Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

Chelsea Komlo <chelsea.komlo@gmail.com> Tue, 02 June 2020 14:31 UTC

Return-Path: <chelsea.komlo@gmail.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB7D83A0061 for <pearg@ietfa.amsl.com>; Tue, 2 Jun 2020 07:31:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ikNIk4EkOaKi for <pearg@ietfa.amsl.com>; Tue, 2 Jun 2020 07:31:05 -0700 (PDT)
Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD2A83A00C4 for <pearg@irtf.org>; Tue, 2 Jun 2020 07:31:04 -0700 (PDT)
Received: by mail-wm1-x336.google.com with SMTP id u26so2383216wmn.1 for <pearg@irtf.org>; Tue, 02 Jun 2020 07:31:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=IAo1ZjmawFnGSfMSBid1PWaBlD0nqVkRV+rpW6m6XSw=; b=CLHzJ9eS0IMvRnZ4oz8leGcDnCJsV9pFf+c7SJaSz+nRnJDkLUsqfKstubxXYWY2Wi dzKISEwnwkkfajtNVys9+xoCFlxqD4C+ob5T8yjjgaT/j1zsDUeYzXK3ai1TgNvGy8CO 38awZ6P7jsM+utPgvBdbu3spJI65YLQgfimhHB/n0g5C1NGfZU41FG5C9FmOfBr0odk2 XATBJOa64xHLNcf63HOqfins1340ZbA0j8E/1zOXiTiVcDvHhi/3VgYbl3xDD6JoVtuN 7a9nPYOnDC8fmIMOZwBcHMkaeA203sTK7TRplp00eLuinBF2orEg/JLAYU6F0Ju4uMg1 YmHA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=IAo1ZjmawFnGSfMSBid1PWaBlD0nqVkRV+rpW6m6XSw=; b=a2RbgPaMkAiSA4kL/lMdmT5J8rI1tmqnZzXiUTDq5Nxm/OrFQvMCFTGJ2M7zgKIex3 6YmkIrEXPfXhz2JX3MqRsWbl81CADnd6Ey+qOJX+GtsSO71GB4ZBmcTFR+wHAz3FeHRs Dda4cXwBnJIH0i8rxMhhQWFaj4qVq9cV/9/vtCWkGwB/ThVfZgbkx4EqP39STzxIQR5r 5691N3QdtYFFVVwI3V9LEHJSmguUh3q5Mg+xn/oo63LPMH1a0QKCusbSWNg/vuuy2Gda /yygqbAArBgh+dI3uYvLyPxCKZrMcy23TEl6Wq4yv7ndKpvgSKWPpDFb5DtlfK/RjFDo md4A==
X-Gm-Message-State: AOAM531HCvck64r0hV54QpF6QgB3K2CaCTgw0upzzGC6opvos22QWsnt H4jIceo8p1kresefcW3Z4bAsezxo7kcRSi4XVAtkBj1y
X-Google-Smtp-Source: ABdhPJxnhcYi4EKvHmepOFP6Mwbwn4satuNRx1PK51zgxQMeRXJRyuRTcuBTvuVfDf45PBeGVv/jTpnpiDrl8A28lbU=
X-Received: by 2002:a1c:7fc5:: with SMTP id a188mr4678725wmd.59.1591108263314; Tue, 02 Jun 2020 07:31:03 -0700 (PDT)
MIME-Version: 1.0
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com>
In-Reply-To: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com>
From: Chelsea Komlo <chelsea.komlo@gmail.com>
Date: Tue, 02 Jun 2020 08:30:50 -0600
Message-ID: <CAJoqpTLfjhbN7zYRcorJBD98hDgra=Q71RRNSsAKQgoWpT0eeA@mail.gmail.com>
To: Christopher Wood <caw@heapingbits.net>
Cc: pearg@irtf.org
Content-Type: multipart/alternative; boundary="000000000000d5894405a71ac2f8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/M8qFtEgYRsP4IFY2B1Om0LND5gU>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2020 14:31:07 -0000

Hi Chris,

I have a couple meta points and a few specific points.

Overall, my strongest recommendation is threefold. First, I recommend
improving the document organization to clearly differentiate between a
specific censorship technique and corresponding methods to circumvent that
technique. Second, I suggest strengthening the review of current
circumvention techniques and their effectiveness to give an improved view
of the landscape and to prevent re-inventing the wheel, as the intended
audience is protocol designers. Third, I recommend differentiating between
the capabilities of mature censors like China, and weaker censors such as
those with only off-the-shelf tools.

Here is my discussion of these points in more detail.

=== Meta Points ===
- While I understand this draft to be purely informational, understanding
censorship today is incomplete without understanding existing censorship
circumvention techniques, and how effective these techniques are.
Critically, some of the most effective and safe censorship techniques are
"hanging by a thread" in terms of how much longer they will be available
(such as domain fronting), so understanding these weak areas is important
to understanding the sustainability of the current circumvention landscape.
I suggest adding at minimum a discussion of "Where are we today" regarding
circumvention.
- To go along with the above point,  providing a better review of existing
censorship circumvention techniques will help encourage building on
existing work, as opposed to re-inventing the wheel from first principles.
While perhaps this review should be a follow-up document, I strongly
encourage providing such a review, especially since the intended audience
is protocol designs.
- Within the draft itself, the discussion of censorship techniques is often
interwoven with circumvention methods. I suggest separating these concepts
out within each section. Instead of a "Tradeoffs" section, perhaps have
sections pertaining to "Cost to Implement to Censor", and "Techniques to
Circumvent", for improved clarity.
- One important point is that while China is an extremely powerful censor,
they are often in a class of their own. I encourage including a discussion
of something like "censor maturity" or the technical resources required to
implement different techniques. There is a bit of this discussion, but it
can be better standardized and applied to each technique. For example, IP
blacklisting is trivial and does not require significant infrastructure
(and many censors do this), but performing active probing to fingerprint
protocols and block them on the fly requires much more infrastructure and
planning (and is essentially only China, as I understand).

=== Specific Points ===
- DPI (deep packet inspection) is technically any kind of packet analysis
beyond IP address and port number- this concept can be better clarified.
Further, this technique is not specific to
- Clearly highlighting techniques that are thwarted by the use of TLS
versus techniques which can be performed even in spite of TLS usage would
also likely be helpful to readers.

Thanks,
Chelsea

On Wed, May 20, 2020 at 11:00 AM Christopher Wood <caw@heapingbits.net>
wrote:

> This is the research group last call for the "A Survey of Worldwide
> Censorship Techniques" (draft-irtf-pearg-censorship) draft available here:
>
>    https://datatracker.ietf.org/doc/draft-irtf-pearg-censorship/
>
> Please review the document and send your comments to the list by June 5,
> 2020. Feedback may also be sent to the GitHub repository located here:
>
>    https://github.com/IRTF-PEARG/rfc-censorship-tech
>
> Thanks,
> Chris, on behalf of the chairs
>
> --
> Pearg mailing list
> Pearg@irtf.org
> https://www.irtf.org/mailman/listinfo/pearg
>


-- 
Chelsea H. Komlo