meek is a PluggableTransports, an obfuscation layer for Tor designed to evade Internet censorship. Traffic is relayed through a third-party server that is hard to block, for example a CDN. It uses a trick called "domain fronting" to talk to a Tor relay while appearing to talk to another domain.
- [tor-dev] A simple HTTP transport and big ideas\ https://lists.torproject.org/pipermail/tor-dev/2014-January/006159.html
Quick start
Download Tor Browser or Tor Messenger: https://www.torproject.org/download/download-easy.html\\ https://trac.torproject.org/projects/tor/wiki/doc/TorMessenger Extract and run it, and then configure these settings:
- Configure on the first screen.
- Check Tor is censored in my country, then Select a built-in bridge, then choose meek-amazon or meek-azure. If one doesn't work, try the other.
- Click Connect.
Howtos in other languages:
To build from source:
git clone https://git.torproject.org/pluggable-transports/meek.git
cd meek/meek-client
export GOPATH=~/go
go get
go build
tor -f torrc
FreeBSD port: http://www.freshports.org/security/meek/
Overview
meek uses a technique called "domain fronting" to send a message to a Tor relay in a way that is hard to block. Domain fronting is the use of different domain names at different communication layers. The meek-client program builds a special HTTPS request and sends it to an intermediate web service with many domains behind it, such as a CDN. What's special about the request is that one domain name (the "front domain") appears on the "outside" of the request—in the DNS query and SNI—and a different name appears on the "inside"—in the HTTP Host header. The censor sees the outside name but the CDN sees the inside name, and forwards the request to the meek-server program running on a Tor bridge. meek-server decodes the body of the request and feeds the data into Tor.
Domain fronting and meek work when the censor blocks some domains of a web service but not all of them. Some examples of fronting-capable services are Google, CloudFront, and #Webservices.
[[span([meek-diagram.svg (SVG source)], style=font-size:80%)]]
See AChildsGardenOfPluggableTransports#meek for details of how the protocol looks at the byte level, both at the TLS layer (the part visible to a censor), and at the HTTP layer (the invisible layer that carries the data).
How to change the front domain
You can change the front domains used by the default bridge lines. The default bridge lines can be found at:
- https://gitweb.torproject.org/builders/tor-browser-bundle.git/tree/Bundle-Data/PTConfigs/bridge_prefs.js
- Browser/TorBrowser/Data/Browser/profile.default/preferences/extension-overrides.js inside Tor Browser
Copy a bridge line and change the
front=
part to another domain on the same CDN.
See What to do if meek gets blocked.
Other domain fronting systems
meek is just one of several circumvention systems using domain fronting. You can read about the technique in general here.
Psiphon uses domain fronting in some places. It has a fork of meek-client and meek-server as well as a port of meek-client to Java for Android.
Flashlight from Lantern is an HTTP proxy that users domain fronting. enproxy is a TCP-over-HTTP tunnel.
FireFly Proxy is a meek-like proxy implemented in Python. It is designed against the Great Firewall of China.
GoAgent has been used to evade the Great Firewall of China for several years. It uses domain fronting on App Engine. It is only an HTTP and HTTPS proxy; the client software sends your requested URLs to App Engine, and then the request is issued directly from the App Engine servers.
Web services
Here are some web services that support domain fronting. We have been testing potential fronting services mostly through manual testing and Wget commands.
Not all of the listed services are deployed. The ones you can currently use with Tor are:
- #AmazonCloudFront (meek-amazon)
- #MicrosoftAzure (meek-azure)
See also GreatFire.org's list of mirrors, which, while they aren't using domain fronting, are hosted on the same kind of high-collateral-damage services. sitescanner automatically tests domain names for CloudFlare support.
Amazon CloudFront
$ wget -q -O - https://a0.awsstatic.com/ --header 'Host: d2zfqthxsdq309.cloudfront.net'
I’m just a happy little web server.
CloudFront is a CDN. Your files are hosted on a generated domain name that looks like d2k1ftgv7pobq7.cloudfront.net. All these domains support HTTPS with a wildcard cert for *.cloudfront.net, and they can front for each other.
There is a free tier, good for a year, that limits you to 50 GB per month. Per-request pricing differs by client country. Per-gigabyte costs go down the more you transfer, with a maximum of $0.19 per gigabyte. Bandwidth costs to the origin server (i.e., the Tor bridge) are lower. There's an additional cost of about $0.01 per 10,000 requests.
CloudFront allows you to use your own TLS domain name for an extra charge, but that appears to put you on a certificate with a bunch of shared SANs, which can't front for domains on different certificates.
The FAQ suggests that non-cacheable, dynamic traffic is fine. Q. Does Amazon CloudFront support delivery of dynamic content? Amazon CloudFront supports all files that can be served over HTTP. This includes dynamic web pages, such as HTML or PHP pages, any popular static files that are a part of your web application, such as website images, audio streams, video streams, media files or software downloads. For on-demand media files, you can also choose to stream your content using RTMP delivery. Amazon CloudFront also supports delivery of live media over HTTP. Q. Does Amazon CloudFront cache POST responses? Amazon CloudFront does not cache the responses to POST, PUT, DELETE, OPTIONS, and PATCH requests – these requests are proxied back to the origin server.
There's a question of what to use as the front domain. Any particular *.cloudfront.net name could be individually blockable. The generic names cloudfront.net and www.cloudfront.net don't resolve. Maybe pick one with a lot of collateral damage? Or a few, and randomly choose between them? Or connect to an IP, rather than a domain (#12208 (moved)). Alexa has a list of the most popular cloudfront.net domains ("Where do visitors go on cloudfront.net?"), which starts out:
d3dsacqprgcsqh.cloudfront.net 14.67%
deayhd4nq31b0.cloudfront.net 6.06%
d396qusza40orc.cloudfront.net 2.72%
d3v9w2rcr4yc0o.cloudfront.net 2.26%
d13yacurqjgara.cloudfront.net 2.09%
There's a list of CNAMES that point to an example cloudfront.net subdomain. It appears that GFW blacklists (through DNS poisoning) *.cloudfront.net, but some names are whitelisted including d3dsacqprgcsqh.cloudfront.net and d1y9yo7q4hy8a7.cloudfront.net (9gag). GreatFire.org has a list of blocked cloudfront.net subdomains.
The names a0.awsstatic.com, a1.awsstatic.com, and d0.awsstatic.com look promising. I found them in the source of https://aws.amazon.com/documentation/.
Here are instructions on setting up CloudFront. Read http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/GettingStarted.html. Skip step 2, which is about uploading your files to S3 (all our data comes straight from the Tor relay). Change settings as follows:
-
Origin Domain Name: the domain where meek-server is running. You can use
meek.bamsoftware.com
. - Origin ID: doesn't matter.
- Origin SSL Protocols: TLSv1.2 only
- Origin Protocol Policy: HTTPS Only
- HTTPS Port: change this if you are running meek-server on a port other than 443.
- Viewer Protocol Policy: HTTPS Only
- Allowed HTTP Methods: GET, HEAD, OPTIONS, PUT, POST, PATCH, DELETE. It won't work without this (specifically POST is needed).
- SSL Certificate: Default CloudFront Certificate (*.cloudfront.net)
- Supported HTTP Versions: HTTP/2, HTTP/1.1, HTTP/1.0
You will get a domain name like d111111abcdef8.cloudfront.net. Wait about 15 minutes for it to start to resolve. Set up torrc like so:
ClientTransportPlugin meek exec ./meek-client --url=https://d111111abcdef8.cloudfront.net/ --log meek-client.log
You can front with a different *.cloudfront.net domain.
ClientTransportPlugin meek exec ./meek-client --url=https://d111111abcdef8.cloudfront.net/ --front=d36cz9buwru1tt.cloudfront.net --log meek-client.log
Microsoft Azure
This section last updated 2018-04-30
$ wget -q -O - https://ajax.aspnetcdn.com/ --header 'Host: meek.azureedge.net'
I’m just a happy little web server.
Azure is a cloud computing platform with a CDN. The CDN services are actually provided by Verizon or Akamai.
Pricing is $0.09 to $0.25 per GB (depending on geographical region), getting less for higher volumes.
When you choose to use the Verizon CDN, you get a domain of the form subdomain.azureedge.net, where you get to choose subdomain. Formerly, you got an uncontrollable subdomain of vo.msecnd.net. ajax.aspnetcdn.com might be a good front. I've also seen azurecomcdn.net.
- HTTPS Everywhere rules for msecnd.net. List of fronting-capable Azure domains (2017-07-24):
- Finding Domain frontable Azure domains (archive)
- known-good.txt (archive)
- Log in at https://portal.azure.com/.
- Click "All services" in the sidebar, type "cdn" in the search box, and select "CDN profiles".
- Click "+ Add" to create a CDN profile. (You only have to do this the first time you create an endpoint.)
- Name: doesn't matter.
- Resource group: "Create new" or "Use existing" doesn't matter, I think it's just an accounting thing.
- Resouce group location: doesn't matter, only controls "where the metadata associated with the CDN profile will reside".
- Pricing tier: Standard Verizon. Standard Akamai may work too, haven't tried it.
- Select the CDN profile and click "+ Endpoint".
- Name: doesn't matter; this will become your azureedge.net subdomain.
- Origin type: Custom origin.
- Origin hostname: the domain name of your meek-server bridge.
- Origin path: blank
- Origin host header: same as origin hostname.
- Uncheck HTTP, check HTTPS.
- Optimized for: General web delivery.
After about an hour, the CDN will start forwarding. However, you will get "502 Bad Gateway" errors because by default, the Azure CDN does not use TLS SNI towards the origin. You have to ask them to enable it. (They expect you to have a one-hostname-per-IP-address setup that doesn't require SNI.) meek-server's built-in Let's Encrypt support (--acme-hostnames
) requires SNI. Your options are to get a certificate manually and use the --cert
and --key
options; or to open a support request and ask them to enable SNI, which takes about one week.
Akamai
$ wget --no-check-certificate -q -O - https://a248.e.akamai.net/ --header 'Host: www.nytimes.com' | grep -io '<title>.*</title>'
<title>The New York Times - Breaking News, World News & Multimedia</title>
$ wget --no-check-certificate -q -O - https://a248.e.akamai.net/ --header 'Host: www.pinterest.com' | grep -io '<title>.*</title>'
<title>Pinterest</title>
(However these don't work for some reason; they go to the SNI name.)
$ wget --no-check-certificate -q -O - https://www.nytimes.com/ --header 'Host: www.pinterest.com' | grep -io '<title>.*</title>'
<title>The New York Times - Breaking News, World News & Multimedia</title>
$ wget --no-check-certificate -q -O - https://www.pinterest.com/ --header 'Host: www.nytimes.com' | grep -io '<title>.*</title>'
(I use --no-check-certificate because the certificate isn't trusted by Wget, but it's okay in Firefox.)
Akamai is a CDN.
HTTPS Everywhere rule for akamai.net. I don't know what's so special about the a248.e.akamai.net name. For example, a247 and a249 exist, but the certificate they serve is only good for ".akamaihd.net", ".akamaihd-staging.net", and "a248.e.akamai.net". The paper "Fast Internet Content Delivery with FreeFlow" describes the structure of Akamai URLs; some of it is driven by historical use when browsers didn't send Host or SNI.
The a248.e.akamai.net name started being blocked (DNS poisoned) in China in late September 2014: https://en.greatfire.org/https/a248.e.akamai.net. (See also https://en.greatfire.org/search/all/akamai.net for all akamai.net domains.)
It might be easier and cheaper to get Akamai through a reseller. For example Liquid Web posts a price list, $100/month for up to 1000 GB. This blog post describes how to use WordPress with the Liquid Web CDN. In that example they use a custom CNAME, cdn.lw.rrfaae.com, which for me has the reverse DNS a1711.g1.akamai.net. I can grab an HTTPS version of the blog while fronting through a248.e.akamai.net:
$ wget --no-check-certificate -q -O - https://a248.e.akamai.net/ --header 'Host: cdn.lw.rrfaae.com' | grep -io '<title>.*</title>'
<title>jgillman's Liquid Web Update</title>
However, Liquid Web's terms of service prohibit proxy servers: We do not allow proxy servers of any kind, whether for personal or business use. Files with references to any proxy or likeness thereof are prohibited.
Cache Simple (formerly Distribution Cloud) is another Akamai reseller. Their pricing starts at $50/month for 100 GB. They want you to sign a contract with a confidentiality clause when you sign up.
Rackspace offers Akamai access with SSL support through their Cloud Files service. The domain you get looks like "c186397.ssl.cf1.rackcdn.com", and you can front it through a248.e.akamai.net:
$ wget --no-check-certificate https://a248.e.akamai.net/CloudFiles%20Akamai.pdf --header 'Host: c186397.ssl.cf1.rackcdn.com'
However, the CDN only works for static files hosted through Cloud Files. They don't support the "origin pull" service we need.
HP Cloud uses Akamai. But they have the same problem as Rackspace: it's only static files from HP Cloud Object Storage.
Fastly
Fastly is a CDN, being used by the meek-like transports of Psiphon and Lantern. comment:4:ticket:12208 you to front without a SNI, only an IP, because their frontend server checks the SNI against the Host, and sends a 400 response if they don't match. Both other projects had to fork an HTTPS library to make it possible.
You can get an idea of some of their domains by looking at the certificate for https://global.ssl.fastly.net/. Shared SSL hosting appears to be on subdomains of a.ssl.fastly.net, global.ssl.fastly.net, or hosts.fastly.net.
$ wget https://github.a.ssl.fastly.net/favicon.ico
Resolving github.a.ssl.fastly.net (github.a.ssl.fastly.net)... 23.235.47.196
HTTP request sent, awaiting response... 200 OK
$ wget https://a.ssl.fastly.net/favicon.ico --header 'Host: github.a.ssl.fastly.net'
Resolving a.ssl.fastly.net (a.ssl.fastly.net)... 23.235.40.130
HTTP request sent, awaiting response... 400 Bad Request
$ wget --no-check-certificate https://23.235.40.130/favicon.ico --header 'Host: github.a.ssl.fastly.net'
The certificate's owner does not match hostname ‘23.235.40.130’
HTTP request sent, awaiting response... 200 OK
Pricing is a minimum $50 per month, and $0.12–0.19 per GB for the first 10 TB per month. There's an additional charge per 10,000 requests.
Level 3
Level 3 is a tier-1 network operator and also has a CDN.
VPS.NET is a reseller of the Level 3 CDN (formerly they had a deal with Akamai). Pricing is pay-as-you-go, not per-month; in other words we can buy a TB and not pay more until it's used up. The first TB is $35 and after that it's $250.
CloudVPS is another reseller. There's no extra charge over the normal VPS fee, but they say: "The maximum free throughput of the CDN is 100 Megabit per second (Mbit/sec). Traffic above 100 Mbit/sec will be billed at our normal traffic pricing. Contact us if you plan to use the CDN for large amounts of traffic." "The free CloudVPS CDN cannot be used for SSL delivery. Contact us if you want to speed up SSL traffic using the CDN."
It's not clear yet whether fronting works. I found some customer domains from http://trends.builtwith.com/websitelist/Level3-CDN, but I couldn't make them work.
Level 3 is suspected of collaborating with the NSA, so there's that.
Level 3's CDN naming seems to revolve around the footprint.net domain. While HTTP requests do appear to be fronted, attempts to retrieve content from other hosts over SSL were unsuccessful. An example can be found with:
openssl s_client -servername www.feelunique.com -tlsextdebug -msg -connect www.warface.com:443
GET / HTTP/1.1
Host: www.feelunique.com
HTTP/1.1 403 Forbidden
Server: Footprint 4.10/FPMCP
Mime-Version: 1.0
Date: Sun, 24 Aug 2014 21:59:00 GMT
Content-Type: text/html
Content-Length: 526
Expires: Sun, 24 Aug 2014 21:59:00 GMT
Connection: close
...
Warface.com's certificate is returned, but we see a Footprint originating error of "Invalid Protocol." Tried this with a few domains under Level 3, to no avail.
Despite that domain fronting seems not to work, we might be able to get the same effect from the URL structure of the secure.footprint.net domain. For example, there is a Free Weibo mirror at https://secure.footprint.net/pingfan/fw. It appears we can get a path under the secure.footprint.net domain. secure.footprint.net is currently DNS poisoned by GFW. doesn't work (HTTP 403) as of 2015-08-28.
Netlify
Netlify is a CDN and static-content host. Domain fronting appears to be supported with no configuration necessary. It would not be possible to run Tor on the Netlify infrastructure and a potential "meek-netlify" would require a backend to talk to. From the basic plan ($9/month) and up, API proxying is supported. There does not appear to be any bandwidth-based billing, only a fixed monthly cost. SSL on Netlify is a free service with certificates provisioned by Lets Encrypt.
A proof-of-concept has been built, but has not been load tested:
curl https://netlify.com/meek/ -H 'Host: iain.learmonth.me'
I’m just a happy little web server.
The configuration is rather simple, in a file named "_redirects":
/* https://meek-server.backend/:splat 200
That's it!
CDN77
See #27579 (moved).
$ curl -s https://www.cdn77.com/ -H 'Host: www.phpmyadmin.net' | grep '<title>'
<title>phpMyAdmin</title>
Others
See whether these services support fronting or not.
HostGator et al.?
Cheap web hosts like HostGator sometimes offer shared SSL. For example HostGator puts you on a name like secure123.hostgator.com. You can probably front through those. In this case, you would run a PHP reflector (#10984 (moved)) on the web host in order to reach a relay.
EdgeCast?
GreatFire has some mirrors on EdgeCast, for example https://edgecastcdn.net/00107ED/g/.
Starting November 12, 2014, edgecastcdn.net is blocked by GFW. https://en.greatfire.org/edgecastcdn.net https://twitter.com/GreatFireChina/status/533318145118048256
Web services that appear not to work
Someone tried these and it looks like the domain fronting trick doesn't work.
Google App Engine
Google App Engine is web application hosting on Google's infrastructure.
Google App Engine used to work for domain fronting, but Google disabled it on April 13.
CloudFlare
CloudFlare is a CDN. You use your own domain name. TLS is terminated at CloudFlare's server.
There are different pricing plans. The cheapest one that supports SSL is Pro, for $20 per month. Business is $200 and Enterprise averages $5,000. There's no per-gigabyte bandwidth charge.
CloudFlare now matches the SNI and Host header when both exist.
CloudFlare used to work for domain fronting, but does not anymore since September 2015 (comment:2:ticket:14256).
DreamHost
DreamHost's Shared Hosting can easily be used as a reflector using PHP, but according to their "Secure Hosting" page, they don't offer shared SSL; for SSL you have to pay for your own real cert.
They have a storage service (I'm guessing S3-like) called Dream Objects, but it's only for static files. The URLs they give are good though, like https://objects.dreamhost.com/freeweibo/.
How to run a meek-server (bridge)
-
Compile the program using
go build
. -
Update your torrc file. There's a sample at /meek-server/torrc.
-
To test your bridge on the client side, you can add a line like this to your torrc:
Bridge meek 0.0.2.0:3 url=http://my-bridge.example.com:7002/
Important Note:
If you're running more than one transport, you need a separate tor process for each to avoid user counting confusion. See https://lists.torproject.org/pipermail/tor-dev/2014-September/007480.html and [#Users] for more information.
Troubleshooting
If meek doesn't work and you get a log message like this: NOTICE: Bridge at '0.0.2.0:1' isn't reachable by our firewall policy. Skipping. then you should unset the ReachableAddresses and FascistFirewall settings in your Tor configuration. These options don't understand the dummy addresses used in meek bridge lines. See comment:4:ticket:18611 for more information.
Users
For a log of events that might have affected the number of users, see the entries with "meek" in the "protocols" column at MetricsTimeline.
Costs
Monthly cost summary emails.
= 2014 = | Aug | Sep | Oct | Nov | Dec | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
= 2015 = | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec |
= 2016 = | Jan | Feb | Mar | Apr | May | Jun | Jul | Aug | Sep | Oct | Nov | Dec |
= 2017 = | Jan | Feb | Mar |
The notation "span(style=color:gray,—)" means meek wasn't deployed on that service in that month. The notation "span(style=color:gray,?)" marks the months after I stopped handling the invoices personally. I don’t know the costs for those months, so certain totals are marked with "+" to indicate that they are higher than what is shown. Table was automatically generated by tab-meek-costs.py and meek-costs.csv.
(Note: I have started adding the costs from 4/1/2017, and will keep this page updated monthly, srabbani@cymru.com)
|| |= Google =|= Amazon =|= Azure =|= total =| ||-|----------|----------|---------|---------| | 2014|Jan | span(style=color:gray,$)0.00| span(style=color:gray,—)| span(style=color:gray,—)| span(style=color:gray,$)0.00| | 2014|Feb | span(style=color:gray,$)0.09| span(style=color:gray,—)| span(style=color:gray,—)| span(style=color:gray,$)0.09| | 2014|Mar | span(style=color:gray,$)0.00| span(style=color:gray,—)| span(style=color:gray,—)| span(style=color:gray,$)0.00| | 2014|Apr | span(style=color:gray,$)0.73| span(style=color:gray,—)| span(style=color:gray,—)| span(style=color:gray,$)0.73| | 2014|May | span(style=color:gray,$)0.69| span(style=color:gray,—)| span(style=color:gray,—)| span(style=color:gray,$)0.69| | 2014|Jun | span(style=color:gray,$)0.65| span(style=color:gray,—)| span(style=color:gray,—)| span(style=color:gray,$)0.65| | 2014|Jul | span(style=color:gray,$)0.56| span(style=color:gray,$)0.00| span(style=color:gray,—)| span(style=color:gray,$)0.56| | 2014|Aug | span(style=color:gray,$)1.56| span(style=color:gray,$)3.10| span(style=color:gray,—)| span(style=color:gray,$)4.66| | 2014|Sep | span(style=color:gray,$)4.02| span(style=color:gray,$)4.59| span(style=color:gray,$)0.00| span(style=color:gray,$)8.61| | 2014|Oct | span(style=color:gray,$)40.85| span(style=color:gray,$)130.29| span(style=color:gray,$)0.00| span(style=color:gray,$)171.14| | 2014|Nov | span(style=color:gray,$)224.67| span(style=color:gray,$)362.60| span(style=color:gray,$)0.00| span(style=color:gray,$)587.27| | 2014|Dec | span(style=color:gray,$)326.81| span(style=color:gray,$)417.31| span(style=color:gray,$)0.00| span(style=color:gray,$)744.12| ||= 2014 total=| span(style=color:gray,$)600.63| span(style=color:gray,$)917.89| span(style=color:gray,$)0.00| span(style=color:gray,$)1,518.52| |||||| | || |= Google =|= Amazon =|= Azure =|= total =| | 2015|Jan | span(style=color:gray,$)464.37| span(style=color:gray,$)669.02| span(style=color:gray,$)0.00| span(style=color:gray,$)1,133.39| | 2015|Feb | span(style=color:gray,$)650.53| span(style=color:gray,$)604.83| span(style=color:gray,$)0.00| span(style=color:gray,$)1,255.36| | 2015|Mar | span(style=color:gray,$)690.29| span(style=color:gray,$)815.68| span(style=color:gray,$)0.00| span(style=color:gray,$)1,505.97| | 2015|Apr | span(style=color:gray,$)886.43| span(style=color:gray,$)785.37| span(style=color:gray,$)0.00| span(style=color:gray,$)1,671.80| | 2015|May | span(style=color:gray,$)871.64| span(style=color:gray,$)896.39| span(style=color:gray,$)0.00| span(style=color:gray,$)1,768.03| | 2015|Jun | span(style=color:gray,$)601.83| span(style=color:gray,$)820.00| span(style=color:gray,$)0.00| span(style=color:gray,$)1,421.83| | 2015|Jul | span(style=color:gray,$)732.01| span(style=color:gray,$)837.08| span(style=color:gray,$)0.00| span(style=color:gray,$)1,569.09| | 2015|Aug | span(style=color:gray,$)656.76| span(style=color:gray,$)819.59| span(style=color:gray,$)154.89| span(style=color:gray,$)1,631.24| | 2015|Sep | span(style=color:gray,$)617.08| span(style=color:gray,$)710.75| span(style=color:gray,$)490.58| span(style=color:gray,$)1,818.41| | 2015|Oct | span(style=color:gray,$)672.01| span(style=color:gray,$)110.72| span(style=color:gray,$)300.64| span(style=color:gray,$)1,083.37| | 2015|Nov | span(style=color:gray,$)602.35| span(style=color:gray,$)474.13| span(style=color:gray,$)174.18| span(style=color:gray,$)1,250.66| | 2015|Dec | span(style=color:gray,$)561.29| span(style=color:gray,$)603.27| span(style=color:gray,$)172.60| span(style=color:gray,$)1,337.16| ||= 2015 total=| span(style=color:gray,$)8,006.59| span(style=color:gray,$)8,146.83| span(style=color:gray,$)1,292.89| span(style=color:gray,$)17,446.31| |||||| | || |= Google =|= Amazon =|= Azure =|= total =| | 2016|Jan | span(style=color:gray,$)771.17| span(style=color:gray,$)1,581.88| span(style=color:gray,$)329.10| span(style=color:gray,$)2,682.15| | 2016|Feb | span(style=color:gray,$)986.39| span(style=color:gray,$)977.85| span(style=color:gray,$)445.83| span(style=color:gray,$)2,410.07| | 2016|Mar | span(style=color:gray,$)1,079.49| span(style=color:gray,$)865.06| span(style=color:gray,$)534.71| span(style=color:gray,$)2,479.26| | 2016|Apr | span(style=color:gray,$)1,169.23| span(style=color:gray,$)1,074.25| span(style=color:gray,$)508.93| span(style=color:gray,$)2,752.41| | 2016|May | span(style=color:gray,$)525.46| span(style=color:gray,$)1,097.46| span(style=color:gray,$)513.56| span(style=color:gray,$)2,136.48| | 2016|Jun | span(style=color:gray,—)| span(style=color:gray,$)1,117.67| span(style=color:gray,$)575.50| span(style=color:gray,$)1,693.17| | 2016|Jul | span(style=color:gray,—)| span(style=color:gray,$)1,121.71| span(style=color:gray,$)592.47| span(style=color:gray,$)1,714.18| | 2016|Aug | span(style=color:gray,—)| span(style=color:gray,$)1,038.62| span(style=color:gray,$)607.13| span(style=color:gray,$)1,645.75| | 2016|Sep | span(style=color:gray,—)| span(style=color:gray,$)932.22| span(style=color:gray,$)592.92| span(style=color:gray,$)1,525.14| | 2016|Oct | span(style=color:gray,—)| span(style=color:gray,$)1,259.19| span(style=color:gray,$)646.00| span(style=color:gray,$)1,905.19| | 2016|Nov | span(style=color:gray,—)| span(style=color:gray,$)1,613.00| span(style=color:gray,$)597.76| span(style=color:gray,$)2,210.76| | 2016|Dec | span(style=color:gray,—)| span(style=color:gray,$)1,569.84| span(style=color:gray,$)1,416.10| span(style=color:gray,$)2,985.94| ||= 2016 total=| span(style=color:gray,$)4,531.74| span(style=color:gray,$)14,248.75| span(style=color:gray,$)7,360.01| span(style=color:gray,$)26,140.50| |||||| | || |= Google =|= Amazon =|= Azure =|= total =| | 2017|Jan | span(style=color:gray,—)| span(style=color:gray,$)1,550.19| span(style=color:gray,$)1,196.28| span(style=color:gray,$)2,746.47| | 2017|Feb | span(style=color:gray,—)| span(style=color:gray,$)1,454.68| span(style=color:gray,$)960.01| span(style=color:gray,$)2,414.69| | 2017|Mar | span(style=color:gray,—)| span(style=color:gray,$)2,298.75| span(style=color:gray,$)353.81| span(style=color:gray,$)2,652.56| | 2017|Apr | span(style=color:gray,—)| span(style=color:gray,$)584.73| span(style=color:gray,$)725.80| span(style=color:gray,$)1,310.53| | 2017|May | span(style=color:gray,—)| span(style=color:gray,$)2,150.47| span(style=color:gray,$)1,097.29| span(style=color:gray,$)3,247.76| | 2017|Jun | span(style=color:gray,—)| span(style=color:gray,$)2,677.31| span(style=color:gray,$)4,358.50| span(style=color:gray,$)7,035.81| | 2017|Jul | span(style=color:gray,—)| span(style=color:gray,$)2,873.28| span(style=color:gray,$)5,330.18| span(style=color:gray,$)8,203.46| | 2017|Aug | span(style=color:gray,—)| span(style=color:gray,$)646.28| span(style=color:gray,$)4,020.68| span(style=color:gray,$)4,666.96| | 2017|Sep | span(style=color:gray,—)| span(style=color:gray,$)1,914.41| span(style=color:gray,$)4,670.51| span(style=color:gray,$)6,584.92| | 2017|Oct | span(style=color:gray,—)| span(style=color:gray,$)2,962.71| span(style=color:gray,$)3,912.41| span(style=color:gray,$)6,875.12| | 2017|Nov | span(style=color:gray,—)| span(style=color:gray,$)4,674.80| span(style=color:gray,$)2,513.43| span(style=color:gray,$)7,188.23| | 2017|Dec | span(style=color:gray,—)| span(style=color:gray,$)6,358.11| span(style=color:gray,$)1,451.36| span(style=color:gray,$)7,809.47| ||= 2017 total=| span(style=color:gray,—)| span(style=color:gray,$)30,145.72| span(style=color:gray,$)30,590.26| span(style=color:gray,$)60,735.98| |||||| | || |= Google =|= Amazon =|= Azure =|= total =| | 2018|Jan | span(style=color:gray,—)| span(style=color:gray,$)8,429.07| span(style=color:gray,$)1,880.31| span(style=color:gray,$)10,309.38| | 2018|Feb | span(style=color:gray,—)| span(style=color:gray,$)8,522.01| span(style=color:gray,$)2,630.71| span(style=color:gray,$)11,152.72| | 2018|Mar | span(style=color:gray,—)| span(style=color:gray,$)10,863.95| span(style=color:gray,?)| span(style=color:gray,$)10,863.95+| ||= 2018 total=| span(style=color:gray,—)| span(style=color:gray,$)27,815.03| span(style=color:gray,$)4,511.02+| span(style=color:gray,$)32,326.05+| |||||| | ||= grand total=| span(style=color:gray,$)13,138.96| span(style=color:gray,$)81,274.22| span(style=color:gray,$)43,754.18+| span(style=color:gray,$)138,167.36+|
Research papers
Related to domain fronting.
- Blocking-resistant communication through domain fronting: Describes the technique and the experience of deployment.
- Seeing through Network-Protocol Obfuscation: Builds classifiers for meek, obfs3, obfs4, and FTE, and evaluates them against large traffic traces.
- Towards Measuring Unobservability in Anonymous Communication Systems (Chinese): Evaluates certain traffic features (packet size and timing) of meek and vanilla Tor, and compares them to a known non-circumvention trace using relative entropy.
- Decoy routing is a related idea.
Distinguishability
Barriers to indistinguishability
- TLS ciphersuites\ Look like a browser. #4744 (moved) has the story of when tor changed its ciphersuite list to look like Firefox's in 2012. tor's list of ciphers is in [https://gitweb.torproject.org/tor.git/tree/src/common/ciphers.inc?id=89c16890095d63cc6f56a378108efc3d3f063204 src/common/ciphers.inc].
- TLS extensions\ Look like a browser.
- Packet lengths\ Do something to break up fixed-length cells.
- Interpacket times
- Upstream/downstream bandwidth ratio
- Polling interval\ When we have nothing to send, we start polling at 100 ms, and increase the interval by 50% every time no data is received, up to a maximum of 5 s. The growth pattern and the fixed cap is detectable.\ Here's what the fixed polling of 5 s looks like in the GNOME system monitor:\ Image(meek-0.1-network-history.png)
- Maximum payload lengths\ Payloads are limited to 65536 bytes. During bootstrapping and bulk downloads, a lot of bodies have exactly this size.
- Behavior on random drops\ Suppose the censor drops every hundredth connection to https://www.google.com/. Normal web users will just refresh; meek's stream will be broken.
- Number of simultaneous requests\ Browsers open many parallel connections to the same server; I think meek 0.4 opens just one.
- Extra latency\ The latency between the client and the front domain is likely to be measurably different from the latency between the client and the real destination. Working in our advantage is that we are likely to be transporting web traffic, so we inherit some of its traffic characteristics.
Could test with Joy (paper), which does classification of TLS using plaintext metadata and netflow.
How to look like browser HTTPS
We decided to use a browser extension to make all the HTTPS requests required by meek, so that the requests look just like those made by a browser. There's an extension [ticket:11183 for Firefox] (which works with Tor Browser, so it can work in the browser bundle without shipping a second browser) and one [ticket:11393 for Chrome]. The list below is a summary of a discussion that took place on the tor-dev mailing list and on IRC.
Sample client hellos
A big list of client hellos from different applications was moved to meek/SampleClientHellos.
Style guide
The word "meek" should be written in lower case, even when it is the first word in a sentence. Exception: when it is the last word in a sentence, it should be in ALL CAPS. When printed on glossy paper, the word should be followed by a ™ symbol; when handwritten, decisively underlined. Exception to everything: if it is the _n_th appearance of "meek" in a document, and n is the description number of a non-halting Turing machine, then write "𝕸𝕰𝕰𝕶" in honor of Alan Turing and/or Sublime.
Tickets
TicketQuery(status=closed&component=Circumvention/meek&or&status=closed&keywords=~meek) TicketQuery(status=!closed&component=Circumvention/meek&or&status=!closed&keywords=~meek)