Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23511
|View full text |Cite
|
Sign up to set email alerts
|

The use of TLS in Censorship Circumvention

Abstract: TLS, the Transport Layer Security protocol, has quickly become the most popular protocol on the Internet, already used to load over 70% of web pages in Mozilla Firefox. Due to its ubiquity, TLS is also a popular protocol for censorship circumvention tools, including Tor and Signal, among others. The problem was temporarily corrected by updating to Firefox 45, but only a few months later, meek was blocked again in the same manner, this time by the FortiGuard firewall, which identified a combination of SNI exten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 58 publications
(44 citation statements)
references
References 21 publications
0
44
0
Order By: Relevance
“…the application layer-other forms operate at the network and protocol layers. These forms only identify classes of devices or clients, but are not immune to spoofing [50], [24]. TCP fingerprinting relies on the IPv4, IPv6 and TCP headers to identify the OS and software sending a request [4].…”
Section: Other Forms Of Fingerprintingmentioning
confidence: 99%
“…the application layer-other forms operate at the network and protocol layers. These forms only identify classes of devices or clients, but are not immune to spoofing [50], [24]. TCP fingerprinting relies on the IPv4, IPv6 and TCP headers to identify the OS and software sending a request [4].…”
Section: Other Forms Of Fingerprintingmentioning
confidence: 99%
“…The unencrypted Server Name Indication (SNI) enables an eavesdropper to determine which specific web site a client is connected to among the sites hosted by the same server. The eavesdropper can also fingerprint the client [46] or distinguish censorship-circumvention tools that try to mimic TLS traffic [23,29]. TLS 1.3 [45] takes a few protective measures: e.g., less unencrypted metadata during the handshake, and an experimental extension for encrypted SNI [45,47].…”
Section: Motivation and Applicationsmentioning
confidence: 99%
“…Moreover, it has been argued that most traffic-morphing tools do not achieve unobservability in real-world settings due to discrepancies between their implementations and the systems that they try to imitate, because of the uncovered behavior of side protocols, error handling, responses to probing, etc. [23,29,54]. We believe that for a wide class of applications, using pseudo-random uniform blobs, either alone or in combination with other lower-level tools, is a potential solution in a different direction.…”
Section: Related Workmentioning
confidence: 99%
“…To evade censors, we must send a plausible SNI value (sending no SNI is uncommon and easily blocked-only 1% of TLS connections do not send the SNI extension [21]), and we must have the server respond with a plausible (and corresponding) certificate. Even if we manage to avoid sending either in the clear (e.g.…”
Section: Tlsmentioning
confidence: 99%
“…The application attempts to decrypt the first application data record from the client using a key derived from the secret seed, client, and server randoms. We use the uTLS library [21,41] on both the application and client to allow us to change the TLS secrets being used after the handshake.…”
Section: Maskmentioning
confidence: 99%