Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"

David Oliver <david@guardianproject.info> Tue, 02 June 2020 14:59 UTC

Return-Path: <oliver.david.m@gmail.com>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCC243A08CD for <pearg@ietfa.amsl.com>; Tue, 2 Jun 2020 07:59:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.397
X-Spam-Level:
X-Spam-Status: No, score=-1.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 75QCZQsWZy57 for <pearg@ietfa.amsl.com>; Tue, 2 Jun 2020 07:59:57 -0700 (PDT)
Received: from mail-qt1-f174.google.com (mail-qt1-f174.google.com [209.85.160.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0ED53A08C3 for <pearg@irtf.org>; Tue, 2 Jun 2020 07:59:57 -0700 (PDT)
Received: by mail-qt1-f174.google.com with SMTP id j32so10825041qte.10 for <pearg@irtf.org>; Tue, 02 Jun 2020 07:59:57 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zvJC37+8pnyk6NiuEuRjyQoQhDzehIBkqC9OkxoQnYM=; b=BcdfuE5+2wou/tyDY+W/1k5brEXHy/DkWM5srVqyrq9tmc05/At7yVYudoWJpPdJkh NZrgc6BkEogDKr7+kADbUfzimcVpgbIEPfLU075nJQOUsXmIZyLK1uM+VR5b86mnsGlW z3x3DXcf8Q/UNm5sjAUyYEvzBn7xgxLKR3hhzW17CiCnrtisuJneAwAWSe05T3/zFDDB oSR1CPUIchdGsxc9VrSiJmFJ4h+qJf3VJxuTRqgvarKJAnkACEWtnnlNaYtkg2FcS+LW Jj4NZLeQgicQqgxbXFMdj38L0yQa3ozZXo/ofEhPKQXp+4pPfFnYbWpw6JRcaCZ2TJOc G+yw==
X-Gm-Message-State: AOAM531xrBQ/oGvdGyeHAIyW/1/LQ4/m1jI0PvA3kSh8M1rrA1gWVbW/ FcN4evw+k/caAh3kEyyxKKL8mk9Dkc4DsrhY8jA=
X-Google-Smtp-Source: ABdhPJxJLxrcBF1TnXNu28tVIZ5ugj6PvmY3Ga+5TpHnq+DUZrTiO4e6FmNKiKg/AawEYD5HeTnfxwdOOQBYsoDzrM4=
X-Received: by 2002:ac8:7252:: with SMTP id l18mr12169844qtp.71.1591109996789; Tue, 02 Jun 2020 07:59:56 -0700 (PDT)
MIME-Version: 1.0
References: <08f43a37-2b7b-418e-95a8-ed57484c66be@www.fastmail.com> <CAJoqpTLfjhbN7zYRcorJBD98hDgra=Q71RRNSsAKQgoWpT0eeA@mail.gmail.com>
In-Reply-To: <CAJoqpTLfjhbN7zYRcorJBD98hDgra=Q71RRNSsAKQgoWpT0eeA@mail.gmail.com>
From: David Oliver <david@guardianproject.info>
Date: Tue, 02 Jun 2020 10:59:45 -0400
Message-ID: <CAEwkZ50xMUC68gbqPp-NS04e1xuArcUwA848ZP6wzviiL9rDNg@mail.gmail.com>
To: Chelsea Komlo <chelsea.komlo@gmail.com>
Cc: Christopher Wood <caw@heapingbits.net>, pearg@irtf.org
Content-Type: multipart/alternative; boundary="00000000000028456205a71b2ad0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/Oa6jIZZ-VSHj94qixlPhiu9fPY4>
Subject: Re: [Pearg] Research Group Last Call for "A Survey of Worldwide Censorship Techniques"
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2020 15:00:00 -0000

Chelsea, thanks for this.

> First, I recommend improving the document organization to clearly
differentiate
>  between a specific censorship technique and corresponding methods to
circumvent that technique.

I'm still not understanding why - in a document defined to talk about
censorship techniques - we're talking about circumvention methods. I
believe it's particularly important to understand because, at least for the
techniques I'm familiar with, these methods work "above the stack", not "in
the stack" because we implementors can't have impact on "the stack"
itself.  IETF addresses "the stack" so, in theory at least, IETF could use
the understanding of censorship techniques to implement solutions there.
Why would we (implementors) be engaging with IETF if we do not seek new "in
the stack" methods of preventing censorship?

Thanks for any clarification that can be provided.

David Oliver
David M. Oliver | david@g <david@olivercoady.com>uardianproject.info |
http://g <http://olivercoady.com>uardianproject.info | @davidmoliver | +1
970 368 2366


On Tue, Jun 2, 2020 at 10:31 AM Chelsea Komlo <chelsea.komlo@gmail.com>
wrote:

> Hi Chris,
>
> I have a couple meta points and a few specific points.
>
> Overall, my strongest recommendation is threefold. First, I recommend
> improving the document organization to clearly differentiate between a
> specific censorship technique and corresponding methods to circumvent that
> technique. Second, I suggest strengthening the review of current
> circumvention techniques and their effectiveness to give an improved view
> of the landscape and to prevent re-inventing the wheel, as the intended
> audience is protocol designers.. Third, I recommend differentiating between
> the capabilities of mature censors like China, and weaker censors such as
> those with only off-the-shelf tools.
>
> Here is my discussion of these points in more detail.
>
> === Meta Points ===
> - While I understand this draft to be purely informational, understanding
> censorship today is incomplete without understanding existing censorship
> circumvention techniques, and how effective these techniques are..
> Critically, some of the most effective and safe censorship techniques are
> "hanging by a thread" in terms of how much longer they will be available
> (such as domain fronting), so understanding these weak areas is important
> to understanding the sustainability of the current circumvention landscape.
> I suggest adding at minimum a discussion of "Where are we today" regarding
> circumvention.
> - To go along with the above point,  providing a better review of existing
> censorship circumvention techniques will help encourage building on
> existing work, as opposed to re-inventing the wheel from first principles.
> While perhaps this review should be a follow-up document, I strongly
> encourage providing such a review, especially since the intended audience
> is protocol designs.
> - Within the draft itself, the discussion of censorship techniques is
> often interwoven with circumvention methods. I suggest separating these
> concepts out within each section. Instead of a "Tradeoffs" section, perhaps
> have sections pertaining to "Cost to Implement to Censor", and "Techniques
> to Circumvent", for improved clarity.
> - One important point is that while China is an extremely powerful censor,
> they are often in a class of their own. I encourage including a discussion
> of something like "censor maturity" or the technical resources required to
> implement different techniques. There is a bit of this discussion, but it
> can be better standardized and applied to each technique. For example, IP
> blacklisting is trivial and does not require significant infrastructure
> (and many censors do this), but performing active probing to fingerprint
> protocols and block them on the fly requires much more infrastructure and
> planning (and is essentially only China, as I understand).
>
> === Specific Points ===
> - DPI (deep packet inspection) is technically any kind of packet analysis
> beyond IP address and port number- this concept can be better clarified.
> Further, this technique is not specific to
> - Clearly highlighting techniques that are thwarted by the use of TLS
> versus techniques which can be performed even in spite of TLS usage would
> also likely be helpful to readers.
>
> Thanks,
> Chelsea
>
> On Wed, May 20, 2020 at 11:00 AM Christopher Wood <caw@heapingbits.net>
> wrote:
>
>> This is the research group last call for the "A Survey of Worldwide
>> Censorship Techniques" (draft-irtf-pearg-censorship) draft available here:
>>
>>    https://datatracker.ietf.org/doc/draft-irtf-pearg-censorship/
>>
>> Please review the document and send your comments to the list by June 5,
>> 2020. Feedback may also be sent to the GitHub repository located here:
>>
>>    https://github.com/IRTF-PEARG/rfc-censorship-tech
>>
>> Thanks,
>> Chris, on behalf of the chairs
>>
>> --
>> Pearg mailing list
>> Pearg@irtf.org
>> https://www.irtf.org/mailman/listinfo/pearg
>>
>
>
> --
> Chelsea H. Komlo
> --
> Pearg mailing list
> Pearg@irtf.org
> https://www.irtf.org/mailman/listinfo/pearg
>