Towards a Tor Censorship Analysis Tool

by phw | February 6, 2013

The Tor network is documented to be blocked in several countries. Analyzing and circumventing these blocks typically requires detailed packet traces or access to machines inside censoring countries. Both, however, are not always easy to acquire:

  1. Network traces are problematic for two reasons. First, they are difficult to obtain since they require the cooperation of users within censoring countries. Second, they are hard to anonymize and must not fall into wrong hands. Derived information, such as flow diagrams, is typically safe to publish but frequently lacks important information.
  2. The alternative to network traces is to gain access to machines inside the censoring regime. This approach turns out to be difficult as well; mostly due to the lack of volunteers who could provide machines or the lack of VPS providers and open SOCKS proxies.

These problems show that there is a strong need for a lightweight tool which can assist in analyzing censorship events. This tool should be run by censored users and perform several tests to gain a rough understanding of how and if Tor could be blocked in the respective network. The results of these tests should make it back to the Tor project and would be used to improve circumvention technology such as obfsproxy and to document censorship.

We created a technical report which discusses the design requirements for such a censorship analysis tool. We list the desired features, discuss how they can be implemented and we give a rough overview of the software design. After all, this technical report should serve as basis for the development and deployment of the censorship analysis tool.

Comments

Please note that the comment area below has been archived.

February 16, 2013

Permalink

I do hope you have the good sense to keep such a tool completely separate from your other downloads, packages, bundles and all. The last thing a Tor user wants is some sort of built-in remote access for a 3rd party.

Yes, the idea is to offer this tool as a separate download. After all, most Tor users will hopefully never need it. Also, this has nothing to do with remote access or other insanities. The paper should clarify what it does and does not do.

February 28, 2013

Permalink

Unnamed, IP 92.38.209.239, $AB0850B7C517B0C9EC17F1CDC73C6CC425BFFCC4, Russia, blocks arbitrary websites.