Abstract
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that generates a large number of short-lived proxies. Clients using the system seamlessly hop from one proxy to the next as these browser-based proxies appear and disappear. We discuss a number of technical challenges that had to be overcome for this system to work and report on its performance and security. We show that browser-based short-lived proxies provide adequate bandwidth for video delivery and argue that blocking them can be challenging.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
The OpenNet Initiative: OpenNet Initiative Internet censorship data (2011), http://opennet.net/research/data
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
Wustrow, E., Wolchok, S., Goldberg, I., Halderman, J.A.: Telex: Anticensorship in the network infrastructure. In: Proc. 20th USENIX Security Symposium (2011)
Ultrareach Internet Corp.: Ultrasurf proxy, http://www.ultrasurf.us/
Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. Technical Report 2006-1, The Tor Project (November 2006)
Kadianakis, G., Mathewson, N.: Obfsproxy architecture (2011), https://www.torproject.org/projects/obfsproxy
Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Boneh, D., Wang, F. (StegoTorus: A camouflage proxy for the Tor anonymity system)
Tor Metrics Portal: Users (2011), https://metrics.torproject.org/users.html
Lewman, A.: Tor partially blocked in China (September 2009), https://blog.torproject.org/blog/tor-partially-blocked-china
McLachlan, J., Hopper, N.: On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM (November 2009)
Wilde, T.: Knock knock knockin’ on bridges’ doors (January 2012), https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors
Winter, P., Lindskog, S.: How China is blocking Tor. Technical report, Karlstad University (April 2012)
Appelbaum, J., Mathewson, N.: Pluggable transports for circumvention (October 2010), https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/180-pluggable-transport.txt
W3C: Cross-origin resource sharing (April 2012), http://www.w3.org/TR/cors/
Adobe Systems Incorporated: Adobe Flash Player 9 security (July 2008), http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/flashplayer/pdfs/flash_player_9_security.pdf
Tor Metrics Portal: Time in seconds to complete 5 MiB request (2012), https://metrics.torproject.org/performance.html
Loesing, K.: torperf measurements-HOWTO (2011), https://gitweb.torproject.org/torperf.git/blob_plain/HEAD:/measurements-HOWTO
Arlitt, M.F., Williamson, C.L.: Internet web servers: workload characterization and performance implications. IEEE/ACM Transactions on Networking 5 (October 1997)
Paxson, V., Floyd, S.: Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans. Netw. 3, 226–244 (1995)
Little, J.D.C.: A proof of the queuing formula L = λW (1960)
Rosenberg, J., Mahy, R., Matthews, P., Wing, D.: Session Traversal Utilities for NAT (STUN). RFC 5389 (Proposed Standard) (October 2008)
Adobe Systems Incorporated: Real Time Media Flow Protocol (October 2008), http://labs.adobe.com/technologies/cirrus/
Müller, A., Evans, N., Grothoff, C., Kamkar, S.: Autonomous NAT traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (P2P) (2010)
W3C: WebRTC 1.0: Real-time communication between browsers (January 2012), http://dev.w3.org/2011/webrtc/editor/webrtc.html
Lynn, B.: PBC library, http://crypto.stanford.edu/pbc/
Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infranet: Circumventing web censorship and surveillance. In: Proceedings of the 11th USENIX Security Symposium (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fifield, D. et al. (2012). Evading Censorship with Browser-Based Proxies. In: Fischer-Hübner, S., Wright, M. (eds) Privacy Enhancing Technologies. PETS 2012. Lecture Notes in Computer Science, vol 7384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-31680-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31679-1
Online ISBN: 978-3-642-31680-7
eBook Packages: Computer ScienceComputer Science (R0)