通信学报 ›› 2014, Vol. 35 ›› Issue (9): 40-56.doi: 10.3969/j.issn.1000-436x.2014.09.005

• 论文Ⅰ 网络攻击与防范 • 上一篇    下一篇

对Telex互联网反监管系统的攻击

李龙海,黄城强,王万兴,慕建君   

  1. 西安电子科技大学 计算机学院,陕西 西安 710071
  • 出版日期:2014-09-25 发布日期:2017-06-14
  • 基金资助:
    国家自然科学基金资助项目;中央高校基本科研基金资助项目

Attacks on Telex Internet anticensorship system

Long-hai LI,Cheng-qiang HUANG,Wan-xing WANG,Jian-jun MU   

  1. School of Computer Science and Technology,Xidian University,Xi'an 710071,China
  • Online:2014-09-25 Published:2017-06-14
  • Supported by:
    The National Natural Science Foundation of China;The Fundamental Research Funds of the Central Universities

摘要:

Telex 作为典型的路由器重定向型反监管系统给互联网监管者带来了新的挑战。为帮助用户逃避监管,Telex利用路由器而非终端主机将用户的网络通信重定向到被屏蔽的目标站点。从审查者角度分析了Telex系统的安全性,提出了2类利用主动攻击破坏用户隐私的新方法。第一类为DoS攻击,利用了Telex握手协议的安全漏洞,在破坏系统可用性的同时还可能检出用户是否在使用Telex代理。同时给出了弥补该漏洞的改进协议。第二类称为TCP分组旁路攻击,利用非对称路由或IP隧道技术令客户端的部分TCP分组绕过路由器直达掩护站点,然后通过观察上行数据流的重传反应判断用户是否在使用Telex代理。通过一系列原型系统实验验证了旁路攻击的可行性。TCP分组旁路攻击也适用于其他路由器重定向型反监管系统。

关键词: 互联网监管, 路由器重定向, 用户隐私, DoS攻击

Abstract:

As a typical router-redirecting based anticensorship system,Telex poses new challenges for Internet censors.To help common users evade Internet censorship,Telex employs network routers,rather than end-hosts,to relay network traffics to blocked destinations.The security of Telex from the censors' perspective is analyzed,and two kinds of active attacks aiming to break users' privacy are presented.The first is a kind of DoS attack,which exploits a security flaw of Telex handshake protocol.It can probabilistically identify the users who are using Telex,as well as break the availability of Telex.An improved handshake protocol to remedy the flaw is also proposed.The second is called TCP packets by-passing attack.Under that attacking scenario,censors make a small fraction of TCP packets from clients bypass the router and reach the cover site directly through asymmetric routing paths or IP tunnels,then determine whether a user is utiliz-ing Telex by observing the reaction of upstream traffic.The feasibility of bypassing attack has been testified by a series of experiments in a prototype environment.The bypassing attack is also applicable to other router-redirecting based anti-censorship systems.

Key words: Internet censorship, router-redirecting, user privacy, DoS attack

No Suggested Reading articles found!