▲ | myshoemouth 9 days ago | ||||||||||||||||||||||||||||||||||||||||||||||
I'm curious. How does a state actor do actual DPI without pushing certs to end user devices? | |||||||||||||||||||||||||||||||||||||||||||||||
▲ | teraflop 9 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
The "inspection" part of DPI isn't limited to encrypted payloads. It's straightforward enough to look at application-level protocol headers and identify e.g. a Wireguard or OpenVPN or SSH connection, even if you can't decrypt the payload. That could be used as sufficient grounds to either block the traffic or punish the user. | |||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||
▲ | mrbluecoat 9 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
Network fingerprinting, like https://github.com/FoxIO-LLC/ja4 | |||||||||||||||||||||||||||||||||||||||||||||||
▲ | orthoxerox 8 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
Pushing certs to end user devices is simple. First you create your own national CA. Then you make all government services use TLS certificates signed by the national CA. Then you make phone vendors preinstall the root cert of the national CA into the trust store if they want to sell them in your country. Then you make your ISPs buy and install MITM appliances. | |||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||
▲ | trod1234 9 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
There are a couple of ways. The main one is called an Eclipse Attack in cyber circles, and it can be done at any entity operating at the ASN layer so long as they can position themselves to relay your traffic. The adversary can invisibly (to victim PoV) modify traffic if they have a cooperating rootPKI cert (anywhere in the ecosystem) that isn't the originating content provider, so long as they recognize the network signature (connection handshake); solely by terminating encryption early. Without a cert, you can still listen in with traffic analysis, the fetched traffic that's already been encrypted with their key (bit for bit), as known plaintext the math quickly reduces. SNI and a few other artifacts referencing the resources/sites are not part of the encrypted payload. Its more commonly known in a crypto context, but that kind of attack can happen anywhere. It even works against TOR. One of the first instances (afaik) was disclosed by Princeton researches in 2015, under the Raptor paper. | |||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||
▲ | oasisbob 9 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
DPI refers to a broad class of products which attempt to find signals and categorize traffic according to a ruleset, either to block it or throttle the speeds, etc. While access to plaintext is useful, it's not required for other rules which are eg looking at the timing and frequency of packets. | |||||||||||||||||||||||||||||||||||||||||||||||
▲ | dev_l1x_be 9 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||||||||
Because you are leaking information left and right with TCP / DNS and all these basic protocols that powering the internet today. When these were designed people were happy that it worked at all and nobody really tought that it should be state actor proof. Except maybe DJB. https://www.curvecp.org/ | |||||||||||||||||||||||||||||||||||||||||||||||
▲ | unethical_ban 9 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||||||||
Patterns of data transmission (network behavioral analysis, I just made that term up), analyzing IP and ports, inspecting SSL handshakes for destination site. In short, metadata. |