[tor-dev] Def Con Kaminsky talk (censorship detection)
David Fifield
david at bamsoftware.com
Tue Jul 31 15:24:45 UTC 2012
Dan replies:
On Mon, Jul 30, 2012 at 11:33:09AM -0700, Dan Kaminsky wrote:
> Basically, if you spoof HTTP or HTTPS headers from a Flash socket to your own
> IP, with someone else's Host/SNI, a transparent proxy is going to send its
> interposing content to the Flash SWF and not to the browser. It's a really
> deployable way to see nasty stuff.
>
> One warning is that if hijacking is DNS based, and not transparent proxy based,
> you don't see anything with this stunt (though favicon.ico detection still
> works).
>
> On Mon, Jul 30, 2012 at 10:57 AM, David Fifield <david at bamsoftware.com> wrote:
>
> I saw an interesting talk by Dan Kaminsky at Def Con that touched on
> some ideas for censorship detection. He mentioned OONI-probe and talked
> about his project CensorSweeper. It tests blockedness of web sites by
> making cross-domain requests for favicon.ico and displaying them in a
> minesweeper-like grid.
>
> http://www.censorsweeper.com/
> https://www.hackerleague.org/hackathons/wsj-data-transparency-code-a-thon/
> hacks/censorsweeper
>
> He also mentioned something, which unfortunately I didn't follow very
> closely, about using Flash sockets to spoof HTTP and HTTPS headers. I
> think the gag here was sending these spoofed connections to a server you
> control (so you can answer the crossdomain policy requests without which
> Flash Player will refuse to connect), but you give it a Host header of a
> censored site or something like that.
>
> http://miriku.com/wp/2012/07/decon-day-3/comment-page-1/#comment-1416
>
> Unfortunately I don't have the conference DVD which presumably contains
> the slides he used, but videos usually show up online after some number
> of months.
>
> David Fifield
>
>
More information about the tor-dev
mailing list