What is DNS censorship?
Blocking or manipulating DNS queries to prevent users from resolving certain domain names.
What are the properties of GFW (Great Firewall of China)?
Large-scale, centralized, multi-layered filtering system using DNS injection, blocking, content inspection, and active probing.
How does DNS injection work?
A censor inserts spoofed or no response for a given domain
What are the three steps involved in DNS injection?
List five DNS censorship techniques and briefly describe their working principles.
Which DNS censorship technique is susceptible to overblocking?
Packet dropping.
What are the strengths and weaknesses of the ‘packet dropping’ technique?
Strong: simple and hard to bypass; Weak: causes collateral damage and overblocking.
What are the strengths and weaknesses of the ‘DNS poisoning’ technique?
Strong: precise and persistent manipulation; Weak: block entire domain
What are the strengths and weaknesses of the ‘content inspection’ technique?
Strong: precise, flexible
Weak: scalability
What are the strengths and weaknesses of the ‘blocking with resets’ technique?
Strong: immediate stopping of connections
Weak: detectable and sometimes disrupts benign traffic.
What are the strengths and weaknesses of the ‘immediate reset of connections’ technique?
Strong: fast and effective
Weak: easily identified and can be circumvented using encryption or retries.
Why is our understanding of censorship around the world limited?
Because of lack of transparency, regional variation, measurement difficulty, and political sensitivity.
What are the limitations of main censorship detection systems?
What kind of disruptions does Augur focus on identifying?
Routing-based connectivity disruptions across Autonomous Systems.
How does Iris counter the issue of lack of diversity while studying DNS manipulation?
By using a global pool of DNS resolvers and comparing responses across regions via annotation and clustering.
What are the steps involved in the global measurement process using DNS resolvers?
What metrics does Iris use to identify DNS manipulation?
How to identify DNS manipulation via machine learning with Iris?
Train classifiers on labeled resolver responses using extracted features to detect abnormal patterns.
How is connectivity disruption achieved via routing disruption?
How is connectivity disruption achieved via packet filtering?
Explain a scenario of disruption detection when no filtering occurs.
Traffic flows normally; traceroute paths appear intact without anomalies. IP ID increments by 2
Explain a scenario of disruption detection in the case of inbound blocking.
Probes to the target fail because inbound packets are dropped before reaching the destination. IP ID increments by 1
Explain a scenario of disruption detection in the case of outbound blocking.
Probes leave the source but responses never return due to outbound filtering at the target’s network. IP ID increments my multiple sets of 2.