Tuesday, July 21, 2009

Iran using more Sophisticated Tactics to Block Internet Access for Government Critics

Iran is using a number of new technologies to censor the Web. Some of these Government tools are simplistic and blunt, while others are more precise and surgical. Both are intended to stifle so-called dissidents.

One month after a disputed presidential election sparked widespread unrest in Iran, the country's government has initiated a cyber-crackdown that is challenging hackers across the globe to find new ways to help keep Iranian dissidents connected to the Web.

Iranian Government Strategy step-up
While the government's initial efforts to censor the Internet were crude and consequently ineffective, it has started employing more sophisticated tools to thwart dissidents' attempts to communicate with each other and the outside world. Iranian dissidents are not alone in their struggle, however, as several sympathetic hacker groups have been working to keep them online.

NedaNet

One such group is NedaNet, whose mission is to "help the Iranian people by setting up networks of proxy severs, anonymisers, and any other appropriate technologies that can enable them to communicate and organise."

NedaNet project coordinator Morgan Sennhauser, who has just written a paper detailing the Iranian government's latest efforts to thwart hackers, says that the government's actions have been surprisingly robust and have challenged hackers in ways that the Chinese government's efforts at censorship have not.

Chinese Internet censorship: An inside look
"China has several gigabytes per second of traffic to deal with and has a lot more international businesses," he says. "They can't be as heavy-handed with their filtration. The Iranians aren't as concerned about that, so they get to use all these fancy toys that, if the Chinese used them, could cripple their economy."

Here are five of the most commonly-used technologies the Iranian government has been using to stifle dissents, as outlined in Sennhauser's paper.

IP Blocking
IP Blocking is one of the most basic methods that governments such as Iran are using for online censorship. It simply prevents all packets going to or from targeted IP addresses. Sennhauser says that this was how the government banned access to the BBC's Persian news services and how it took down websites that were critical or in any way negative about the election.

While these operations are relatively simple to execute, they don't tackle the problem of individual communications between users, especially if the users have set up multi-hop circuits that, in themselves use multiple servers to create a proxy ring.

Traffic Classification (QoS)
QoS is a much more sophisticated method of blocking traffic than IP blocking, because governments can halt any file sent through a certain type of protocol, such as FTP. They can simply limit the bandwidth available on that port and throttle transfers because the government knows that FTP transfers are most often sent through TCP port 21.

Sennhauser says that this type of traffic shaping practice is the most common one used by governments today, as "it is not too resource intensive and is fairly easy to set up."

Shallow Packet Inspection
Shallow packet inspection is basically a blunter, broader version of the deep packet inspection (DPI) technique that is used to block packets based on their content. 'Shallow packet' inspection makes broad generalities about traffic, based solely on checking out the packet header, unlike DPI, which intercepts packets and inspects their fingerprints, headers and payloads.

Although shallow packet inspection can't provide the Iranian government with the same detailed traffic assessments as DPI, Sennhauser says that it is much better at handling volume than DPI.

Reading the label on the packet

"It's a less refined tool, but it can also deal with a lot more traffic than true DPI." he explains. "Shallow packet inspection is more like judging a book by its cover. If a packet says that it's SSL (Secure Sockets Layer) in the header, then a shallow packet inspector takes it at face value."

However, this is a double-edged sword. If a user disguises their SSL packets as FTP packets in the header, the shallow packet inspector won't be able to tell the difference.

Packet Fingerprinting

This is a slightly more refined method of throttling packets than 'shallow packet' inspection, as it looks not only at the packet header but at its length, frequency of transmission and other characteristics to make a rough determination of its content.

Sennhauser says the government can use this technique to better classify packets and not throttle traffic sent out by key businesses.

Mix 'n Match

"A lot of things don't explicitly say what they are, e.g. a lot of VPN traffic is indistinguishable from SSH traffic, which means that it would be throttled if SSH was," he says. "but what if businesses relied on VPN connections? You'd move the system to fingerprinting, where the two are easily distinguishable."

Deep Packet Inspection / Packet Content Filtering
DPI is the most refined method that the government has for blocking Internet traffic. As mentioned above, deep packet inspectors examine not only a packet's header but also its payload. This gives governments the ability to filter packets at a more surgical level than any of the other techniques discussed so far.

"Viewing a packet's contents doesn't tell you much on its own, especially if it's encrypted," he says. "But combining it with the knowledge gained from fingerprinting and shallow packet inspection, it is usually more than enough to figure out what sort of traffic you're looking at."

DPI Downside

There are downsides to using DPI, of course: it's much more complicated to run and is far more labour-intensive than other traffic-shaping technologies. On the down side, Sennhauser says there is no magic bullet for getting around DPI. Users can usually only temporarily elude it by "finding flaws in their system." and even this won't help for long, as the government can simply correct their system's flaws once they're discovered.

"Once they fix the flaw, you've lost unless you can figure out some real way to circumvent it," Sennhauser notes.

Endgame still unclear

Sennhauser says that the government has employed these technologies very quickly and very smartly, despite being caught flat-footed by the initial furor after the election. Indeed, he thinks the only reason that Iran hasn't yet completely shut down dissidents' communications is that they've had to fight with an army of hackers who tirelessly search for flaws in their system.

"It really is like an arms race," he says. "They create a problem, we circumvent it, they create another, we get around that one. This continues on until the need to do so is removed. The circumstances which will end the competition aren't clear yet."

No comments:

Post a Comment