Academics break the Great Firewall of China

By Tom Espiner, ZDNet UK
Tuesday, July 04, 2006 11:54 AM

Computer experts from the University of Cambridge claim not only to have breached the Great Firewall of China, but have found a way to use the firewall to launch denial-of-service attacks against specific Internet Protocol addresses in the country.

The firewall, which uses routers supplied by Cisco, works in part by inspecting Web traffic for certain keywords that the Chinese government wishes to censor, including political ideologies and groups it finds unacceptable.

The Cambridge research group tested the firewall by firing data packets containing the word "Falun" at it, a reference to the Falun Gong religious group, which is banned in China.

The researchers found that it was possible to circumvent the Chinese intrusion detection systems by ignoring the forged transmission control protocol resets injected by the Chinese routers, which would normally force the endpoints to abandon the connection.

"The machines in China allow data packets in and out, but send a burst of resets to shut connections if they spot particular keywords," explained Richard Clayton of the University of Cambridge computer laboratory. "If you drop all the reset packets at both ends of the connection, which is relatively trivial to do, the Web page is transferred just fine."

Clayton added that this means the Chinese firewall can be used to launch denial-of-service attacks against specific IP addresses within China, including those of the Chinese government itself.

The IDS uses a stateless server, which examines each data packet both going in and out of the firewall individually, unrelated to any previous request. By forging the source address of a packet containing a "sensitive" keyword, people could trigger the firewall to block access between source and destination addresses for up to an hour at a time.

If an attacker had identified the machines used by regional government offices, they could block access to Windows Update, or prevent Chinese embassies abroad from accessing specific Chinese Web content.

"Due to the design of the firewall, a single packet addressed from a high party official could block their Web access," said Clayton.

Even though this technique would block communication between only two particular points on the Internet, the researchers calculated that a lone attacker using a single dial-up connection could still generate a "reasonably effective" denial-of-service attack. If an attacker generated 100 triggering packets per second, and each packet caused 20 minutes of disruption, 120,000 pairs of endpoints could be prevented from communicating at any one time.

Clayton, speaking at the Sixth Workshop on Privacy Enhancing Technologies in Cambridge last week, said that the researchers had reported their findings to the Chinese Computer Emergency Response Team.


WORTHWHILE?

0

0 votes
Blog

Talkback 10 comments

thank you big brothers
Posted by popo on Wednesday, July 05 2006 04:45 PM

Cambridge boffins - why report the flaw back? are they getting back-handers from the chinese government?
Posted by anonymous on Wednesday, July 05 2006 08:33 PM

What's the point reporting this back to chinese officials and supporting censorship? I thought we should fight for the freedom of information..
Posted by maxim reality on Wednesday, July 05 2006 09:26 PM

gee...thanks for helping the chinese.
Posted by disbelief on Thursday, July 06 2006 10:34 PM

better than helping the usa and their fascist war against everyone but themselves!
Posted by believe on Friday, July 07 2006 05:07 AM

The news was so good, until that last paragraph. Still, we have TOR, elgooG, Your-Freedom.net, and countless free proxies.
Posted by Yuan on Tuesday, July 18 2006 06:39 AM

Don't just report or say it, DO IT!
Posted by anonymous on Saturday, August 05 2006 07:50 PM

Wonder if Dr. Clayton and Cisco think for a second about the people they've put into Chinese prisons?
Posted by Thomas on Thursday, October 26 2006 12:42 AM

So if the industry leader Cisco cant implement a proper "firewall" then see the rest of the world's internet security!!! be careful people!!
Posted by Anand on Wednesday, November 01 2006 11:56 AM

I'm from Spain and my isp blocks p2p (bittorent for example) and tor =( but now i use SmartHide free version. You can get it from www.smarthide.com
Posted by Hose Moraira on Sunday, September 09 2007 05:56 PM


Tech Jobs Now!

Search for your ideal tech job:

Nudge paragraphs in a Word document

Microsoft Office Suite

Sometimes you need just a little more space before a paragraph. You have to update the style to reflect a little more space before or after each paragraph.


Read more �



 
Protect completely, manage easily
The Symantec Protection Suite combines award-winning endpoint security, messaging security, and backup and recovery for multi-layer protection.
Secure your business against today’s complex malware, data loss and spam threats
» Find out how


Virtualize your way to cost savings
Build an infrastructure that is flexible, scalable, and economical, as you strive to become a truly agile business.

Red Hat Outlines Its Virtualization Strategy and Roadmap for 2009
» Watch the video



Free the untapped potential of your IT infrastructure
Reduce bottlenecks to drive the efficiency and productivity of Business IT.
» Ultimate virtualization blade
» Scalable SAN solution
» Accelerate service delivery

Outsourced or not, demand must be managed

Blog thumbnail

We all want to improve the economics of our cost centers, whether we insource or outsource them.

Most of these cost centers follow a price times quantity model ("P x..... by Michael Rehkopf

Read more �

Tags

  1. attack
  2. authentication and encryption
  3. blog
  4. data security
  5. e - mail
  6. hacking
  7. internet
  8. malware
  9. microsoft corp.
  10. network
  11. network security
  12. pc security
  13. researcher
  14. security
  15. security management
  16. software
  17. spam and phishing
  18. symantec corp.
  19. viruses and worms
  20. web