Blocking-resistant communication through domain fronting
We describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the cen...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2015-06-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Subjects: | |
Online Access: | https://doi.org/10.1515/popets-2015-0009 |
id |
doaj-9bc80adb9524493fbab3fdfd30ed5657 |
---|---|
record_format |
Article |
spelling |
doaj-9bc80adb9524493fbab3fdfd30ed56572021-09-05T13:59:51ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842015-06-0120152466410.1515/popets-2015-0009popets-2015-0009Blocking-resistant communication through domain frontingFifield David0Lan Chang1Hynes Rod2Wegmann Percy3Paxson Vern4University of California, BerkeleyUniversity of California, BerkeleyPsiphon IncBrave New SoftwareUniversity of California, Berkeley and the International Computer Science InstituteWe describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside” of an HTTPS request—in the DNS request and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryption. A censor, unable to distinguish fronted and nonfronted traffic to a domain, must choose between allowing circumvention traffic and blocking the domain entirely, which results in expensive collateral damage. Domain fronting is easy to deploy and use and does not require special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumvention workhorse. We describe several months of deployment experience in the Tor, Lantern, and Psiphon circumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month.https://doi.org/10.1515/popets-2015-0009censorship circumvention |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Fifield David Lan Chang Hynes Rod Wegmann Percy Paxson Vern |
spellingShingle |
Fifield David Lan Chang Hynes Rod Wegmann Percy Paxson Vern Blocking-resistant communication through domain fronting Proceedings on Privacy Enhancing Technologies censorship circumvention |
author_facet |
Fifield David Lan Chang Hynes Rod Wegmann Percy Paxson Vern |
author_sort |
Fifield David |
title |
Blocking-resistant communication through domain fronting |
title_short |
Blocking-resistant communication through domain fronting |
title_full |
Blocking-resistant communication through domain fronting |
title_fullStr |
Blocking-resistant communication through domain fronting |
title_full_unstemmed |
Blocking-resistant communication through domain fronting |
title_sort |
blocking-resistant communication through domain fronting |
publisher |
Sciendo |
series |
Proceedings on Privacy Enhancing Technologies |
issn |
2299-0984 |
publishDate |
2015-06-01 |
description |
We describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside” of an HTTPS request—in the DNS request and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryption. A censor, unable to distinguish fronted and nonfronted traffic to a domain, must choose between allowing circumvention traffic and blocking the domain entirely, which results in expensive collateral damage. Domain fronting is easy to deploy and use and does not require special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumvention workhorse. We describe several months of deployment experience in the Tor, Lantern, and Psiphon circumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month. |
topic |
censorship circumvention |
url |
https://doi.org/10.1515/popets-2015-0009 |
work_keys_str_mv |
AT fifielddavid blockingresistantcommunicationthroughdomainfronting AT lanchang blockingresistantcommunicationthroughdomainfronting AT hynesrod blockingresistantcommunicationthroughdomainfronting AT wegmannpercy blockingresistantcommunicationthroughdomainfronting AT paxsonvern blockingresistantcommunicationthroughdomainfronting |
_version_ |
1717812897040564224 |