270 likes | 386 Views
The Parrot is Dead: Observing Unobservable Network Communication. Amir Houmansadr Chad Brubaker Vitaly Shmatikov Presented by Amruta Patwardhan. INTRODUCTION. Internet is a big threat to the repressive Regimes These regimes censor internet by IP filtering, DPI,DNS hijacking..
E N D
The Parrot is Dead:Observing Unobservable Network Communication Amir Houmansadr Chad Brubaker VitalyShmatikov Presented by AmrutaPatwardhan
INTRODUCTION • Internet is a big threat to the repressive Regimes • These regimes censor internet by IP filtering, DPI,DNS hijacking.. • Some of the popular circumvention Systems are
INTRODUCTION We need unobservable circumvention Censors should not be able to identify circumvention traffic or end-hosts through passive, active, or proactive techniques
UNOBSERVABILITY BY IMITATION • Aim of parrot circumvention systems : • To Achieve unobservability by mimicking a widely used, uncensored target protocol. • Popular Targets: • HTTP, Skype and IETF{Internet Engineering Task Force} based VoIP. • Imitating unpopular protocol is futile • because the censor will simply block both the genuine protocol and it’s imitations.
UNOBSERVABILITY BY IMITATION SKYPE • Very Popular VoIP system based on P2P overlay network of users running. • Client makes calls and sends messages • Users are authenticated by a central login server • Skype SuperNode is resource-rich user which relay media and signals between clients that cannot communicate because of NAT and firewalls.
UNOBSERVABILITY BY IMITATION • IETF- based VoIP: • Standards for VoIP protocols: • Network discovery – to connect to the VoIP network • Session Control – to Setup and tear down calls • Media transmission to communicate voice datagrams • SIP: (Session Initiation Protocol) – • popular session Control Protocol • Application Layer Protocol which can run over TCP or UDP. • VoIP session between two SIP user agents use media transmission protocol to communicate the call traffic. • Media Transmission protocol: -- • RTP( real-time Transport Protocol) is an IETF std. • RTCP controls an established RTP connection by exchanging out-band statistics and control information. • RTP and RTCP run on UDP.
PARROT CIRCUMVENTION SYSTEMS • A class of circumvention systems that aim to achieve unobservability by imitating popular applications such as web browsers and Skype clients are called as PARROT CIRCUMVENTION SYSTEM. • Skype Morph : hides Tor traffic by mimicking Skype video call. • StegoTorus : mimics Skype and or HTTP • CensorSpoofer : SIP based VOIP
SkypeMorph • Pluggable Transport for Tor • Traffic between Tor Client and a Tor bridge looks like a Skype video call. • Login authentication and initial call setup is done using Skype software firewall Bridge Bridge skypeMorph sKypeMorph NAT OR Tor network Direct Client, and OR communication blocked
StegoTorus • Pluggable Tor Transport derived from ObfsProxy • Adds Chopping and Steganography to Tor Clients and Bridges • Chopper: Aims to convert traffic on a Tor link into a format that has sequence of variable size blocks, independently padded and delivered out of order. Tor Client • Embed Steganography -- aims to mimic P2P connection such as Skype • Uses Database of genuine previously collected Skype or Ventrilo packet traces to shape its traffic • HTTP Steganography -- aims to mimic unencrypted HTTP traffic by using client-side request generator and Server-side response generator. StegoTorus Client StegoTorus Server Existing Tor Network Adversary firewall Censored Sites
PARROT CIRCUMVENTION SYSTEM • CensorSpoofer is a standalone system • Uses IP spoofing to obfuscate the server’s identity • Mimics VoIP traffic to obfuscate traffic patterns. Censored Destinations SIP server RTP downstream RTP upstream Dummy host Spoofer Firewall
ADVERSARY MODEL Capability Classification • Passive attacks: • Observing and analyzing the network traffic and the internet entities behavior. • Statistical analysis, deep-packet inspection, behavioral analysis • Active attacks • Manipulation of network traffic • Delaying, dropping or injecting packets ,modifying packet contents ,throttling BW , terminating connections. • Proactive attacks • These attacks will send probes that will evoke recognizable responses and reveal the network entities involved in circumvention. • E.g.: Censors may initiate connections to random or suspected IP addresses , trying to discover the Tor bridges
ADVERSARY MODEL Knowledge Classification • Local adversary(LO) : • Controls few network devices and can only observe a small number of connections. • Home routers or Wi-Fi access points. • State-Level adversary: • Observes large volumes of network traffic. • E.g.: malicious ISPs, government censors • State – level Oblivious adversary(OB) • Has limited processing and storage resources • These censors may do deep-packet inspection but can only apply then at close to line speeds and may be to single packets not across the packets. • State-Level Omniscient adversary(OM) • Has ample processing and storage resources • Can aggregate data collected at different network locations • All the intercepted traffic can be stored for offline analysis.
ADVERSARY MODEL Real-world censors: • Internet Censorship is been deployed very aggressively in many countries • Some of the Government Censors are Passive OB but Active and Proactive OM censors are increasing. • For e.g. some countries have censors that can actually manage to detect and block all Tor traffic for several weeks just by noticing the DH handshake • Censors of some countries block all the encrypted traffic.
ADVERSARY MODEL Adversary models for parrot circumvention systems • SkypeMorph: • Is capable of Passive, Active and Proactive attacks • Because of it’s behavior this censor is OM according to our knowledge classification. • StegoTorus: • The filtering of IP, content can only be done in real time. • This censor is OB according to our knowledge Classification • CensorSpoofer: • Is capable of passive, active and proactive attacks • This censor is OM according to our knowledge Classification.
REQUIREMENTS FOR PARROT CIRCUMVENTION • Mimicking the protocol in its entirety • Correct • Mimic the target protocol correctly. • Side Protocols • Parrot System must mimic all control channels and side protocols that run alongside the main session of its target. • E.g. VoIP session includes 3 protocols. SIP , RTP & RTCP • IntraDepend • Changes in the main session can cause observable activity in it’s side protocols or control channels. • Parrot System must successfully mimic al the dynamic dependencies and correlations between these sub protocols. • InterDepend • Many times a session of a given protocol triggers other protocols… e.g. Http request triggers multiple DNS queries • Parrot System must mimic • Triggering other protocols like target • Responding as target when triggered by other protocols.
REQUIREMENTS FOR PARROT CIRCUMVENTION • Mimicking reaction to errors and network conditions • Error • Parrot system must produce some reaction to any possible error • The reaction produces should be consistent. • Network • Parrot system must mimic all possible Network condition changes like packet drops and reorders, repacketization. Etc.. • E.g. • TCP uses sequence numbers and congestion control mechanism • Live – video environments have automatic repeat request mechanism • Side protocol mimic. • Mimicking implementation specific artifacts • Soft: Parrot System mimic should be not only to a protocols specific but must be version specific of that protocol. • OS: Parrot System must generate consistent OS fingerprints.
REQUIREMENTS FOR PARROT CIRCUMVENTION • Mimicking typical traffic • Content • Specific header and payload format. • Imitated files must be metadata-compatible with the genuine files. • Patterns • All the pattern characteristics like packet sizes, counts, inter-packet intervals, flow rates should be mimicked as the genuine protocol • Users • User behavior produce recognizable patters at network level. • E.g. : Skype Users, User’s sending email. • Geo • Protocol behavior like routing decisions, choosing peers or traffic contents all depend on geographic location • E.g. Web server respond, SIP –based VoIP clients connect to geographically closet SIP server. • Some implementations like Skype users are country specific.
DETECTING SKYPE IMITATORS • SkypeMorph and StegoTorus-Embed : - • Easily distinguished from genuine Skype • Imitation is incomplete • Recognized by low-cost passive attacks • Hypothetical improved versions( designed to imitate Skype behaviors) • Active and proactive attacks can Distinguish these improvements from genuine Skype. • Passive Attacks: • StegoTorus mimic Skype’s Traffic but fails to imitate HTTP update and login traffic. • Both the censors fail to mimic TCP channel • Neither generate SoM packet headers.
DETECTING SKYPE IMITATORS • ` http://www.cs.utexas.edu/~shmat/shmat_oak13parrot.pdf
DETECTING SKYPE IMITATORS Active and Proactive attacks to detect improved Skype Parrots • http://www.cs.utexas.edu/~shmat/shmat_oak13parrot.pdf
DETECTING STEGOTORUS Attacks on StegoTorus chopper • Correlating IP address between links • Requirement : Geo • Adversary : Passive, LO/OM • Multiple connections to same server • Servers are distributed Geographically , intolerable delay is introduced on low-latency traffic(TOR) • Exploiting connection dependences • Requirement: Network, User • Adversary: Passive/Active, LO/OM • StegoTorus chopper create multiple connections and carry packets from the same Tor session. • Reactions to network conditions and change are correlated. Genuine Http connections to different servers exhibit no such correlations http://www.cs.utexas.edu/~shmat/shmat_oak13parrot.pdf
DETECTING STEGOTORUS • Passive attacks on StegoTorus-Http • Exploiting discrepancies in file-format semantics • Requirements: Contents • Adversary: Passive ,LO/OB/OM • StegoTorus paper’s claim – checking file semantics at line speeds require lot of resources from a state-Level censor dealing with large volumes of traffic. • E.g. Analyzing PDF Files • Fake trace generator in StegoTorus prototype produces the templates similar to genuine PDF file but misses the essential object xreftable. • Via deep packet inspection we can detect at line speed without any need to reconstruct the file
DETECTING STEGOTORUS Active and Proactive attacks on StegoTorus-Http http://www.cs.utexas.edu/~shmat/shmat_oak13parrot.pdf
DETECTING CENSORSPOOFER • http://www.cs.utexas.edu/~shmat/shmat_oak13parrot.pdf
RELATED WORK • Pluggable Tor Transports • Obfsproxy: first pluggable Tor transport • It preserves patterns but remove Tor –related content identifiers • Fails to achieve unobservability • FlashProxy: Turns ordinary web Browers into Bridges using webscokets • it fails Users(Adversary Model) • Dust : aims to provide a packet-based DPI-resistant protocol
Lessons & Recommendations Lessons: • Thorough understanding of the adversaries is a must • Unobservability by imitation is a fundamentally flawed approach • Partial imitation is worse than no imitation at all • Recommendations: • Not to mimic but run the actual protocol • FreeWave : hides data in encrypted voice or video payloads sent over genuine Skype • SWEET : embeds it in email messages.