I tried to setup a bridge relay in USA and access it from China. But it seems their communication can be detected very soon and got filtered by the GFW.
At first I thought it's because the address of my bridge relay got published and leaked to the GFW staffs. But even I set PublishServerDescriptor to 0 in the torrc of bridge the blockade still occurs.
Every bridge relay I setup can only live 1~10 minutes before they got blocked and were no longer accessible in China, used the telnet utility for confirming that.
When the blockade occurs, not only bridges but also normal relays were blocked.
If I change the bridge port (like from 443 to 444) then it can be connected again before the next blockade occurs after 1~10 minutes.
I tried the both stable 0.2.1.x and alpha (0.2.3.5-alpha) release of tor and they were all vulnerable.
Was it a new attack to block tor traffic?
Trac: Username: hrimfaxi
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
I walked through the process with hrimfaxi. Will forward logs+traces to asn, rransom, runa, nickm, and whoever else wants to have a look as soon as I get them.
Interesting Note: that he made a mistake the first time through, and had to create a new bridge on a different port on the same IP. It was unblocked to start, and then got blocked again after use. May have affected the results, but maybe not.
FYI: I just got a private message from a different user that their private bridge is working fine in China. Possibly they are behind a different ISP/GFW segment though.
FYI: I just got a private message from a different user that their private bridge is working fine in China. Possibly they are behind a different ISP/GFW segment though.
Scratch this. Just hrimfaxi using a different username and stating the IP his bridge was working before it got blocked.
I took a look at tor_traffic_server.pcap. There's a lot of noise, but I eliminated most of the other traffic by exonerator (https://metrics.torproject.org/exonerator.html). That might not be a good assumption, after all, China could control relays in other countries. But here we go:
Stream 15 (same host as Stream 32) looks like the legitimate client.
Stream 44 is not a relay, and the TLSv1 Client Hello handshakes are slightly different: (The client in Stream 15 supports more extensions: ec_points_formats, elliptic_curves) than the client in Stream 44.
wireshark filters:(tcp.stream == 15) || (tcp.stream eq 44)or(ip.addr == *****)it also helps to tell wireshark to decode packets withtcp.dst_port==10000 as SSL.
A possible attack:
create a list of IPs that have connected to Tor or anything else
that wound up in the GFW
actively monitor those IPs and actively connect to destinations.
block anything that doesn't look like a webpage/looks like a Tor bridge.
Some possible counter-attacks/tests
block IPs other than hrimfaxi's, see if the bridge still gets blocked
redirect IPs other than hrimfaxi's to a https webpage, see if the
bridge still gets blocked
We know that GFW detects the SSL handshake of bridges and probes them aftewards, effectively blocking unpublished bridges. And they probably also have a list of published and detected bridges who they block on sight.
People can probably use obfsproxy.git with tor.git with success, but that requires too much effort for non-technical people. Next step is when #3472 (moved) gets merged, and we make some sort of bundle including obfsproxy with obfs2.
There is another user report from China where connecting to a new, unpublished bridge fails. I've pointed them at this ticket.
Did he specify if it fails when connecting, or if the connection fails after some minutes?
(read: do they block on SSL handshake, or do they block upon probing?)
There is another user report from China where connecting to a new, unpublished bridge fails. I've pointed them at this ticket.
Did he specify if it fails when connecting, or if the connection fails after some minutes?
(read: do they block on SSL handshake, or do they block upon probing?)
It's unclear if it's on ssl handshake or probing. They have reported that a brand new, unpublished bridge isn't usable within 5 minutes. But these people may be publishing their pcaps for all. This publishing of data is the reason I pointed them at the ticket.
A user from a Catholic relief organization called today to state that nothing is working in China anymore. They used to use Tor, but that stopped working around two months ago. They even ran some unpublished bridges which stopped working about the same time. They switched to ultrasurf and freegate, and stated that stopped working in the past month. VPNs are hit or miss. VPNs based on ssh or ssl tunnels generally are worse than openvpn or pptp so far. They are going to collect some packet traces and get back to me with results.
We know that GFW detects the SSL handshake of bridges and probes them aftewards
We do? Where is that documented? Seems to me that we need to do some more investigation before we can say that we know anything.
In particular, if they are doing active probing of some sort, the first questions are 1) what causes the active probing and 2) what do they use to decide it's something they should block?
In the case of 1, if the rumors are true that vanilla ssl handshakes don't trigger a probe, then we should find out exactly what they're DPIing on and fix it. In the case of 2, if the rumors are true that they're "recognizing Tor" somehow, e.g. during or after the handshake, we should find out what they're looking for.
In the case of 1, if the rumors are true that vanilla ssl handshakes don't trigger a probe, then we should find out exactly what they're DPIing on and fix it.
There's one bridge I can use intermittently from China: it appears to stay unblocked but it isn't running 24/7 (when I have to wait for it: the reported uptime starts at around zero once it manages to log on). It's in Saudi Arabia.
It might be an idea for some bridges to require some secret other than an IP address and a port, and to mimic an https server that requires authentication when probed by someone who doesn't have that secret. The problem is: I can't keep the list of servers and ports I connect to secret from GFW, and they can just check them to see if they're tor bridges by connecting to them with their own copy of tor.
The above link is a little program I coded yesterday. It's a GFW prober honeypot. Specifically, it's an SSL server with appropriate logging (and with a little more flexibility than s_server(1)).
Checked several IP of them, it seems that most of them are dynamic IP addresses of DSL and PPP running variety of OS, from Windows 2003 with Terminal Service, Linux with Mysql, cheap home router.
Some questions:
a) After the SSL negotiation, does the GFW probes also send an HTTP request or just finish the SSL handshake and close it?
b) Does the prober announce a specific/detectable set of SSL/TLS version/ciphers?
c) Does anyone checked actively with OS fingerprinting tools if the "prober's OS" can be recognized?
My mother lives in China, and the symptoms described in this ticket are quite familiar to me. I am a developer in the US, and have been working with her computer from here for quite some time to try and get Tor running, only to be foiled 99% of the time by the GFW. In the last three years of her living in China, I have observed a lot of odd circumstances unfold with her internet access, and some trends lead me to two conclusions:
Once China sees "suspicious" activity coming from/happening at a particular location, the surveillance and filtering for that location will increase, sometimes dramatically. This typically functions like an on/off switch, and doesn't have much "fade-in" time.
Although evidence hasn't been conclusive here yet, this is the trend I see: they "forget" about the heightened filtering for a particular location pretty quickly, typically within a couple days. Often, when my mother's traffic has gotten much more interfered with because of whatever she did to trigger it, after her IP Address expires and renews to a new address, all of that filtering will disappear. I would expect them to "follow her" through IP Address expirations/renewals, but that doesn't normally seem to happen.
I don't have a lot of hard data to give you to back these observations up, but have been working with her system through a lot of changes, moves, and situations, and these two things seem to stick out, at least in ways that are of interest here.
I have talked with Andrew(@torproject) about my mom's situation in the past (late September, 2011), and also our willingness to help. I am quite willing to help diagnose things, test bridges and experimental solutions, etc, if that might help with the things outlined in this ticket, which we face regularly, or really if it might help with making Tor more available in any way. Her habits keep her out of any kind of lime-light in China, which I think is helpful when trying out things like this...
Checked several IP of them, it seems that most of them are dynamic IP addresses of DSL and PPP running variety of OS, from Windows 2003 with Terminal Service, Linux with Mysql, cheap home router.
Seems so, indeed. Fucked up, isn't it?
It seems like none of their probers is an actual dedicated server probing box...
Some questions:
a) After the SSL negotiation, does the GFW probes also send an HTTP request or just finish the SSL handshake and close it?
There are two kinds of probes: 'Garbage probing' and 'Tor probing'.
In 'Tor probing', the prober connects, does an SSL handshake, does an
SSL renegotiation and then speaks the Tor protocol. Specifically, the
Tor probers we managed to capture, build an one-hop circuit and send a
BEGIN_DIR cell, like Tor clients are supposed to do. When the bridge
replies with its descriptor, the prober hangs up.
b) Does the prober announce a specific/detectable set of SSL/TLS version/ciphers?
The SSL handshakes of probers seem similar to the SSL handshake of Tor clients.
The cipher list (also, see #4744 (moved)) is the same, and they both have the
same fake 'server_name' extension. What is different is that probers
don't seem to have the ECC TLS extensions, which I think are
added automatically by new versions of OpenSSL (still, probers seem to
have the RI ciphersuite, which is also added automatically by new
versions of OpenSSL).
c) Does anyone checked actively with OS fingerprinting tools if the "prober's OS" can be recognized?
We did some checks. There seems to be a mixture of Windows and Linux
machines.
I've noticed that some of the machines had IIS running.
Also, some probers [1] are using a source port that is not in the
ephemeral port range of modern OSes (usually higher than TCP port
20000), which hints to Windows XP 2.
Would it possible that the detection come from some predictable guessing of the Common Name and Certificate Chain?
Connecting via OpenSSL to a Tor Server i see:
Certificate chain
I'm not going to pretend to know too much about the internals of Tor, so may not be able to contribute much to the actual development, but do know a few things about security and networks.
The thought I had, considering the GFW filters all passing traffic, is it possible source and destination are probed for tor signatures, and subsequently blocked if found? That would explain why even new bridges are quickly blocked.
I realize there would be a massive amount of streams going in and out of China.