help promote
usenix conference policies
Censors’ Delay in Blocking Circumvention Proxies
David Fifield and Lynn Tsai, University of California, Berkeley
Censors of the Internet must continually discover and block new circumvention proxy servers. We seek to understand this process; specifically, the length of the delay between when a proxy first becomes discoverable and when it is actually blocked. We measure this delay in the case of obfuscated Tor bridges, by testing their reachability before and after their introduction into Tor Browser. We test from sites in the U.S., China, and Iran, over a period of five months. China’s national firewall blocked new bridges after a varying delay of between 2 and 36 days. Blocking occurred only after end-user software releases, despite bridges being potentially discoverable earlier through other channels. While the firewall eventually discovered the bridges of Tor Browser, those that appeared only in Orbot, a version of Tor for mobile devices, remained unblocked. Our findings highlight the fact that censors can behave in ways that defy intuition, presenting difficulties for threat modeling but also opportunities for evasion.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {David Fifield and Lynn Tsai},
title = {{Censors{\textquoteright}} Delay in Blocking Circumvention Proxies},
booktitle = {6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)},
year = {2016},
address = {Austin, TX},
url = {https://www.usenix.org/conference/foci16/workshop-program/presentation/fifield},
publisher = {USENIX Association},
month = aug
}
connect with us