Great Firewall of China Uses TCP Resets
This blog post about the Great Firewall of China by Cambridge University researchers is fascinating:
It turns out [caveat: in the specific cases we’ve closely examined, YMMV] that the keyword detection is not actually being done in large routers on the borders of the Chinese networks, but in nearby subsidiary machines. When these machines detect the keyword, they do not actually prevent the packet containing the keyword from passing through the main router (this would be horribly complicated to achieve and still allow the router to run at the necessary speed). Instead, these subsiduary machines generate a series of TCP reset packets, which are sent to each end of the connection. When the resets arrive, the end-points assume they are genuine requests from the other end to close the connection — and obey. Hence the censorship occurs.
So China is censoring its citizens using ten-year-old technology. How long before they upgrade?
Update: Tom Ptacek shows this story is old news. Great historical insights Tom!
It turns out [caveat: in the specific cases we’ve closely examined, YMMV] that the keyword detection is not actually being done in large routers on the borders of the Chinese networks, but in nearby subsidiary machines. When these machines detect the keyword, they do not actually prevent the packet containing the keyword from passing through the main router (this would be horribly complicated to achieve and still allow the router to run at the necessary speed). Instead, these subsiduary machines generate a series of TCP reset packets, which are sent to each end of the connection. When the resets arrive, the end-points assume they are genuine requests from the other end to close the connection — and obey. Hence the censorship occurs.
So China is censoring its citizens using ten-year-old technology. How long before they upgrade?
Update: Tom Ptacek shows this story is old news. Great historical insights Tom!
Comments
In their post (and paper) the Cambridge researchers explain how it is possible to break this system by ignoring resets. Chinese citizens who deploy such countermeasures will be able to evade the Great Firewall. The upgrade would occur if the Chinese government decides to implement real firewalling via access control lists on inline devices.
Now reverse it. Assume you are a Chinese dissident trying to visit a US Web site. Same solution.
Hence, the Chinese government will have to upgrade their "firewall" if they want to keep their citizens locked down.
- Chris
For UDP, spoofed ICMP unreachable messages and other ICMP errors could be used.
Outside of that, I agree this is not an effective method of access control (which is good for freedom, thankfully).
the best we can do is you publish web proxy sites, soon they will relise the they cant stop the fredom of information and speech in the internet!!
here is a nice list of web-proxies without the word proxy in the name, to make the life for diffucult to the censors!
www.cristine.info
www.shannen.info
www.analise.info
www.affrica.info
www.charleen.info
www.alaura.info
www.bernadine.info
www.adita.info
www.anjelita.info
www.brygida.info
www.cristine.info
www.proxysolar.com
www.giuliana.info
www.giuliana.info
www.wynonna.info
www.wenda.info
http://www.rofflecakes.org/
I'm curious to know what speeds others are getting?
I'm in Shenzhen on China Telecom.