Lesson 10
-
What is DNS censorship?
- Large scale network traffic filtering strategy opted by a network to enforce control and censorship over Internet infrastructure to suppress material which they deem as objectionable.
-
What are the properties of GFW (Great Firewall of China)?
- Locality of GFW nodes - majority view is that GFW censorship nodes are present at the edge.
- Centralized management - blocklists obtained from two distinct GFW locations show a high possibility of a central GFW management entity that orchestrates blocklists.
- Load balancing - GFW load balances between processes based on source and destination IP address.
-
How does DNS injection work?
- For DNS requests that are blocked by the GFW, the GFW will respond with a fake DNS record to prevent the client from reaching the requested content.
-
What are the three steps involved in DNS injection?
- DNS probe is sent to a DNS resolver
- THe probe is checked against the blocklist
- A fake DNS A record response is sent back if the request matches the blocklist. The direct domain can be blocked, or specific domain keywords can be blocked.
-
List five DNS censorship techniques and briefly describe their working principles.
- Packet dropping - all traffic to specific IP addresses are dropped
- DNS Poisoning - return no answer or return an incorrect answer
- Content inspection - all traffic traverses a proxy and is inspected for objectionable content, if matches -> dropped
- Blocking with resets - sends a TCP (RST) to block individual connections that contain requests with objectionable content.
- Immediate reset - suspends traffic coming from a source immediately, for a short period of time
-
Which DNS censorship technique is susceptible to overblocking?
- Packet dropping
-
What are the strengths and weaknesses of “packet dropping” DNS censorship technique?
- Strengths
- Easy to implement
- Low cost
- Weaknesses
- Maintenance of the blocklist
- Overblocking
- Strengths
-
What are the strengths and weaknesses of “DNS poisoning” DNS censorship technique?
- Strengths
- No overblocking
- Strengths
-
What are the strengths and weaknesses of “content inspection” DNS censorship technique?
- Strengths
- Precise censorship
- Flexible
- Weaknesses
- Not scalable
- Strengths
-
What are the strengths and weaknesses of “blocking with resets” DNS censorship technique?
- None given.
-
What are the strengths and weaknesses of “immediate reset of connections” DNS censorship technique?
- None given.
-
Our understanding of censorship around the world is relatively limited. Why is it the case? What are the challenges?
- Diverse measurements
- Need for scale
- Identifying the intent to restrict content access
- Ethics and minimizing risks
-
What are the limitations of main censorship detection systems?
- They either no longer exist or rely upon volunteers performing measurements, which can cause them to get in trouble with their local governments.
-
What kind of disruptions does Augur focus on identifying?
- This system focuses on IP-based disruptions, not DNS-based manipulations.
-
How does Iris counter the issue of lack of diversity while studying DNS manipulation? What are the steps associated with the proposed process?
- Iris uses open DNS resolvers located all over the globe.
- The two main steps are:
- Scanning the Internet's IPv4 space for open DNS resolvers
- Identifying infrastructure DNS resolvers
-
What are the steps involved in the global measurement process using DNS resolvers?
- Perform global DNS queries
- Annotating DNS responses with auxiliary information
- Additional PTR and TLS scanning
-
What metrics does Iris use to identify DNS manipulation once data annotation is complete? Describe the metrics. Under what condition, do we declare the response as being manipulated?
- Consistency metrics
- Independent verifiability metrics
- If neither of these metrics are satisfied, the response is said to be manipulated.
-
How to identify DNS manipulation via machine learning with Iris?
- Not covered.
-
How is it possible to achieve connectivity disruption using routing disruption approach?
- Withdrawing previously advertised prefixes using BGP
-
How is it possible to achieve connectivity disruption using packet filtering approach?
- Block packets meeting a certain criteria disrupting the normal forwarding action.
-
Explain a scenario of connectivity disruption detection in case when no filtering occurs.
- When no filtering occurs, the measurement machine will see an increase of 2 in the IP ID - this means the two hosts communicated
-
Explain a scenario of connectivity disruption detection in case of the inbound blocking.
- Traffic from the reflector to the site containing objectionable data is blocked. Thus, the IP ID only increases by 1 because the SYN-ACK from the site never reaches the reflector.
-
Explain a scenario of connectivity disruption detection in case of the outbound blocking.
- Outbound reset packets from the reflector do not reach the site. The site will continue to send SYN-ACK packets until it receives an ACK, causing the reflector's IP ID to increase by 2 each time.