[liberationtech] SOPA and DNS-level Censorship Circumvention
Jordan McCarthy
jrmccarthy at stanford.edu
Mon Jan 9 18:17:44 PST 2012
As I was reading your email, it occurred to me that one of the (many)
detrimental by-products of this whole SOPA/PROTECT IP debacle may be to
severely exacerbate the U.S.'s already-nasty malware problem. As you
point out, the second any legislation of this kind is enacted, a host of
circumnavigation tools are going to immediately hit the market. While
the ones you describe (and have been so kind as to implement) are
obviously well-intentioned, I can't imagine that it'll take more than
three seconds for scam-artists of all stripes to jump on the bandwagon,
and start putting out their own "auto-configuration anti-censorship
utilities" based on their own poisoned DNS servers (ie, ones that direct
wellsfargo.com to wellsfargo.com.%34%63%22...). Of course, they've
already done this sort of thing in various ways, but it seems very, very
likely that SOPA will only make the phenomenon a whole lot worse.
For the purposes of this discussion, though, I suppose my main point is
that any system of the kind under consideration should optimally have
some sort of VERY easy-to-understand trust/authentication mechanisms
built-in, and be accompanied by an extensive public-awareness campaign,
to prevent unwitting users from being duped into sending their credit
card numbers straight to the blackhats' databases (to an even greater
extent than they already are).
Nevertheless, I'm exceedingly grateful that people are starting to think
about and code up some of these utilities. It looks like we might need
them.
- Jordan
My PGP Public Key <http://www.stanford.edu/%7Ejordanrm/pubkey.asc>
Sent from a computer running Free and Open Source Software
On 01/09/2012 04:41 PM, Griffin Boyce wrote:
> Hey all,
>
> With the SOPA vote on the horizon, now seems to be a good time to
> talk about censorship at the DNS level.
>
> Computers use Domain Name Servers to make the connection to websites.
> These large servers act as online address books for websites, telling
> computers where the site they want to visit is located. So the flow
> is typically /Website Address -> DNS Server -> Website's Host/. If
> SOPA passes, sites alleged to be infringing copyright will be blocked
> from visitors in the US: /Website Address -> US DNS Server -> Block Page/.
>
> You can customize which servers your computer uses to fetch
> addresses, and bypass these types of blocks entirely. A good tutorial
> on how to do that is here:
> http://code.google.com/speed/public-dns/docs/using.html Though keep in
> mind that the server addresses mentioned on that tutorial are located
> in the United States. So anyone looking to bypass /American/
> censorship will need to use servers in an uncensored country like
> Iceland or Belgium.
>
> Another good option is using a browser plugin. For FireFox, there
> are two currently: Soapy and DeSopa. DeSopa automatically fetches
> server details for websites, but relies on a website that is likely to
> be blocked once SOPA goes into effect. However, it does work until
> blocked. I made Soapy with all of the rules it needs to function built
> into it. With Soapy, every site that is enabled must have redirection
> rules created for it, but it's also quite light (<50kb, each site is
> ~200bytes) and easily updated with new sites.
>
> DeSopa: https://addons.mozilla.org/en-US/firefox/addon/desopa/
> Soapy: http://griftastic.com/soapy.html
>
> These browser plugins are really quick hacks designed to get into
> people's hands quickly. (And there aren't any for Chrome, Opera,
> Safari, or IE yet). There has to be a more elegant and robust
> solution that we can create for people affected by this type of
> censorship -- not just in the US, but around the world. It's
> completely possible to run censorship-resistant DNS servers in
> uncensored countries, but the critical missing element is a highly
> usable piece of software that will adjust the user's network settings
> without a major hassle. DnsJumper might work, but isn't open-source
> and users have to find unblocked servers to use.
>
> What do you all think about this?
>
> All the best,
> Griffin Boyce
>
> --
> "I believe that usability is a security concern; systems that do
> not pay close attention to the human interaction factors involved
> risk failing to provide security by failing to attract users."
> ~Len Sassaman
>
>
> _______________________________________________
> liberationtech mailing list
> liberationtech at lists.stanford.edu
>
> Should you need to change your subscription options, please go to:
>
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
> If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?"
>
> You will need the user name and password you receive from the list moderator in monthly reminders.
>
> Should you need immediate assistance, please contact the list moderator.
>
> Please don't forget to follow us on http://twitter.com/#!/Liberationtech
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20120109/c8b6189d/attachment.html>
More information about the liberationtech
mailing list