| 
														
															@@ -32,12 +32,12 @@ 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \begin{abstract} 
														 | 
														
														 | 
														
															 \begin{abstract} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															-Websites around the world are increasingly being blocked by 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-government-level firewalls. Many people use anonymizing networks like 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-Tor to contact sites without letting an attacker trace their activities, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-and as an added benefit they are no longer affected by local censorship. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-But if the attacker simply denies access to the Tor network itself, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-blocked users can no longer benefit from the security Tor offers. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+Internet censorship is on the rise as websites around the world are 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+increasingly blocked by government-level firewalls.  Although popular 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+anonymizing networks like Tor were originally designed to keep attackers from 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+tracing people's activities, many people are also using them to evade local 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+censorship.  But if the censor simply denies access to the Tor network 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+itself, blocked users can no longer benefit from the security Tor offers. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 Here we describe a design that builds upon the current Tor network 
														 | 
														
														 | 
														
															 Here we describe a design that builds upon the current Tor network 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 to provide an anonymizing network that resists blocking 
														 | 
														
														 | 
														
															 to provide an anonymizing network that resists blocking 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -47,16 +47,17 @@ by government-level attackers. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \section{Introduction and Goals} 
														 | 
														
														 | 
														
															 \section{Introduction and Goals} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															-Anonymizing networks such as Tor~\cite{tor-design} bounce traffic around 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-a network of relays. They aim to hide not only what is being said, but 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-also who is communicating with whom, which users are using which websites, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-and so on. These systems have a broad range of users, including ordinary 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-citizens who want to avoid being profiled for targeted advertisements, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-corporations who don't want to reveal information to their competitors, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-and law enforcement and government intelligence agencies who need to do 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-operations on the Internet without being noticed. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															- 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-Historically, research on anonymizing systems has focused on a passive 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+Anonymizing networks like Tor~\cite{tor-design} bounce traffic around a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+network of encrypting relays.  Unlike encryption, which hides only {\it what} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+is said, these network also aim to hide who is communicating with whom, which 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+users are using which websites, and similar relations.  These systems have a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+broad range of users, including ordinary citizens who want to avoid being 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+profiled for targeted advertisements, corporations who don't want to reveal 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+information to their competitors, and law enforcement and government 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+intelligence agencies who need to do operations on the Internet without being 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+noticed. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+ 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+Historical anonymity research has focused on an 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 attacker who monitors the user (call her Alice) and tries to discover her 
														 | 
														
														 | 
														
															 attacker who monitors the user (call her Alice) and tries to discover her 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 activities, yet lets her reach any piece of the network. In more modern 
														 | 
														
														 | 
														
															 activities, yet lets her reach any piece of the network. In more modern 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 threat models such as Tor's, the adversary is allowed to perform active 
														 | 
														
														 | 
														
															 threat models such as Tor's, the adversary is allowed to perform active 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -78,13 +79,14 @@ network from China each day. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 The current Tor design is easy to block if the attacker controls Alice's 
														 | 
														
														 | 
														
															 The current Tor design is easy to block if the attacker controls Alice's 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 connection to the Tor network---by blocking the directory authorities, 
														 | 
														
														 | 
														
															 connection to the Tor network---by blocking the directory authorities, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 by blocking all the server IP addresses in the directory, or by filtering 
														 | 
														
														 | 
														
															 by blocking all the server IP addresses in the directory, or by filtering 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-based on the signature of the Tor TLS handshake. Here we describe a 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-design that builds upon the current Tor network to provide an anonymizing 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+based on the signature of the Tor TLS handshake. Here we describe an 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+extended design that builds upon the current Tor network to provide an 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+anonymizing 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 network that also resists this blocking. Specifically, 
														 | 
														
														 | 
														
															 network that also resists this blocking. Specifically, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 Section~\ref{sec:adversary} discusses our threat model---that is, 
														 | 
														
														 | 
														
															 Section~\ref{sec:adversary} discusses our threat model---that is, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-the assumptions we make about our adversary; Section~\ref{sec:current-tor} 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+the assumptions we make about our adversary. Section~\ref{sec:current-tor} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 describes the components of the current Tor design and how they can be 
														 | 
														
														 | 
														
															 describes the components of the current Tor design and how they can be 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-leveraged for a new blocking-resistant design; Section~\ref{sec:related} 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+leveraged for a new blocking-resistant design. Section~\ref{sec:related} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 explains the features and drawbacks of the currently deployed solutions; 
														 | 
														
														 | 
														
															 explains the features and drawbacks of the currently deployed solutions; 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 and ... 
														 | 
														
														 | 
														
															 and ... 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -104,14 +106,18 @@ and ... 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \section{Adversary assumptions} 
														 | 
														
														 | 
														
															 \section{Adversary assumptions} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \label{sec:adversary} 
														 | 
														
														 | 
														
															 \label{sec:adversary} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+To design an effective anticensorship tool, we need a good model for the 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+goals and resources of the censors we are evading.  Otherwise, we risk 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+spending our effort on keeping the adversaries from doing things they have no 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+interest in doing and thwarting techniques they do not use. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 The history of blocking-resistance designs is littered with conflicting 
														 | 
														
														 | 
														
															 The history of blocking-resistance designs is littered with conflicting 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 assumptions about what adversaries to expect and what problems are 
														 | 
														
														 | 
														
															 assumptions about what adversaries to expect and what problems are 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-in the critical path to a solution. Here we try to enumerate our best 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+in the critical path to a solution. Here we describe our best 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 understanding of the current situation around the world. 
														 | 
														
														 | 
														
															 understanding of the current situation around the world. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															-In the traditional security style, we aim to describe a strong 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+In the traditional security style, we aim to defeat a strong 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 attacker---if we can defend against this attacker, we inherit protection 
														 | 
														
														 | 
														
															 attacker---if we can defend against this attacker, we inherit protection 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-against weaker attackers as well. After all, we want a general design 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+against weaker attackers as well.  After all, we want a general design 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 that will work for citizens of China, Iran, Thailand, and other censored 
														 | 
														
														 | 
														
															 that will work for citizens of China, Iran, Thailand, and other censored 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 countries; for 
														 | 
														
														 | 
														
															 countries; for 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 whistleblowers in firewalled corporate network; and for people in 
														 | 
														
														 | 
														
															 whistleblowers in firewalled corporate network; and for people in 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -120,46 +126,84 @@ a variety of adversaries in mind, we can take advantage of the fact that 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 adversaries will be in different stages of the arms race at each location, 
														 | 
														
														 | 
														
															 adversaries will be in different stages of the arms race at each location, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 so a server blocked in one locale can still be useful in others. 
														 | 
														
														 | 
														
															 so a server blocked in one locale can still be useful in others. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															-We assume there are three main network attacks in use by censors 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+We assume that the attackers' goals are somewhat complex. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\begin{tightlist} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item The attacker would like to restrict the flow of certain kinds 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  information, particularly when this information is seen as embarrassing to 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  those in power (such as information about rights violations or corruption), 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  or when it enables or encourages others to oppose them effectively (such as 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  information about opposition movements or sites that are used to organize 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  protests). 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item As a second-order effect, censors aim to chill citizens' behavior by 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  creating an impression that their online activities are monitored. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item Usually, censors make a token attempt to block a few sites for 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  obscenity, blasphemy, and so on, but their efforts here are mainly for 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  show. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item Complete blocking (where nobody at all can ever download) is not a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  goal. Attackers typically recognize that perfect censorship is not only 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  impossible, but unnecessary: if ``undesirable'' information is known only 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  to a small few, resources can be focused elsewhere 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item Similarly, the censors are not attempting to shut down or block {\it 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  every} anticensorship tool---merely the tools that are popular and 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  effective (because these tools impede the censors' information restriction 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  goals) and those tools that are highly visible (thus making the censors 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  look ineffectual to their citizens and their bosses). 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item Reprisal against {\it most} passive consumers of {\it most} kinds of 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  blocked information is also not a goal, given the broadness of most 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  censorship regimes. This seems borne out by fact.\footnote{So far in places 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  like China, the authorities mainly go after people who publish materials 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  and coordinate organized movements~\cite{mackinnon}.  If they find that a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  user happens to be reading a site that should be blocked, the typical 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  response is simply to block the site. Of course, even with an encrypted 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  connection, the adversary may be able to distinguish readers from 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  publishers by observing whether Alice is mostly downloading bytes or mostly 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  uploading them---we discuss this issue more in 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  Section~\ref{subsec:upload-padding}.} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item Producers and distributors of targeted information are in much 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  greater danger than consumers; the attacker would like to not only block 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  their work, but identify them for reprisal. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item The censors (or their governments) would like to have a working, useful 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  Internet. Otherwise, they could simply ``censor'' the Internet by outlawing 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  it entirely, or blocking access to all but a tiny list of sites. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  Nevertheless, the censors {\it are} willing to block innocuous content 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  (like the bulk of a newspaper's reporting) in order to censor other content 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  distributed through the same channels (like that newspaper's coverage of 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  the censored country). 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\end{tightlist} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+ 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+We assume there are three main technical network attacks in use by censors 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 currently~\cite{clayton:pet2006}: 
														 | 
														
														 | 
														
															 currently~\cite{clayton:pet2006}: 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \begin{tightlist} 
														 | 
														
														 | 
														
															 \begin{tightlist} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \item Block a destination or type of traffic by automatically searching for 
														 | 
														
														 | 
														
															 \item Block a destination or type of traffic by automatically searching for 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-  certain strings or patterns in TCP packets. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-\item Block a destination by manually listing its IP address at the 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-firewall. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  certain strings or patterns in TCP packets.  Offending packets can be 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  dropped, or can trigger a response like closing the 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  connection. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\item Block a destination by listing its IP address at a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  firewall or other routing control point. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \item Intercept DNS requests and give bogus responses for certain 
														 | 
														
														 | 
														
															 \item Intercept DNS requests and give bogus responses for certain 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-destination hostnames. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  destination hostnames. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \end{tightlist} 
														 | 
														
														 | 
														
															 \end{tightlist} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 We assume the network firewall has limited CPU and memory per 
														 | 
														
														 | 
														
															 We assume the network firewall has limited CPU and memory per 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-connection~\cite{clayton:pet2006}. Against an adversary who carefully 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-examines the contents of every packet, we would need 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-some stronger mechanism such as steganography, which introduces its 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-own problems~\cite{active-wardens,tcpstego,bar}. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															- 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-More broadly, we assume that the authorities are more likely to 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-block a given system as its popularity grows. That is, a system 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-used by only a few users will probably never be blocked, whereas a 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-well-publicized system with many users will receive much more scrutiny. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															- 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-We assume that readers of blocked content are not in as much danger 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-as publishers. So far in places like China, the authorities mainly go 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-after people who publish materials and coordinate organized 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-movements~\cite{mackinnon}. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-If they find that a user happens 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-to be reading a site that should be blocked, the typical response is 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-simply to block the site. Of course, even with an encrypted connection, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-the adversary may be able to distinguish readers from publishers by 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-observing whether Alice is mostly downloading bytes or mostly uploading 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-them---we discuss this issue more in Section~\ref{subsec:upload-padding}. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+connection~\cite{clayton:pet2006}.  Against an adversary who could carefully 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+examine the contents of every packet and correlate the packets in every 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+stream on the network, we would need some stronger mechanism such as 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+steganography, which introduces its own 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+problems~\cite{active-wardens,tcpstego,bar}.  But we make a ``weak 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+steganography'' assumption here: to remain unblocked, it is necessary to 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+remain unobservable only by computational resources on par with a modern 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+router, firewall, proxy, or IDS. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 We assume that while various different regimes can coordinate and share 
														 | 
														
														 | 
														
															 We assume that while various different regimes can coordinate and share 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-notes, there will be a time lag between one attacker learning 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-how to overcome a facet of our design and other attackers picking it up. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-Similarly, we assume that in the early stages of deployment the insider 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-threat isn't as high of a risk, because no attackers have put serious 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-effort into breaking the system yet. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+notes, there will be a time lag between one attacker learning how to overcome 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+a facet of our design and other attackers picking it up.  (The most common 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+vector of transmission seems to be commercial providers of censorship tools: 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+once a provider add a feature to meet one country's needs or requests, the 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+feature is available to all of the provider's customers.)  Conversely, we 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+assume that insider attacks become a higher risk only after the early stages 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+of network development, once the system has reached a certain level of 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+success and visibility. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 We do not assume that government-level attackers are always uniform across 
														 | 
														
														 | 
														
															 We do not assume that government-level attackers are always uniform across 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 the country. For example, there is no single centralized place in China 
														 | 
														
														 | 
														
															 the country. For example, there is no single centralized place in China 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -174,14 +218,11 @@ a user who is entirely observed and controlled by the adversary. See 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 Section~\ref{subsec:cafes-and-livecds} for more discussion of what little 
														 | 
														
														 | 
														
															 Section~\ref{subsec:cafes-and-livecds} for more discussion of what little 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 we can do about this issue. 
														 | 
														
														 | 
														
															 we can do about this issue. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															-We assume that widespread access to the Internet is economically, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-politically, and/or 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-socially valuable to the policymakers of each deployment country. After 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-all, if censorship 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-is more important than Internet access, the firewall administrators have 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-an easy job: they should simply block everything. The corollary to this 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-assumption is that we should design so that increased blocking of our 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-system results in increased economic damage or public outcry. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+We assume that the attacker may be able to use political and economic 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+resources to secure the cooperation of extraterritorial or multinational 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+corporations and entities in investigating information sources.  For example, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+the censors can threaten the hosts of troublesome blogs with economic 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+reprisals if they do not reveal the authors' identities. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 We assume that the user will be able to fetch a genuine 
														 | 
														
														 | 
														
															 We assume that the user will be able to fetch a genuine 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 version of Tor, rather than one supplied by the adversary; see 
														 | 
														
														 | 
														
															 version of Tor, rather than one supplied by the adversary; see 
														 |