a disturbing comment on my blog…

Post on 01-Feb-2016

23 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

A disturbing comment on my blog…. Who is sux@boston.com ?. IP: 128.100.171.22. sux@boston.com posted from this IP!. So what’s an IP? An address. Every computer connected to the Internet has one, or shares one. Four numbers - each 0-255, separated by periods: 128.100.171.22 - PowerPoint PPT Presentation

TRANSCRIPT

A disturbing comment on my blog…

Who is sux@boston.com?

sux@boston.com posted from this IP!

IP: 128.100.171.22

So what’s an IP?

An address. Every computer connected to the Internet has one, or shares one.

Four numbers - each 0-255, separated by periods: 128.100.171.22

Try typing “66.233.167.99” into a web browser. You get…

66.233.167.99 is the IP address of one of the thousands of computers that run Google’s website. Easier to remember “google.com”, huh?

Every computer on the Internet has an IP address or shares one.

Everything transmitted on the Internet - an email, a webpage, a picture, a sound file - is made up of one or more “packets” of data.

These packets have a header, a payload and, sometimes, a footer. The header includes the IP address of the computer sending a packet, and the IP address of the computer receiving it.

When you type 66.233.167.99 into your browser, you send a set of packets to a Google computer, asking it to send some packets back to your IP address. Your browser assembles those packets into the Google homepage.

So what’s my IP address?

151.203.155.73. Or was that 192.168.0.103?

Network Address Translation lets 254 computers share one IP address!

Who is 128.100.171.22?No - whois 128.100.171.22!

One of 65,536 IP addresses at U Toronto…

“Dear Russ, which of your users thinks Boston sucks?”

nslookup at kloth.net

haxor.citizenlab.com!

whois contacts the authority responsible for assigning IP addresses and asks who has been assigned the IP address you’re curious about.

nslookup uses the domain name system - the system that associates the names of computers connected to the Internet to IP addresses - to tell you what domain names are associated with an IP address.

Aha!

Nart works for Citizen Lab!

Allowing me to craft an appropriate response…

Other possible outcomes:- IP address was from a shared or publicly accessible computer. Result: no way to know who made the post without a record of users.- IP address was from an ISP via dialup, DSL or cable modem. Result: ISP may have records of which user had the IP, but won’t release except under subpoena.- IP address was a proxy or anonymizer, designed to hide the poster’s identity. Result: Proxy operator may - or may not - have records of the real IP.

IP address is a lousy identifier.

What happens if Google says “Hello, Ethan - here’s your new gmail” when it sees a request from 151.203.155.73?

Anyone in my house can read my mail. And when my ISP gives me a new IP, someone else is very confused to be greeted as Ethan.

Unfortunately, IPs get treated like unique identifiers often… because we don’t have other options.

I can’t get information from an ISP aboutwho has a particular IP…

But governments can.

Security online is about protecting and obscuring your IP address.

If you don’t protect your identity, prepare to have your computers seized…

Deleting & Wiping files

• When files are deleted the name is removed from the disk and the space is marked as available for new data

• As long as no data is written to that space the original file can be recovered

• A little experiment– A file called secretfiles.doc was created in “My

Documents”– It was “deleted” and sent to the Recycle bin– The Recycle bin was emptied

Undelete

Wiping

• Wiping utilities overwrite data with garbage

• The greater the number of overwrite passes it makes the more difficult it is to recover the data

Dpeft boe djqifst:

voefstuboejoh fodszqujpo

Dpeft boe djqifst:

voefstuboejoh fodszqujpoCodes and ciphers:

understanding encryption

Dpeft boe djqifst:

Codes and ciphers:Add to each letter: 1

“Add to each letter” - algorithm“1” - secret key

A very weak form of encryption…

A better cipher+ -+-+-+ -+-+-+1 234512 345123B zhpydt zmkicu

Realworld ciphers use complex, multipart algorithms and LONG keys. Algorithms are public - keys are secret.

An encrypted file…

Encrypted Storage

• A lot of utilities, a nice one for Windows is BestCrypt (http://www.jetico.com/)

• It creates an additional drive letter that you need to enter a password to access

Encrypted Storage

Encrypted Storage

Encrypted Storage

• Any files you place in the BestCrypt drive are encrypted

• When you unmount the drive, the drive letter disappears

Remote Backup

• Store files on a remote server

• Allows you to recover your files if something happens

• You can remove sensitive files from you computer, and retrieve them at a later time

Martus.org

• Martus is a software tool that allows users to create “bulletins”, uploading them at the earliest opportunity, and storing them on redundant servers located around the world

Martus.org

• Records are encrypted, stored securely at a remote site, backed up to multiple locations and protected by a unique password.

• After a bulletin has been designated as final by the user, it cannot be altered, ensuring that even an unauthorized user who may have obtained access cannot delete the group's records.

Some bad passwords:“fluffy” - Pet’s name (guessable)“010473” - Dates (guessable)“solitaire” - common words (vulnerable)

Dictionary attacks - take every word in a dictionary. Encrypt them. See if any one matches the password. If so, you’re in!

Better password: fluffy010473Even better: fluFFY0104&#

VGY&BHU*

Not very easy to remember…

VGY&BHU*

Very easy to remember… possibly too easy

99bob@TW

“Ninety nine bottles of beer on the wall”

The longer the betterMix of letters, numbers, symbolsUPPER and lowercase MiXeD

BUT

A good password is memorable without writing it down.A written password is a broken password.

If you can only remember one password, usePasswordSafe or PasswordGorilla…

Surveillance & Locations

• Low-tech (security camera placed at a cyber-cafe)

• Local (software on a specific PC, e.g. keystroke logger)

• Network/ISP• Internet backbone / Int’l

gateway

PC: Key Stroke Logger• Hardware or Software

that logs all key strokes• Intercepts passwords• Log files can be

transmitted to remote location

Packet Sniffing• Intercept network traffic• Protocol Analysis (HTTP

vs. SMTP)• Optionally, search for

specific strings (keywords, names, email addresses)

What Filtering Looks Like

Filtering: Where and How

• DNS filtering• IP filtering• URL filtering

Filtering

• Detecting Filtering– Sometimes an error is just an error– How can we tell?

• Responding to Filtering– Knowing how a site is filtered is extremely

important

Block Pages• Confirms a block• May contain category

information• May indicate tech used• View-Source:

– <ISUTAG filter="sf" url="http://www.playboy.com/" >

– <ISUTAG filter="local"

url="http://www.islah.tv/">

HTTP Headers• May identify filtering tech

– Iran: NEDAGET http://www.emrooz.ws/ HTTP/1.1

HTTP/1.x 403 Forbidden

X-Squid-Error: ERR_SCC_SMARTFILTER_DENIED

• 404 or 403– Distinguish between errors

• 302: Check Redirects– UzSciNetGET http:// forum.ferghana.ru / HTTP/1.1

HTTP/1.x 301 Moved Permanently

Location: http://ferghana.ru/

• 200: Blockpage?– Server header is good indicator

Network Interrogation

• Tools:– Traceroute

– TCP Traceroute

– Packet Sniffer

Key Questions

• Is the site filtered for sure?

• Is there an indication why it is filtered?

• When is it time to sound the alarm?

• When is it time to activate your circumvention strategy?

Circumvention Strategies

• Push strategies: content delivered to users.

• Pull strategies: enables users to access content.

Get to know your users

• Context and location of users• Spectrum from casual to committed• Servicing Users

– Sign-up profiles– Email list

• Identify users that want continued information– Interactivity – Updates

Info Management

• There will be windows of opportunity: it takes time for a site to be filtered

• Information you make public can be discovered by those who filter

• Develop responses to filtering that relate to your users

Responses

• Communication Strategy

• Mirroring Strategy

• Syndication Strategy

• Circumvention Strategy

Communications

• Sustain communication with users– Email– IM, Chat, SMS

• Advertise new locations– E.g. Google Ads

Mirroring

• Register multiple domain names

• Obtain accounts on several ISPs

• Have a technical mirroring solution ready

Our clever db trick…

Syndication

• CC/GPL for syndication options

• RSS– Third-party aggregators– RSS emailer– RSS mirrors

• P2P

Responses

Circumvention

Simple Circumvention

• Sometimes it’s a simple as removing “www” from the domain name

• Or accessing the IP directly or through an alternate domain name

• Or using the Google cache

Two Types of Users

• Providers: non-filtered locations

• Users: censored locations

• Successful circumvention relies on meeting the needs of both users.

Determining Needs and Capacity

• Bandwidth• User location• Level of technical expertise• Trusted contacts• Potential penalty• Full disclosure

Public vs. Private

• Public– Zero Trust– Could be blocked

• Private– Trusted contact– Low circulation

Not Anonymous

• If plaintext, the content of the session can be easily intercepted and analyzed by an intermediary such as an Internet Service Provider (ISP)

Modify Browser Setting

“Open” Proxy Servers

• Not secure, traffic is in plain text

• Not anonymous, proxy owner can intercept all traffic

• Often just misconfigured servers that are not intended for public use

Private Key encryption:- Fast- Secure- Strength proportional to key length

Works great for protecting my files.But what if I want to send a secret message to you?The problem: Key distribution.

Conventional encryption is symmetric:

“cipher” “djqifs” “cipher”

key key

Public encryption is not symmetric:

“cipher” “cgaone” “cipher”

Key A Key B

You can encode a message with Key A, but Key A is useless for decoding it. Weird! Key A = public key. Key B = private key.

Sender Recipient

In conventional encryption, I send a message to the recipient in a locked box.

Both of us have the key, and both of us can open the box.

Recipient

In public key encryption, the recipient first sends me an unlocked box to which only she has the key.

I lock my message inside and send the box to her…

Once I’ve locked the message in the box, I can’t read it, as I don’t have the key!

It’s safe for the recipient to send me a lock, as the lock doesn’t allow me to unlock a locked box.

(Weird.)

Why is it safe to send a credit card number over the internet?

When you request an https:// site, that site sends your browser a public key - an unlocked box. Your browser encrypts your information so only that site can read it.

Signed Certificates

• A Certification Authority (CA) digitally signs each certificate issued

• Each browser contains a list of CAs to be trusted • When the SSL handshake occurs, the browser

verifies that the server certificate was issued by a trusted CA

• If the CA is not trusted, a warning will appear 

Man-In-The-Middle Attack

Private Circumventors

• Leverages personal relations of trust

• Web-based circumventor on SSL-enabled webserver

• Circumvention & security is the focus, not anonymity or privacy

Civisec & Psiphon

• Psiphon is an encrypted webserver + web-based proxy

• It is designed for personal use, based on the circle of trust model

• It is private and decentralized

Psipon

• Users in non-censored countries download the software

• The location is shared with users your personally know and trust in censored countries

• The user in the censored country does not have to download any software

Redundancy

• The circle of trust is based on social networks

• This model can be optionally extended for redundancy

Extending Trust

• Pro– Redundancy– Larger user base

• Con– Increases chance of infiltration– Increases chance of blocking

Anonymous Communications Systems

• Anonymity is protected from:– ISP– Circumvention system– Content server

• Examples– Java Anonymous Proxy– TOR

Explaining Tor

Downsides of Tor

• - slow

• dangerous if you’re the only one using it

• Hard to use?

We tend to treat email like it was private.It’s not.

In the US, if your employer provides your email, he is permitted to read it. Many do.

The administrator of your mail system can read your unencrypted email. How well do you trust your sysadmin? The sysadmin on the receiving end?

If anyone is sniffing packets on your network, they can read all unencrypted traffic - including email.

Ask your sysadmin if they support IMAPS or POPS. Most do, and most will thank you for using it.

When using web-based mail, use services that use https. Try this - https://gmail.google.com

Using Thunderbird with OpenGPG

Even with https, the email is still vulnerable on the server and your hard drive. Enter PGP…

Enigmail requires Thunderbird, GPG (a PGP implementation) and the Enigmail package.

Using pgp.mit.edu to find a public key.Is the key legit?

PGP users “sign” each other’s keys - this verifies that the person using the key is actually the person associated with it.

When a PGP-encrypted email arrives, Thunderbird asks you to enter your passphrase to decrypt. Also alerts you to signed mail.

Hushmail - PGP made easy (okay, easier.)

+

+

Near-anonymous blogging

Tor installed, ready to go…

Torpark - torpark.nfshost.com - Tor on a USB key!

If you’re concerned that your blog will get you into trouble, blog from an unmonitored cybercafe, and use Torpark on

a USB key.

Make sure Tor is working before relying on it.http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1

When using the web through Tor, your IP address is hidden - you appear to be coming from a different IP.

Set up a hushmail account with a name that is not easily linked to you.

Why we don’t recommend Hotmail…

Or Yahoo! Mail…As long as you sign up via Tor, you’d be okay…

But gmail…

…and hushmail don’t report your IP in their headers.

Still using Tor, and using your new hushmail account, sign up for a Wordpress blog.

The process isn’t perfect. Wordpress doesn’t expect you to be using Tor, and chokes occasionally. Ignore the errors and keep going…

Wordpress will send an email to your hushmail account. Respond - using Tor - to activate the new blog.

Your brand new, highly secure, hosted blog!

Using Tor, you can start posting. But one concern remains:

Sleepless in Sudan: Aid worker blogging from Darfur, highly critical of Sudanese government. Needs to remain completely anonymous.

We know the Khartoum government is watching Sleepless’s blog.

We know they can watch all Internet traffic coming out of Sudanese ISPs.

Every time something is posted to the blog, there’s a request from a specific IP to a Tor server…

Sleepless must be posting through Tor - let’s arrest her!

Changing timestamps to prevent timing attacks. Consider putting the date 5-15 minutes ahead of time - the blog will autopublish once you’ve already logged out!

To stay anonymous:

- Post, email and comment through Tor or another proxy.- Minimize information that could only have come from you.- Post from unmonitored public computers (danger of keystroke logging! )- Post from your machine (danger that you’re one of very few people using Tor/Proxy!)- Don’t be stupid.

Why you should not be anonymous:

-Identify yourself and by default, you’re trusted. Conceal yourself and by default, you’re not.

- Secrecy leads to speculation - is Salam Pax a CIA agent? An al-Qaeda member?

- Need to build your reputation as an anonymous blogger over many posts.

- If you can’t blog without being anonymous, be anonymous. If you can, seriously consider blogging in your own name.

Why is “Inside PCIJ” the top result for “gloria garci”?

How Google works… (sort of)

When you search for a term, you get web pages that include that term.

They’re ranked by “authority”.

“Authority” = popularity = incoming links(adjusted for spam, freshness, link farms)

PageRank - algorithm that determines authority of a page…

mypagerank.netRank: 0-10, logarithmic.Yahoo = 9, Google = 10

PCIJ’s blog is a “6” - pretty good!

Manila Standard is a “4”.Not so good.PCIJ is 100x more authoritative.

How much do we trust Jeff Ooi?

Google says Jeff is a “6”!

Who links to Jeff? Technorati.com

1794 links from 822 sites, #1,125 in the world!

Who links to Jeff… and why?

Why we link:

- Participate in conversations

- Reinforce social ties (blogroll)

- Ask for links back to our work

If you want links to your blog, link to other blogs. Comment on other blogs. Answer your own comments. Start conversations.

Blogpulse.com

pubsub.com

Tags identify blog content

Jordanplanet.net - a national blog aggregator

Posts from blogs, blogroll…

Virtual communities are also real-world communities. We link to people we know…

The Kaybees - Kenya’s national blogawards…

Clay Shirky - Weblogs and Power laws

Popular blogs - 10,000+ incoming links

Making friends with the A-List:

- Don’t beg.

- Know what they write about.

- Link before you ask.

- At a certain point, bloggers are journalists - disclosure of conflicts, transparency about linking.

top related