Blocking-resistant communication through domain fronting

We describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the cen...

Full description

Bibliographic Details
Main Authors: Fifield David, Lan Chang, Hynes Rod, Wegmann Percy, Paxson Vern
Format: Article
Language:English
Published: Sciendo 2015-06-01
Series:Proceedings on Privacy Enhancing Technologies
Subjects:
Online Access:https://doi.org/10.1515/popets-2015-0009
id doaj-9bc80adb9524493fbab3fdfd30ed5657
record_format Article
spelling doaj-9bc80adb9524493fbab3fdfd30ed56572021-09-05T13:59:51ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842015-06-0120152466410.1515/popets-2015-0009popets-2015-0009Blocking-resistant communication through domain frontingFifield David0Lan Chang1Hynes Rod2Wegmann Percy3Paxson Vern4University of California, BerkeleyUniversity of California, BerkeleyPsiphon IncBrave New SoftwareUniversity of California, Berkeley and the International Computer Science InstituteWe describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside” of an HTTPS request—in the DNS request and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryption. A censor, unable to distinguish fronted and nonfronted traffic to a domain, must choose between allowing circumvention traffic and blocking the domain entirely, which results in expensive collateral damage. Domain fronting is easy to deploy and use and does not require special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumvention workhorse. We describe several months of deployment experience in the Tor, Lantern, and Psiphon circumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month.https://doi.org/10.1515/popets-2015-0009censorship circumvention
collection DOAJ
language English
format Article
sources DOAJ
author Fifield David
Lan Chang
Hynes Rod
Wegmann Percy
Paxson Vern
spellingShingle Fifield David
Lan Chang
Hynes Rod
Wegmann Percy
Paxson Vern
Blocking-resistant communication through domain fronting
Proceedings on Privacy Enhancing Technologies
censorship circumvention
author_facet Fifield David
Lan Chang
Hynes Rod
Wegmann Percy
Paxson Vern
author_sort Fifield David
title Blocking-resistant communication through domain fronting
title_short Blocking-resistant communication through domain fronting
title_full Blocking-resistant communication through domain fronting
title_fullStr Blocking-resistant communication through domain fronting
title_full_unstemmed Blocking-resistant communication through domain fronting
title_sort blocking-resistant communication through domain fronting
publisher Sciendo
series Proceedings on Privacy Enhancing Technologies
issn 2299-0984
publishDate 2015-06-01
description We describe “domain fronting,” a versatile censorship circumvention technique that hides the remote endpoint of a communication. Domain fronting works at the application layer, using HTTPS, to communicate with a forbidden host while appearing to communicate with some other host, permitted by the censor. The key idea is the use of different domain names at different layers of communication. One domain appears on the “outside” of an HTTPS request—in the DNS request and TLS Server Name Indication—while another domain appears on the “inside”—in the HTTP Host header, invisible to the censor under HTTPS encryption. A censor, unable to distinguish fronted and nonfronted traffic to a domain, must choose between allowing circumvention traffic and blocking the domain entirely, which results in expensive collateral damage. Domain fronting is easy to deploy and use and does not require special cooperation by network intermediaries. We identify a number of hard-to-block web services, such as content delivery networks, that support domain-fronted connections and are useful for censorship circumvention. Domain fronting, in various forms, is now a circumvention workhorse. We describe several months of deployment experience in the Tor, Lantern, and Psiphon circumvention systems, whose domain-fronting transports now connect thousands of users daily and transfer many terabytes per month.
topic censorship circumvention
url https://doi.org/10.1515/popets-2015-0009
work_keys_str_mv AT fifielddavid blockingresistantcommunicationthroughdomainfronting
AT lanchang blockingresistantcommunicationthroughdomainfronting
AT hynesrod blockingresistantcommunicationthroughdomainfronting
AT wegmannpercy blockingresistantcommunicationthroughdomainfronting
AT paxsonvern blockingresistantcommunicationthroughdomainfronting
_version_ 1717812897040564224