bock, K., Fax, Y., Reese, K., Singh, J., and D. Levin, | |||
| "Detecting and Evading Censorship-in-Depth: A Case Study | "Detecting and Evading Censorship-in-Depth: A Case Study | |||
| skipping to change at line 1424 ¶ | skipping to change at line 1427 ¶ | |||
| <https://labs.ripe.net/Members/stephane_bortzmeyer/dns- | <https://labs.ripe.net/Members/stephane_bortzmeyer/dns- | |||
| censorship-dns-lies-seen-by-atlas-probes>. | censorship-dns-lies-seen-by-atlas-probes>. | |||
| [Boyle-1997] | [Boyle-1997] | |||
| Boyle, J., "Foucault in Cyberspace: Surveillance, | Boyle, J., "Foucault in Cyberspace: Surveillance, | |||
| Sovereignty, and Hardwired Censors", 66 University of | Sovereignty, and Hardwired Censors", 66 University of | |||
| Cincinnati Law Review 177-205, 1997, | Cincinnati Law Review 177-205, 1997, | |||
| <https://scholarship.law.duke.edu/ | <https://scholarship.law.duke.edu/ | |||
| faculty_scholarship/619/>. | faculty_scholarship/619/>. | |||
| [Bristow-2008] | ||||
| Bristow, M., "China's internet 'spin doctors'", BBC News, | ||||
| December 2008, | ||||
| <http://news.bbc.co.uk/2/hi/asia-pacific/7783640.stm>. | ||||
| [Calamur-2013] | ||||
| Calamur, K., "Prominent Egyptian Blogger Arrested", | ||||
| November 2013, <http://www.npr.org/blogs/thetwo- | ||||
| way/2013/11/29/247820503/prominent-egyptian-blogger- | ||||
| arrested>. | ||||
| [Cao-2016] Cao, Y., Qian, Z., Wang, Z., Dao, T., Krishnamurthy, S., | [Cao-2016] Cao, Y., Qian, Z., Wang, Z., Dao, T., Krishnamurthy, S., | |||
| and L. Marvel, "Off-Path TCP Exploits: Global Rate Limit | and L. Marvel, "Off-Path TCP Exploits: Global Rate Limit | |||
| Considered Dangerous", August 2016, | Considered Dangerous", August 2016, | |||
| <https://www.usenix.org/system/files/conference/ | <https://www.usenix.org/system/files/conference/ | |||
| usenixsecurity16/sec16_paper_cao.pdf>. | usenixsecurity16/sec16_paper_cao.pdf>. | |||
| [CERT-2000] | [CERT-2000] | |||
| CERT, "TCP SYN Flooding and IP Spoofing Attacks", 2000, | CERT, "CERT Advisory CA-1996-21 TCP SYN Flooding and IP | |||
| <http://www.cert.org/historical/advisories/CA- | Spoofing Attacks", 2000, | |||
| 1996-21.cfm>. | <https://vuls.cert.org/confluence/display/historical/ | |||
| CERT+Advisory+CA- | ||||
| 1996-21+TCP+SYN+Flooding+and+IP+Spoofing+Attacks>. | ||||
| [Chai-2019] | [Chai-2019] | |||
| Chai, Z., Ghafari, A., and A. Houmansadr, "On the | Chai, Z., Ghafari, A., and A. Houmansadr, "On the | |||
| Importance of Encrypted-SNI (ESNI) to Censorship | Importance of Encrypted-SNI (ESNI) to Censorship | |||
| Circumvention", 2019, | Circumvention", 2019, | |||
| <https://www.usenix.org/system/files/ | <https://www.usenix.org/system/files/ | |||
| foci19-paper_chai_update.pdf>. | foci19-paper_chai_update.pdf>. | |||
| [Cheng-2010] | [Cheng-2010] | |||
| Cheng, J., "Google stops Hong Kong auto-redirect as China | Cheng, J., "Google stops Hong Kong auto-redirect as China | |||
| skipping to change at line 1541 ¶ | skipping to change at line 1535 ¶ | |||
| [EC-2012] European Commission, "Summary of the results of the Public | [EC-2012] European Commission, "Summary of the results of the Public | |||
| Consultation on the future of electronic commerce in the | Consultation on the future of electronic commerce in the | |||
| Internal Market and the implementation of the Directive on | Internal Market and the implementation of the Directive on | |||
| electronic commerce (2000/31/EC)", January 2012, | electronic commerce (2000/31/EC)", January 2012, | |||
| <https://ec.europa.eu/information_society/newsroom/image/ | <https://ec.europa.eu/information_society/newsroom/image/ | |||
| document/2017-4/ | document/2017-4/ | |||
| consultation_summary_report_en_2010_42070.pdf>. | consultation_summary_report_en_2010_42070.pdf>. | |||
| [EC-gambling-2012] | [EC-gambling-2012] | |||
| European Commission, "Online gambling in the Internal | European Commission, "Online gambling in the Internal | |||
| Market", 2012, <https://eur-lex.europa.eu/legal- | Market Accompanying the document Communication from the | |||
| Commission to the European Parliament, the Council, the | ||||
| Economic and Social Committee and the Committee of the | ||||
| Regions Towards a comprehensive framework for online | ||||
| gambling", 2012, <https://eur-lex.europa.eu/legal- | ||||
| content/EN/TXT/?uri=CELEX:52012SC0345>. | content/EN/TXT/?uri=CELEX:52012SC0345>. | |||
| [EC-gambling-2019] | [EC-gambling-2019] | |||
| European Commission, "Evaluation of regulatory tools for | European Commission, "Evaluation of regulatory tools for | |||
| enforcing online gambling rules and channelling demand | enforcing online gambling rules and channelling demand | |||
| towards controlled offers", January 2019, | towards controlled offers", January 2019, | |||
| <https://ec.europa.eu/growth/content/evaluation- | <https://ec.europa.eu/growth/content/evaluation- | |||
| regulatory-tools-enforcing-online-gambling-rules-and- | regulatory-tools-enforcing-online-gambling-rules-and- | |||
| channelling-demand-towards-1_en>. | channelling-demand-towards-1_en>. | |||
| [EFF-2017] Malcom, J., Rossi, G., and M. Stoltz, "Which Internet | [EFF-2017] Malcom, J., Rossi, G., and M. Stoltz, "Which Internet | |||
| registries offer the best protection for domain owners?", | registries offer the best protection for domain owners?", | |||
| Electronic Frontier Foundation, July 2017, | Electronic Frontier Foundation, July 2017, | |||
| <https://www.eff.org/files/2017/08/02/ | <https://www.eff.org/files/2017/08/02/ | |||
| domain_registry_whitepaper.pdf>. | domain_registry_whitepaper.pdf>. | |||
| [ekr-2021] Rescorla, E., "Overview of Apple's Client-side CSAM | [ekr-2021] Rescorla, E., "Overview of Apple's Client-side CSAM | |||
| Scanning", August 2021, | Scanning", August 2021, | |||
| <https://educatedguesswork.org/posts/apple-csam-intro/>. | <https://educatedguesswork.org/posts/apple-csam-intro/>. | |||
| [Ellul-1973] | ||||
| Ellul, J., "Propaganda: The Formation of Men's Attitudes", | ||||
| 1973, <https://www.penguinrandomhouse.com/books/46234/ | ||||
| propaganda-by-jacques-ellul/>. | ||||
| [Elmenhorst-2021] | [Elmenhorst-2021] | |||
| Elmenhorst, K., Schuetz, B., Aschenbruck, N., and S. | Elmenhorst, K., Schuetz, B., Aschenbruck, N., and S. | |||
| Basso, "Web Censorship Measurements of HTTP/3 over QUIC", | Basso, "Web Censorship Measurements of HTTP/3 over QUIC", | |||
| IMC '21: Proceedings of the 21st ACM Internet Measurement | IMC '21: Proceedings of the 21st ACM Internet Measurement | |||
| Conference, Pages 276-282, DOI 10.1145/3487552.3487836, | Conference, Pages 276-282, DOI 10.1145/3487552.3487836, | |||
| November 2021, | November 2021, | |||
| <https://dl.acm.org/doi/pdf/10.1145/3487552.3487836>. | <https://dl.acm.org/doi/pdf/10.1145/3487552.3487836>. | |||
| [Elmenhorst-2022] | [Elmenhorst-2022] | |||
| Elmenhorst, K., "A Quick Look at QUIC Censorship", April | Elmenhorst, K., "A Quick Look at QUIC Censorship", April | |||
| 2022, | 2022, | |||
| <https://www.opentech.fund/news/a-quick-look-at-quic/>. | <https://www.opentech.fund/news/a-quick-look-at-quic/>. | |||
| [Eneman-2010] | [Eneman-2010] | |||
| Eneman, M., "ISPs filtering of child abusive material: A | Eneman, M., "Internet service provider (ISP) filtering of | |||
| critical reflection of its effectiveness", 2010, | child-abusive material: A critical reflection of its | |||
| <https://www.gu.se/forskning/ | effectiveness", DOI 10.1080/13552601003760014, June 2010, | |||
| publikation/?publicationId=96592>. | <https://www.tandfonline.com/doi/ | |||
| abs/10.1080/13552601003760014>. | ||||
| [Ensafi-2013] | [Ensafi-2013] | |||
| Ensafi, R., Knockel, J., Alexander, G., and J.R. Crandall, | Ensafi, R., Knockel, J., Alexander, G., and J.R. Crandall, | |||
| "Detecting Intentional Packet Drops on the Internet via | "Detecting Intentional Packet Drops on the Internet via | |||
| TCP/IP Side Channels: Extended Version", | TCP/IP Side Channels: Extended Version", | |||
| DOI 10.48550/arXiv.1312.5739, December 2013, | DOI 10.48550/arXiv.1312.5739, December 2013, | |||
| <http://arxiv.org/pdf/1312.5739v1.pdf>. | <http://arxiv.org/pdf/1312.5739v1.pdf>. | |||
| [Fareed-2008] | ||||
| Fareed, M., "China joins a turf war", The Guardian, | ||||
| September 2008, | ||||
| <http://www.theguardian.com/media/2008/sep/22/ | ||||
| chinathemedia.marketingandpr>. | ||||
| [Fifield-2015] | [Fifield-2015] | |||
| Fifield, D., Lan, C., Hynes, R., Wegmann, P., and V. | Fifield, D., Lan, C., Hynes, R., Wegmann, P., and V. | |||
| Paxson, "Blocking-resistant communication through domain | Paxson, "Blocking-resistant communication through domain | |||
| fronting", DOI 10.1515/popets-2015-0009, May 2015, | fronting", DOI 10.1515/popets-2015-0009, May 2015, | |||
| <https://petsymposium.org/2015/papers/03_Fifield.pdf>. | <https://petsymposium.org/2015/papers/03_Fifield.pdf>. | |||
| [Gao-2014] Gao, H., "Tiananmen, Forgotten", The New York Times, June | ||||
| 2014, <http://www.nytimes.com/2014/06/04/opinion/ | ||||
| tiananmen-forgotten.html>. | ||||
| [Gatlan-2019] | [Gatlan-2019] | |||
| Gatlan, S., "South Korea is Censoring the Internet by | Gatlan, S., "South Korea is Censoring the Internet by | |||
| Snooping on SNI Traffic", February 2019, | Snooping on SNI Traffic", February 2019, | |||
| <https://www.bleepingcomputer.com/news/security/south- | <https://www.bleepingcomputer.com/news/security/south- | |||
| korea-is-censoring-the-internet-by-snooping-on-sni- | korea-is-censoring-the-internet-by-snooping-on-sni- | |||
| traffic/>. | traffic/>. | |||
| [Gilad] Gilad, Y. and A. Herzberg, "Off-Path TCP Injection | [Gilad] Gilad, Y. and A. Herzberg, "Off-Path TCP Injection | |||
| Attacks", ACM Transactions on Information and System | Attacks", ACM Transactions on Information and System | |||
| Security, Volume 16, Issue 4, Article No.: 13, pp. 1-32, | Security, Volume 16, Issue 4, Article No.: 13, pp. 1-32, | |||
| skipping to change at line 1645 ¶ | skipping to change at line 1629 ¶ | |||
| protection law in Europe", 2015, | protection law in Europe", 2015, | |||
| <https://support.google.com/legal/contact/ | <https://support.google.com/legal/contact/ | |||
| lr_eudpa?product=websearch>. | lr_eudpa?product=websearch>. | |||
| [Grover-2019] | [Grover-2019] | |||
| Grover, G., Singh, K., and E. Hickok, Ed., "Reliance Jio | Grover, G., Singh, K., and E. Hickok, Ed., "Reliance Jio | |||
| is using SNI inspection to block websites", November 2019, | is using SNI inspection to block websites", November 2019, | |||
| <https://cis-india.org/internet-governance/blog/reliance- | <https://cis-india.org/internet-governance/blog/reliance- | |||
| jio-is-using-sni-inspection-to-block-websites>. | jio-is-using-sni-inspection-to-block-websites>. | |||
| [Guardian-2014] | ||||
| The Guardian, "Chinese blogger jailed under crackdown on | ||||
| 'internet rumours'", April 2014, | ||||
| <http://www.theguardian.com/world/2014/apr/17/chinese- | ||||
| blogger-jailed-crackdown-internet-rumours-qin-zhihui>. | ||||
| [HADOPI] Hadopi, "Hadopi | Haute Autorité pour la diffusion des | [HADOPI] Hadopi, "Hadopi | Haute Autorité pour la diffusion des | |||
| oeuvres et la protection des droits sur internet", | oeuvres et la protection des droits sur internet", | |||
| <https://www.hadopi.fr/>. | <https://www.hadopi.fr/>. | |||
| [Halley-2008] | [Halley-2008] | |||
| Halley, B., "How DNS cache poisoning works", October 2008, | Halley, B., "How DNS cache poisoning works", October 2008, | |||
| <https://www.networkworld.com/article/2277316/tech- | <https://www.networkworld.com/article/2277316/tech- | |||
| primers/tech-primers-how-dns-cache-poisoning-works.html>. | primers/tech-primers-how-dns-cache-poisoning-works.html>. | |||
| [Heacock-2009] | [Heacock-2009] | |||
| Heacock, R., "China shuts down Internet in Xinjiang region | Heacock, R., "China shuts down Internet in Xinjiang region | |||
| after riots", OpenNet Initiative, July 2009, | after riots", OpenNet Initiative, July 2009, | |||
| <https://opennet.net/blog/2009/07/china-shuts-down- | <https://opennet.net/blog/2009/07/china-shuts-down- | |||
| internet-xinjiang-region-after-riots>. | internet-xinjiang-region-after-riots>. | |||
| [Hepting-2011] | [Hepting-2011] | |||
| Wikipedia, "Hepting v. AT&T", 2011, | Wikipedia, "Hepting v. AT&T", September 2023, | |||
| <https://en.wikipedia.org/wiki/Hepting_v._AT%26T>. | <https://en.wikipedia.org/wiki/ | |||
| Hepting_v._AT%26T&oldid=1175143505>. | ||||
| [Hertel-2015] | [Hertel-2015] | |||
| Hertel, O., "Comment les autorités peuvent bloquer un site | Hertel, O., "Comment les autorités peuvent bloquer un site | |||
| Internet" [How authorities can block a website], March | Internet" [How authorities can block a website], March | |||
| 2015, <https://www.sciencesetavenir.fr/high-tech/comment- | 2015, <https://www.sciencesetavenir.fr/high-tech/comment- | |||
| les-autorites-peuvent-bloquer-un-site-internet_35828>. | les-autorites-peuvent-bloquer-un-site-internet_35828>. | |||
| [Hjelmvik-2010] | [Hjelmvik-2010] | |||
| Hjelmvik, E. and W. John, "Breaking and Improving Protocol | Hjelmvik, E. and W. John, "Breaking and Improving Protocol | |||
| Obfuscation", Technical Report No. 2010-05, ISSN | Obfuscation", Technical Report No. 2010-05, ISSN | |||
| 1652-926X, July 2010, | 1652-926X, July 2010, | |||
| <https://www.iis.se/docs/hjelmvik_breaking.pdf>. | <https://www.iis.se/docs/hjelmvik_breaking.pdf>. | |||
| [Hopkins-2011] | ||||
| Hopkins, C., "Communications Blocked in Libya, Qatari | ||||
| Blogger Arrested: This Week in Online Tyranny", ReadWrite, | ||||
| March 2011, <http://readwrite.com/2011/03/03/ | ||||
| communications_blocked_in_libya_this_week_in_onlin>. | ||||
| [Husak-2016] | [Husak-2016] | |||
| Husák, M., Čermák, M., Jirsík, T., and P. Čeleda, "HTTPS | Husák, M., Čermák, M., Jirsík, T., and P. Čeleda, "HTTPS | |||
| traffic analysis and client identification using passive | traffic analysis and client identification using passive | |||
| SSL/TLS fingerprinting", DOI 10.1186/s13635-016-0030-7, | SSL/TLS fingerprinting", DOI 10.1186/s13635-016-0030-7, | |||
| February 2016, <https://link.springer.com/article/10.1186/ | February 2016, <https://link.springer.com/article/10.1186/ | |||
| s13635-016-0030-7>. | s13635-016-0030-7>. | |||
| [ICANN-2012] | [ICANN-2012] | |||
| ICANN Security and Stability Advisory Committee, "Guidance | ICANN Security and Stability Advisory Committee, "Guidance | |||
| for Preparing Domain Name Orders, Seizures & Takedowns", | for Preparing Domain Name Orders, Seizures & Takedowns", | |||
| skipping to change at line 1739 ¶ | skipping to change at line 1712 ¶ | |||
| censorship-powered-by-us-technology/>. | censorship-powered-by-us-technology/>. | |||
| [Knockel-2021] | [Knockel-2021] | |||
| Knockel, J. and L. Ruan, "Measuring QQMail's automated | Knockel, J. and L. Ruan, "Measuring QQMail's automated | |||
| email censorship in China", FOCI '21: Proceedings of the | email censorship in China", FOCI '21: Proceedings of the | |||
| ACM SIGCOMM 2021 Workshop on Free and Open Communications | ACM SIGCOMM 2021 Workshop on Free and Open Communications | |||
| on the Internet, Pages 8-15, DOI 10.1145/3473604.3474560, | on the Internet, Pages 8-15, DOI 10.1145/3473604.3474560, | |||
| April 2021, | April 2021, | |||
| <https://dl.acm.org/doi/10.1145/3473604.3474560>. | <https://dl.acm.org/doi/10.1145/3473604.3474560>. | |||
| [Kopel-2013] | ||||
| Kopel, K., "Operation Seizing Our Sites: How the Federal | ||||
| Government is Taking Domain Names Without Prior Notice", | ||||
| Berkeley Technology Law Journal, DOI 10.15779/Z384Q3M, | ||||
| September 2013, <https://doi.org/10.15779/Z384Q3M>. | ||||
| [Kravtsova-2012] | [Kravtsova-2012] | |||
| Kravtsova, Y., "Cyberattacks Disrupt Opposition's | Kravtsova, Y., "Cyberattacks Disrupt Opposition's | |||
| Election", October 2012, | Election", The Moscow Times, October 2012, | |||
| <http://www.themoscowtimes.com/news/article/cyberattacks- | <http://www.themoscowtimes.com/news/article/cyberattacks- | |||
| disrupt-oppositions-election/470119.html>. | disrupt-oppositions-election/470119.html>. | |||
| [Leyba-2019] | [Leyba-2019] | |||
| Leyba, K., Edwards, B., Freeman, C., Crandall, J., and S. | Leyba, K., Edwards, B., Freeman, C., Crandall, J., and S. | |||
| Forrest, "Borders and Gateways: Measuring and Analyzing | Forrest, "Borders and gateways: measuring and analyzing | |||
| National AS Chokepoints", 2019, | national as chokepoints", COMPASS '19: Proceedings of the | |||
| <https://forrest.biodesign.asu.edu/data/publications/2019- | 2nd ACM SIGCAS Conference on Computing and Sustainable | |||
| compass-chokepoints.pdf>. | Societies, pages 184–194, DOI 10.1145/3314344.3332502, | |||
| July 2019, <https://doi.org/10.1145/3314344.3332502>. | ||||
| [Li-2017] Li, F., Razaghpanah, A., Molavi Kakhki, A., Akhavan Niaki, | [Li-2017] Li, F., Razaghpanah, A., Molavi Kakhki, A., Akhavan Niaki, | |||
| A., Choffnes, D., Gill, P., and A. Mislove, "lib•erate, | A., Choffnes, D., Gill, P., and A. Mislove, "lib•erate, | |||
| (n): a library for exposing (traffic-classification) rules | (n): a library for exposing (traffic-classification) rules | |||
| and avoiding them efficiently", | and avoiding them efficiently", | |||
| DOI 10.1145/3131365.3131376, November 2017, | DOI 10.1145/3131365.3131376, November 2017, | |||
| <https://david.choffnes.com/pubs/liberate-imc17.pdf>. | <https://david.choffnes.com/pubs/liberate-imc17.pdf>. | |||
| [Lomas-2019] | [Lomas-2019] | |||
| Lomas, N., "Github removes Tsunami Democràtic's APK after | Lomas, N., "Github removes Tsunami Democràtic's APK after | |||
| skipping to change at line 1790 ¶ | skipping to change at line 1758 ¶ | |||
| August 2015, | August 2015, | |||
| <https://www.usenix.org/system/files/conference/foci15/ | <https://www.usenix.org/system/files/conference/foci15/ | |||
| foci15-paper-marczak.pdf>. | foci15-paper-marczak.pdf>. | |||
| [Muncaster-2013] | [Muncaster-2013] | |||
| Muncaster, P., "Malaysian election sparks web blocking/ | Muncaster, P., "Malaysian election sparks web blocking/ | |||
| DDoS claims", The Register, May 2013, | DDoS claims", The Register, May 2013, | |||
| <http://www.theregister.co.uk/2013/05/09/ | <http://www.theregister.co.uk/2013/05/09/ | |||
| malaysia_fraud_elections_ddos_web_blocking/>. | malaysia_fraud_elections_ddos_web_blocking/>. | |||
| [Murdoch-2011] | [Murdoch-2008] | |||
| Murdoch, S. J. and R. Anderson, "Tools and Technology of | Murdoch, S. J. and R. Anderson, "Tools and Technology of | |||
| Internet Filtering", DOI 10.7551/mitpress/7617.003.0006, | Internet Filtering" in "Access Denied: The Practice and | |||
| 2011, <http://access.opennet.net/wp- | Policy of Global Internet Filtering", | |||
| content/uploads/2011/12/accessdenied-chapter-3.pdf>. | DOI 10.7551/mitpress/7617.003.0006, 2008, | |||
| <https://doi.org/10.7551/mitpress/7617.003.0006>. | ||||
| [NA-SK-2019] | [NA-SK-2019] | |||
| Morgus, R., Sherman, J., and S. Nam, "Analysis: South | Morgus, R., Sherman, J., and S. Nam, "Analysis: South | |||
| Korea's New Tool for Filtering Illegal Internet Content", | Korea's New Tool for Filtering Illegal Internet Content", | |||
| March 2019, <https://www.newamerica.org/cybersecurity- | March 2019, <https://www.newamerica.org/cybersecurity- | |||
| initiative/c2b/c2b-log/analysis-south-koreas-sni- | initiative/c2b/c2b-log/analysis-south-koreas-sni- | |||
| monitoring/>. | monitoring/>. | |||
| [Nabi-2013] | [Nabi-2013] | |||
| Nabi, Z., "The Anatomy of Web Censorship in Pakistan", | Nabi, Z., "The Anatomy of Web Censorship in Pakistan", | |||
| August 2013, <http://0b4af6cdc2f0c5998459-c0245c5c937c5ded | August 2013, <http://0b4af6cdc2f0c5998459-c0245c5c937c5ded | |||
| cca3f1764ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf | cca3f1764ecc9b2f.r43.cf2.rackcdn.com/12387-foci13-nabi.pdf | |||
| >. | >. | |||
| [NBC-2014] NBC News, "Exclusive: Snowden Docs Show UK Spies Attacked | ||||
| Anonymous, Hackers", February 2014, | ||||
| <http://www.nbcnews.com/feature/edward-snowden-interview/ | ||||
| exclusive-snowden-docs-show-uk-spies-attacked-anonymous- | ||||
| hackers-n21361>. | ||||
| [Netsec-2011] | [Netsec-2011] | |||
| n3t2.3c, "TCP-RST Injection", October 2011, | n3t2.3c, "TCP-RST Injection", October 2011, | |||
| <https://nets.ec/TCP-RST_Injection>. | <https://nets.ec/TCP-RST_Injection>. | |||
| [OONI-2018] | [OONI-2018] | |||
| Evdokimov, L., "Iran Protests: DPI blocking of Instagram | Evdokimov, L., "Iran Protests: DPI blocking of Instagram | |||
| (Part 2)", February 2018, | (Part 2)", February 2018, | |||
| <https://ooni.org/post/2018-iran-protests-pt2/>. | <https://ooni.org/post/2018-iran-protests-pt2/>. | |||
| [OONI-2019] | [OONI-2019] | |||
| Singh, S., Filastò, A., and M. Xynou, "China is now | Singh, S., Filastò, A., and M. Xynou, "China is now | |||
| blocking all language editions of Wikipedia", May 2019, | blocking all language editions of Wikipedia", May 2019, | |||
| <https://ooni.org/post/2019-china-wikipedia-blocking/>. | <https://ooni.org/post/2019-china-wikipedia-blocking/>. | |||
| [Orion-2013] | [Orion-2013] | |||
| Orion, E., "Zimbabwe election hit by hacking and DDoS | Orion, E., "Zimbabwe election hit by hacking and DDoS | |||
| attacks", 2013, | attacks", Wayback Machine archive, August 2013, <https://w | |||
| <http://www.theinquirer.net/inquirer/news/2287433/ | eb.archive.org/web/20130825010947/http://www.theinquirer.n | |||
| zimbabwe-election-hit-by-hacking-and-ddos-attacks>. | et/inquirer/news/2287433/zimbabwe-election-hit-by-hacking- | |||
| and-ddos-attacks>. | ||||
| [Patil-2019] | [Patil-2019] | |||
| Patil, S. and N. Borisov, "What can you learn from an | Patil, S. and N. Borisov, "What can you learn from an | |||
| IP?", Proceedings of the Applied Networking Research | IP?", Proceedings of the Applied Networking Research | |||
| Workshop, Pages 45-51, DOI 10.1145/3340301.3341133, July | Workshop, Pages 45-51, DOI 10.1145/3340301.3341133, July | |||
| 2019, <https://irtf.org/anrw/2019/ | 2019, <https://irtf.org/anrw/2019/ | |||
| anrw2019-final44-acmpaginated.pdf>. | anrw2019-final44-acmpaginated.pdf>. | |||
| [Porter-2005] | [Porter-2005] | |||
| Porter, T., "The Perils of Deep Packet Inspection", 2010, | Porter, T., "The Perils of Deep Packet Inspection", 2010, | |||
| skipping to change at line 1854 ¶ | skipping to change at line 1830 ¶ | |||
| Great Firewall of China", DOI 10.1145/3442381.3450076, | Great Firewall of China", DOI 10.1145/3442381.3450076, | |||
| April 2021, | April 2021, | |||
| <https://www.andrew.cmu.edu/user/nicolasc/publications/ | <https://www.andrew.cmu.edu/user/nicolasc/publications/ | |||
| Rambert-WWW21.pdf>. | Rambert-WWW21.pdf>. | |||
| [Reda-2017] | [Reda-2017] | |||
| Reda, F., "New EU law prescribes website blocking in the | Reda, F., "New EU law prescribes website blocking in the | |||
| name of "consumer protection"", November 2017, | name of "consumer protection"", November 2017, | |||
| <https://felixreda.eu/2017/11/eu-website-blocking/>. | <https://felixreda.eu/2017/11/eu-website-blocking/>. | |||
| [RFC0793] Postel, J., "Transmission Control Protocol", RFC 793, | ||||
| DOI 10.17487/RFC0793, September 1981, | ||||
| <https://www.rfc-editor.org/info/rfc793>. | ||||
| [RFC6066] Eastlake 3rd, D., "Transport Layer Security (TLS) | [RFC6066] Eastlake 3rd, D., "Transport Layer Security (TLS) | |||
| Extensions: Extension Definitions", RFC 6066, | Extensions: Extension Definitions", RFC 6066, | |||
| DOI 10.17487/RFC6066, January 2011, | DOI 10.17487/RFC6066, January 2011, | |||
| <https://www.rfc-editor.org/info/rfc6066>. | <https://www.rfc-editor.org/info/rfc6066>. | |||
| [RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., | [RFC7624] Barnes, R., Schneier, B., Jennings, C., Hardie, T., | |||
| Trammell, B., Huitema, C., and D. Borkmann, | Trammell, B., Huitema, C., and D. Borkmann, | |||
| "Confidentiality in the Face of Pervasive Surveillance: A | "Confidentiality in the Face of Pervasive Surveillance: A | |||
| Threat Model and Problem Statement", RFC 7624, | Threat Model and Problem Statement", RFC 7624, | |||
| DOI 10.17487/RFC7624, August 2015, | DOI 10.17487/RFC7624, August 2015, | |||
| skipping to change at line 1894 ¶ | skipping to change at line 1866 ¶ | |||
| [RFC8744] Huitema, C., "Issues and Requirements for Server Name | [RFC8744] Huitema, C., "Issues and Requirements for Server Name | |||
| Identification (SNI) Encryption in TLS", RFC 8744, | Identification (SNI) Encryption in TLS", RFC 8744, | |||
| DOI 10.17487/RFC8744, July 2020, | DOI 10.17487/RFC8744, July 2020, | |||
| <https://www.rfc-editor.org/info/rfc8744>. | <https://www.rfc-editor.org/info/rfc8744>. | |||
| [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | |||
| Multiplexed and Secure Transport", RFC 9000, | Multiplexed and Secure Transport", RFC 9000, | |||
| DOI 10.17487/RFC9000, May 2021, | DOI 10.17487/RFC9000, May 2021, | |||
| <https://www.rfc-editor.org/info/rfc9000>. | <https://www.rfc-editor.org/info/rfc9000>. | |||
| [RSF-2005] Reporters Sans Frontieres, "Technical ways to get around | [RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)", | |||
| censorship", 2005, <http://archives.rsf.org/print- | STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022, | |||
| blogs.php3?id_article=15013>. | <https://www.rfc-editor.org/info/rfc9293>. | |||
| [Rushe-2014] | [Rushe-2014] | |||
| Rushe, D., "Bing censoring Chinese language search results | Rushe, D., "Bing censoring Chinese language search results | |||
| for users in the US", The Guardian, February 2014, | for users in the US", The Guardian, February 2014, | |||
| <http://www.theguardian.com/technology/2014/feb/11/bing- | <http://www.theguardian.com/technology/2014/feb/11/bing- | |||
| censors-chinese-language-search-results>. | censors-chinese-language-search-results>. | |||
| [RWB-2020] Reporters Without Borders (RSF), "2020 World Press Freedom | [RWB-2020] Reporters Without Borders (RSF), "2020 World Press Freedom | |||
| Index: Entering a decisive decade for journalism, | Index: 'Entering a decisive decade for journalism, | |||
| exacerbated by coronavirus", <https://rsf.org/en/2020- | exacerbated by coronavirus'", April 2020, | |||
| world-press-freedom-index-entering-decisive-decade- | <https://rsf.org/en/2020-world-press-freedom-index- | |||
| journalism-exacerbated-coronavirus>. | entering-decisive-decade-journalism-exacerbated- | |||
| coronavirus>. | ||||
| [Sandvine-2014] | [Sandvine-2015] | |||
| Sandvine, "Technology Showcase on Traffic Classification: | Sandvine, "Internet Traffic Classification: A Sandvine | |||
| Why Measurements and Freeform Policy Matter", 2014, | Technology Showcase", 2015, | |||
| <https://www.sandvine.com/downloads/general/technology/ | <https://www.researchgate.net/profile/Nirmala-Svsg/post/ | |||
| sandvine-technology-showcases/sandvine-technology- | Anybody-working-on-Internet-traffic- | |||
| showcase-traffic-classification.pdf>. | classification/attachment/59d63a5779197b807799782d/ | |||
| AS%3A405810988503040%401473764287142/download/traffic- | ||||
| classification-identifying-and-measuring-internet- | ||||
| traffic.pdf>. | ||||
| [Satija-2021] | [Satija-2021] | |||
| Satija, S. and R. Chatterjee, "BlindTLS: Circumventing | Satija, S. and R. Chatterjee, "BlindTLS: Circumventing | |||
| TLS-based HTTPS censorship", FOCI '21: Proceedings of the | TLS-based HTTPS censorship", FOCI '21: Proceedings of the | |||
| ACM SIGCOMM 2021 Workshop on Free and Open Communications | ACM SIGCOMM 2021 Workshop on Free and Open Communications | |||
| on the Internet, Pages 43-49, DOI 10.1145/3473604.3474564, | on the Internet, Pages 43-49, DOI 10.1145/3473604.3474564, | |||
| August 2021, | August 2021, | |||
| <https://sambhav.info/files/blindtls-foci21.pdf>. | <https://sambhav.info/files/blindtls-foci21.pdf>. | |||
| [Schoen-2007] | [Schoen-2007] | |||
| Schoen, S., "EFF tests agree with AP: Comcast is forging | Schoen, S., "EFF tests agree with AP: Comcast is forging | |||
| packets to interfere with user traffic", October 2007, | packets to interfere with user traffic", October 2007, | |||
| <https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap- | <https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap- | |||
| comcast-forging-packets-to-interfere>. | comcast-forging-packets-to-interfere>. | |||
| [Schone-2014] | ||||
| Schone, M., Esposito, R., Cole, M., and G. Greenwald, | ||||
| "Exclusive: Snowden Docs Show UK Spies Attacked Anonymous, | ||||
| Hackers", February 2014, <http://www.nbcnews.com/feature/ | ||||
| edward-snowden-interview/exclusive-snowden-docs-show-uk- | ||||
| spies-attacked-anonymous-hackers-n21361>. | ||||
| [Senft-2013] | [Senft-2013] | |||
| , Crete-Nishihata, M., Dalek, J., Hardy, S., Hilts, A., | , Crete-Nishihata, M., Dalek, J., Hardy, S., Hilts, A., | |||
| Kleemola, K., Ng, J., Poetranto, I., Senft, A., Sinpeng, | Kleemola, K., Ng, J., Poetranto, I., Senft, A., Sinpeng, | |||
| A., Sonne, B., and G. Wiseman, "Asia Chats: Analyzing | A., Sonne, B., and G. Wiseman, "Asia Chats: Analyzing | |||
| Information Controls and Privacy in Asian Messaging | Information Controls and Privacy in Asian Messaging | |||
| Applications", November 2013, | Applications", November 2013, | |||
| <https://citizenlab.org/2013/11/asia-chats-analyzing- | <https://citizenlab.org/2013/11/asia-chats-analyzing- | |||
| information-controls-privacy-asian-messaging- | information-controls-privacy-asian-messaging- | |||
| applications/>. | applications/>. | |||
| skipping to change at line 1964 ¶ | skipping to change at line 1933 ¶ | |||
| Moura, G., "Detecting and Taking Down Fraudulent Webshops | Moura, G., "Detecting and Taking Down Fraudulent Webshops | |||
| at the .nl ccTLD", February 2020, | at the .nl ccTLD", February 2020, | |||
| <https://labs.ripe.net/Members/giovane_moura/detecting- | <https://labs.ripe.net/Members/giovane_moura/detecting- | |||
| and-taking-down-fraudulent-webshops-at-a-cctld>. | and-taking-down-fraudulent-webshops-at-a-cctld>. | |||
| [Singh-2019] | [Singh-2019] | |||
| Singh, K., Grover, G., and V. Bansal, "How India Censors | Singh, K., Grover, G., and V. Bansal, "How India Censors | |||
| the Web", DOI 10.48550/arXiv.1912.08590, December 2019, | the Web", DOI 10.48550/arXiv.1912.08590, December 2019, | |||
| <https://arxiv.org/abs/1912.08590>. | <https://arxiv.org/abs/1912.08590>. | |||
| [Sophos-2015] | [Sophos-2023] | |||
| Sophos, "Understanding Sophos Web Filtering", 2015, | Sophos, "Sophos Firewall: Web filtering basics", 2023, | |||
| <https://www.sophos.com/en-us/support/ | <https://support.sophos.com/support/s/article/KB- | |||
| knowledgebase/115865.aspx>. | 000036518?language=en_US>. | |||
| [SSAC-109-2020] | [SSAC-109-2020] | |||
| ICANN Security and Stability Advisory Committee (SSAC), | ICANN Security and Stability Advisory Committee (SSAC), | |||
| "SAC109: The Implications of DNS over HTTPS and DNS over | "SAC109: The Implications of DNS over HTTPS and DNS over | |||
| TLS", March 2020, | TLS", March 2020, | |||
| <https://www.icann.org/en/system/files/files/sac- | <https://www.icann.org/en/system/files/files/sac- | |||
| 109-en.pdf>. | 109-en.pdf>. | |||
| [Tang-2016] | [Tang-2016] | |||
| Tang, C., "In-depth analysis of the Great Firewall of | Tang, C., "In-depth analysis of the Great Firewall of | |||
| skipping to change at line 2044 ¶ | skipping to change at line 2013 ¶ | |||
| [VonLohmann-2008] | [VonLohmann-2008] | |||
| VonLohmann, F., "FCC Rules Against Comcast for BitTorrent | VonLohmann, F., "FCC Rules Against Comcast for BitTorrent | |||
| Blocking", August 2008, | Blocking", August 2008, | |||
| <https://www.eff.org/deeplinks/2008/08/fcc-rules-against- | <https://www.eff.org/deeplinks/2008/08/fcc-rules-against- | |||
| comcast-bit-torrent-blocking>. | comcast-bit-torrent-blocking>. | |||
| [Wagner-2009] | [Wagner-2009] | |||
| Wagner, B., "Deep Packet Inspection and Internet | Wagner, B., "Deep Packet Inspection and Internet | |||
| Censorship: International Convergence on an 'Integrated | Censorship: International Convergence on an 'Integrated | |||
| Technology of Control'", 2009, | Technology of Control'", Global Voices Advocacy, 2009, | |||
| <http://advocacy.globalvoicesonline.org/wp- | <http://advocacy.globalvoicesonline.org/wp- | |||
| content/uploads/2009/06/deeppacketinspectionandinternet- | content/uploads/2009/06/deeppacketinspectionandinternet- | |||
| censorship2.pdf>. | censorship2.pdf>. | |||
| [Wagstaff-2013] | [Wagstaff-2013] | |||
| Wagstaff, J., "In Malaysia, online election battles take a | Wagstaff, J., "In Malaysia, online election battles take a | |||
| nasty turn", Reuters, 2013, | nasty turn", NBC News, May 2013, | |||
| <http://www.reuters.com/article/2013/05/04/uk-malaysia- | <https://www.nbcnews.com/tech/tech-news/malaysia-online- | |||
| election-online-idUKBRE94309G20130504>. | election-battles-take-nasty-turn-flna6c9783842>. | |||
| [Wang-2017] | [Wang-2017] | |||
| Wang, Z., Cao, Y., Qian, Z., Song, C., and S.V. | Wang, Z., Cao, Y., Qian, Z., Song, C., and S.V. | |||
| Krishnamurthy, "Your State is Not Mine: A Closer Look at | Krishnamurthy, "Your State is Not Mine: A Closer Look at | |||
| Evading Stateful Internet Censorship", | Evading Stateful Internet Censorship", | |||
| DOI 10.1145/3131365.3131374, November 2017, | DOI 10.1145/3131365.3131374, November 2017, | |||
| <https://www.cs.ucr.edu/~zhiyunq/pub/ | <https://www.cs.ucr.edu/~zhiyunq/pub/ | |||
| imc17_censorship_tcp.pdf>. | imc17_censorship_tcp.pdf>. | |||
| [Wang-2020] | [Wang-2020] | |||
| skipping to change at line 2117 ¶ | skipping to change at line 2086 ¶ | |||
| filtering-trends-liberal-democracies-french-and-german- | filtering-trends-liberal-democracies-french-and-german- | |||
| regulatory-debates>. | regulatory-debates>. | |||
| [Zhu-2011] Zhu, T., Bronk, C., and D.S. Wallach, "An Analysis of | [Zhu-2011] Zhu, T., Bronk, C., and D.S. Wallach, "An Analysis of | |||
| Chinese Search Engine Filtering", | Chinese Search Engine Filtering", | |||
| DOI 10.48550/arXiv.1107.3794, July 2011, | DOI 10.48550/arXiv.1107.3794, July 2011, | |||
| <http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf>. | <http://arxiv.org/ftp/arxiv/papers/1107/1107.3794.pdf>. | |||
| [Zmijewski-2014] | [Zmijewski-2014] | |||
| Zmijewski, E., "Turkish Internet Censorship Takes a New | Zmijewski, E., "Turkish Internet Censorship Takes a New | |||
| Turn", 2014, | Turn", Wayback Machine archive, March 2014, | |||
| <https://blogs.oracle.com/internetintelligence/turkish- | <http://web.archive.org/web/20200726222723/ | |||
| https://blogs.oracle.com/internetintelligence/turkish- | ||||
| internet-censorship-takes-a-new-turn>. | internet-censorship-takes-a-new-turn>. | |||
| Contributors | Contributors | |||
| This document benefited from discussions with and input from David | This document benefited from discussions with and input from David | |||
| Belson, Stéphane Bortzmeyer, Vinicius Fortuna, Gurshabad Grover, | Belson, Stéphane Bortzmeyer, Vinicius Fortuna, Gurshabad Grover, | |||
| Andrew McConachie, Martin Nilsson, Michael Richardson, Patrick Vacek, | Andrew McConachie, Martin Nilsson, Michael Richardson, Patrick Vacek, | |||
| and Chris Wood. | and Chris Wood. | |||
| Authors' Addresses | Authors' Addresses | |||
| End of changes. 63 change blocks. | ||||
| 250 lines changed or deleted | 220 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||