DNS-Morph: UDP-Based Bootstrapping Protocol for Tor

DNS-Morph: UDP-Based Bootstrapping Protocol for Tor

Rami Ailabouni*, Orr Dunkelman, and Sara Bitan DNS-Morph: UDP-Based Bootstrapping Protocol For Tor Abstract: Tor is one of the most popular systems for on the Internet. Organizations and governments engage anonymous communication and censorship circumven- in Internet censorship due to variety of reasons, among tion on the web, currently used by millions of users every them political, moral, or religious. Since Tor became day. This puts Tor as a target for attacks by organiza- public in 2002 [11] and started gaining popularity among tions and governmental bodies whose goal is to hinder users in the world as a system for anonymous commu- users’ ability to connect to it. These attacks include deep nication and censorship circumvention, many countries packet inspection (DPI) to classify Tor traffic as well tried to block their citizens’ connections to it. These as legitimate Tor client impersonation (active probing) attempts started with simple methods like blacklisting to expose Tor bridges. As a response to Tor-blocking Tor’s website [45] so users would not be able to reach it attempts, the Tor community has developed Pluggable and download the Tor client software [42], and got more Transports (PTs), tools that transform the appearance sophisticated with time to include actively downloading of Tor’s traffic flow. the Tor nodes (also called relays) list from the Tor Di- In this paper we introduce a new approach aiming to rectory Servers and blacklisting them, deploying DPI enhance the PT’s resistance against active probing at- to search for Tor communication characteristics (e.g., tacks, as well as white-listing censorship by partitioning Tor’s TLS handshake cipher suite [58]), as well as ac- the handshake of the PT from its encrypted communi- tive probing (impersonating a Tor client and connecting cation. Thus, allowing mixing different PTs, e.g., Scram- to suspicious servers to check whether they run a Tor bleSuit for the handshake and FTE for the traffic itself. relay) [1, 17, 53]. We claim that this separation reduces the possibility On the other side of the arms race, the Tor com- of marking Tor related communications. To illustrate munity did not stand still and developed methods to our claim, we introduce DNS-Morph: a new method of bypass the blocking attempts, mainly the introduction transforming the handshake data of a PT by imitating of Tor Bridges1 and Pluggable Transports (PTs). a sequence of DNS queries and responses. Using DNS- Pluggable Transports (PTs) [44] are a generic frame- Morph, the Tor client acts as a DNS client which sends work for the development and the deployment of cen- DNS queries to the Tor bridge, and receives DNS re- sorship circumvention techniques. Their main goal is to sponses from it. We implemented and successfully tested obfuscate the connection between a Tor client and a DNS-Morph using one of the PTs (ScrambleSuit), and bridge serving as a Tor entry guard, so it looks benign. verified its capabilities. The PT consists of two parts as seen in Figure 1, one is installed on the Tor client side, and the other is in- Keywords: Tor, UDP, DNS, bootstrapping, bridge, plug- stalled on the bridge’s side. The PT exposes a SOCKS gable transport, censorship, circumvention proxy [32] to the Tor client application, and obfuscates or otherwise transforms the traffic, before forwarding it arXiv:1904.01240v1 [cs.CR] 2 Apr 2019 to the bridge. On the bridge’s side, the PT Server side 1 Introduction exposes a reverse proxy that accepts connections from PT clients and decodes the obfuscation/transformation applied to the traffic, before forwarding it to the actual Internet censorship is the act of inspecting, controlling, bridge application. and limiting what can be accessed, published, or viewed Data transmitted between a PT client and a PT server can be encrypted, chopped into generic lengths, or otherwise obfuscated in many ways, making it diffi- *Corresponding Author: Rami Ailabouni: University of Haifa, Israel, E-mail: railaboun@staff.haifa.ac.il Orr Dunkelman: University of Haifa, Israel, E-mail: [email protected] 1 Bridge: a relay which is unlisted in the public directory servers Sara Bitan: Technion, Israel, E-mail: [email protected] lists. The information needed to connect to a bridge is obtained out-of-Tor (e.g., via BridgeDB [41], an Email, or in person). DNS-Morph: UDP-Based Bootstrapping Protocol For Tor 2 cult for a censor to detect Tor data and block it. Data On the other hand, structured stream protocols that transformation/obfuscation and the reverse operations mimic widely used protocols, are resistant to white- are done by the Transport Modules/Obfuscation Proto- listing based blocking. However, they do not protect cols used by the PT. against active probing [12, 20]. Our goal is to improve random stream protocols by using the advantages of structured stream protocols, while maintaining their protection against active prob- ing. We believe that the separation of these protocols to a handshake and communication phase, and encapsula- tion of their handshake in packets of a known, widely used, white-listed protocol, will strengthen their ability to avoid censorship and detection by DPIs. DNS was chosen as a protocol to encapsulate the handshake and meet the conditions discussed before for the following reasons: Fig. 1. Pluggable Transports Design 1. It is one of the most critical protocols of the Inter- net [31]. Blocking or greatly interfering with this protocol for any reason will induce unacceptable As of Sep. 2017,2 the available and deployed ob- costs on the censoring countries. fuscation protocols in the Tor Browser are: obfs3 [27], 2. DNS queries can be automatically relayed from one obfs4 [28], ScrambleSuit [59], FTE [51], and meek [19]. DNS server to another, until they reach their final A brief explanation about each of them can be found in destination (recursive DNS queries). This allows re- Section 2. These obfuscation protocols can be divided laying data between several DNS servers as an addi- into two groups: tional layer of protection against connections’ track- 1. Random stream protocols (obfs3, obfs4, and Scram- ing and blocking. bleSuit). These protocols’ communication is shaped 3. DNS is a UDP-based protocol. UDP is connection- as streams of random bytes that cannot be associ- less and the efforts required to perform DPI of UDP ated with any known protocol. These protocols have traffic are significantly higher compared to TCP two phases: a handshake phase in which the two traffic. participating parties securely exchange keys and/or tickets, and a communication phase, consisting of We note that the DNS encapsulation is proposed only exchange of encrypted messages using the estab- for the handshake phase. lished keys. 2. Structured stream protocols (FTE and meek), which try to mimic known white-listed protocols 1.1 Our Contribution such as HTTP. DNS-Morph is implemented as an obfuscation layer for Censoring countries with active probing capability can random stream protocols. This layer encapsulates the expose bridges communicating using obfs3. In addition, protocol handshake in DNS queries and responses in a random stream protocols are of the “look-like-nothing” way that avoids protocol abnormalities (i.e., a sequence protocols, which means that they can be identified and of DNS packets without response, followed by a “burst” blocked by a censor using a white-listing strategy, as of responses, a sequence of packets with identical length, their fingerprint (including their handshake) does not oddly structured domain names, etc.). Also, the limited fit any known protocol (see for example our experiments DNS communication avoids tools that defeat IP over with DPI tools in Section 10.3). DNS tunneling.3 2 Since Sep. 2017, some changes were introduced to Tor: Scram- bleSuit is no longer supported and was replaced by obfs4. 3 Encapsulating the two phases of a protocol into DNS packets Snowflake PT [39] is now available in the Tor Browser for some will cause high DNS traffic, which can raise suspicion of DNS operating systems. tunneling. DNS-Morph: UDP-Based Bootstrapping Protocol For Tor 3 We focus on the handshake phase in this paper be- 3. Obfs4 [28]: has the same features as ScrambleSuit, cause it is the phase DPI tools4 and active probes tar- but utilizes the Elligator technique [49] for public get when searching for Tor traffic and bridges. Also, we key obfuscation, and the ntor protocol [14] for one- later discuss (Section 11.1) the possibility of connecting way authentication. This results in a faster protocol our DNS-Morph to FTE (which shapes Tor’s data using than ScrambleSuit and the addition of bridge au- regular expressions, and is not active probing resistant) thentication. This protocol can also be blocked by in order to bypass a white-listing censor while resisting white-listing based censoring. active probing. 4. Meek [19]: uses a technique called Domain In order to show the advantages of DNS-Morph, we Fronting [4] to relay the Tor traffic to a Tor bridge implemented it in Python and integrated it into Tor’s through third-party servers (i.e., CDNs like Amazon Obfsproxy code [30].5 As Obfsproxy works only with CloudFront and Microsoft Azure). TCP, and our DNS-Morph works with UDP, we added 5. Format-Transforming Encryption (FTE) [51]: UDP support to Obfsproxy. We also added acknowl- transforms Tor traffic to arbitrary standard pro- edgments and packet reordering on the receiver side, tocols’ formats using their language descriptions. to provide lightweight transport reliability that UDP lacks. This contribution may be of independent interest Some other PTs are also available but are not integrated for PTs that will support UDP communication (e.g., in in the Tor Browser.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us