-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
National Anti-Fraud Center based plugins allegedly found in residential FTTR modem in China. #355
Comments
Do we have any evidence supporting the hypothesis on In our research paper on shadow-tls we did an experiments on almost the exact attack described above. Our data shows that out of 472K On the other hand, it should be easy to verify. But I wouldn't be surprised to learn they are really doing this to crackdown ShadowTLS-like SNI-masked circumvention tools, since censors often have different tolerance on collateral damages from ours (in academia). It is completely possible for censors to see all TLS connections to "hidden servers" as illegal. |
Thank you. That's an interesting detail about the SNI proxy. Forcing a connection to an IP address actually associated with the external SNI could defeat some forms of TLS-based circumvention. I and some colleagues wrote about SNI proxies discovered in the wild in 2016. |
Related to matching an SNI with an expected IP address, this is a recent (2022) patent from the Chinese firewall company Venustech (启明星辰). It is about building a database of expected IP addresses for hostnames through passive observation of natural DNS, HTTP, and HTTPS traffic. The database can be used to filter/block connections that use an unexpected IP address for the hostname. 基于局部敏感哈希算法的伴随域名检测方法 The database consists of (hostname, source IP, dest IP) records. For DNS, the hostname comes from the DNS response; for HTTP, it comes from the Host header; and for HTTPS, it comes from the TLS SNI. For each unique (hostname, dest IP), the number of unique source IP accessing it is counted and compared to a "rarity threshold" (potentially a different threshold for each protocol). The text of the patent shows that it is intended against domain fronting–like techniques:
It also mentions domain borrowing by name:
|
Related issue:
#354
Reference link:
https://chinadigitaltimes.net/chinese/701596.html
According to v2ex, a chinese tech forum, in October 2023, someone in China found that their newly installed FTTR modem provided by a Chinese telecom company contains internet censorship plugins, including tools related to National Anti-Fraud Center.
The author stated that their censorship-circumvention tools was blocked since the installation of the new FTTR modem. Their tools had been usable and had no problem prior the FTTR modem installation.
They tried to visit a legit VPS website but the website was redirected to the Chinese anti-fraud webpage.
Soon after that they received phone call from police asking them if they were trying to visit that VPS website (the police also mentioned the exact domain name in the call). The police said that VPS website is a fraud website and asked if they needed some police sent to their home.
I also found an article in chinese regarding this incident. It has a little more analysis about the anti-fraud plugins in FTTR modem, I don't know if the author of that article is comfortable with sharing their web directly, so here are my rough summary.
According to the log of that FTTR modem, it contains the following plugins that are suspicious:
homegraudv3
is probably a misspell of homeguardv3, it is a professional surveilliance tool which supports remote monitoring and management. Including screenshot, Website time limit, Website blocking, etc( 远程监控和控制计算机设备包括屏幕捕捉、上网时间限制、上网拦截等 ).antifraudv3
The author think it probably just functions like the National Anti-Fraud Center app, but the author in that article says that they have little information about this and since they don't have it themselves so they can't provide a conclusive analysis.dnslogv3
is a log of DNS usage including DNS queries.sniproxyv3
is a reverse SNI Proxy. The author think it works in the follow way:I think the SNI Proxy is probably how they redirect users to the anti-fraud website.
The text was updated successfully, but these errors were encountered: