-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[English translation] A route propagation–based access control method for large-scale networks (Journal on Communications 2003) #434
Comments
The paper is notable, in part, because of how it has been cited as a reference for the implementation of IP address blocking in China. It is cited in "Splinternet Behind the Great Firewall of China" (2012):
It is also mentioned in "Finding contributors to Great Firewall by their papers" ("通过分析论文挖掘防火长城(GFW)的技术人员") from 2013, an attempt to map out the network of researchers contributing to the Great Firewall, starting from 方滨兴 (Fang Binxing):
The paper (along with #435) was covered in the 2009 blog post 深入理解GFW:路由扩散技术 (Deeper Understanding of GFW: Route Propagation Techniques):
|
Studies contemporary to this paper (2002) find strong evidence of exactly this style of blackhole routing being used to block IP addresses in China. They both identify the IP address of a blackhole server: 202.97.33.2. The Project C (r. 1.0) report by Nart Villeneuve in 2002 presents evidence that is consistent with a routing-based blocking technique. It discovers a blackhole IP address 202.97.33.2. The address is responsive to port scans and looks like a Cisco device. (The use of Cisco equipment in China at the time is further supported by a citation, in the paper of this thread, of the book Advanced IP Routing in Cisco Networks.)
"The Great Firewall Revealed", also from 2002, finds the same blackhole IP address.
|
Let's take a closer look at the authors. 刘刚 (Liu Gang) (b. 1975), according to the bio in the paper itself, was a PhD student at the Harbin Institute of Technology at the time the paper was written.
云晓春 (Yun Xiaochun) (b. 1971) is a senior researcher. To judge by the email address on his homepage, he is now affiliated with Zhongguancun Laboratory. In 2016, as Deputy Director and Chief Engineer of CNCERT/CC, he was recognized as an outstanding talent by the Cyberspace Administration of China:
He continues to do censorship-relevant research even to the present day, as evidenced by titles such as "Encrypted TLS Traffic Classification on Cloud Platforms" in his CV.
方滨兴 (Fang Binxing) (b. 1960) hardly needs an introduction. Known as the "Father of the Great Firewall", he was heavily involved in the early stages of Internet censorship in China and continues to be instrumental. He has many academic and industry affiliations, and even a research foundation under his name. Fang is a founder and Chief Scientist of Geedge Networks, covered in #369.
胡铭曾 (Hu Mingzeng) (b. 1935) is by far the most senior researcher on the paper. In 2003 he would have been 67 or 68 years old. Hu was a teacher and mentor to Fang Binxing at the Harbin Institute of Technology. In 2018, Fang wrote an article in which he says it was Hu that convinced him to return to HIT to be a teacher after getting a degree.
|
This reading group thread is a bit special. It is a translation of an old research paper from Chinese to English. Like #251, #275, and #282, this paper is written from the point of view of implementing censorship, rather than defeating it. The difference is that those other papers were originally published in English, while this one was published in Chinese. This paper is historically significant, as we will discuss, and it has not been available to read in English before now.
A route propagation–based access control method for large-scale networks
刘刚 (Liu Gang), 云晓春 (Yun Xiaochun), 方滨兴 (Fang Binxing), 胡铭曾 (Hu Mingzeng)
Archived journal homepage
Original Chinese PDF ("一种基于路由扩散的大规模网络控管方法")
Online English HTML
English PDF
This is an early paper on the use of null routing, or blackhole routing, to enforce restrictions on access to IP addresses. To block an IP address, you could, for example, configure a firewall to drop packets that have a certain destination address. But a firewall is too slow, the authors say, for large-scale networks (tens or hundreds of Gbit/s). Instead, this paper says you should use the ordinary function of IP routers. To block an IP address, you override its normal routing and configure a special route that leads to a "blackhole server". Not only is this style of blocking fast, because routers are already optimized for high performance, you can use ordinary routing protocols such as BGP and OSPF as a management tool, configuring a route in one place and having it automatically propagated out to egress/ingress routers. The paper itself, as well as other contemporary reports, say that this technique was in use in China as early as 2002.
Figure 1: Network architecture for route propagation–based network access control in an ISP
The core of the technique is outlined in Section 2.1 and Figure 1. The goal is to get special overriding routes installed at "egress/ingress routers" (or) at the border of the network. You start by attaching a new "control network" to the network you want to control. The control network contains a "sample server" (ss), which is where the network administrator sits and configures which IP addresses are to be blocked. The sample server sends commands to a "sample router" (sr), which is in contact with the other routers in the network over dynamic routing protocols. The sample router sets a static route for each IP address to be blocked, with a "next hop" that points to the IP address of a "blackhole server" (fs) adjacent to the sample router. From the sample router, the static routs are propagated outwards to the egress/ingress routers, passing through zero or more "propagation routers" (kr) on the way. The authors say that route propagation may use special dedicated lines, or may be over encrypted tunnels on public networks (virtual links).
A packet with a blocked destination IP address that reaches an egress/ingress router will be routed to the blackhole server. The blackhole server can simply ignore the packets it receives, or it may compile statistics, which can inform a future unblocking decision:
Compare the network setup to the similar setup of "Implementation of an IP access control technology" from 2001. The sample router sr is there called the "configuration router" R0. The roles of both the sample server ss and the blackhole server fs are played by the "configuration host" H0. Instead of the configuration host sending commands to the configuration router, instructing it to install static routes, the configuration host simply claims an IP address as its own, which causes a static route to propagate automatically. (In effect, using RIP as the command interface.)
The choice of which dynamic routing protocol to use depends on how the network is set up. When the sample router is itself part of every AS that needs to be controlled (Figure 2), the authors recommend using OSPF. When the ASes to be controlled are separate from the AS containing the sample router (Figure 3), use BGP.
The blackhole routing technique only works for packets that originate inside the controlled networks. Those packets will be turned around and directed to the blackhole server. Packets from a blocked external IP address will still be delivered correctly to addresses inside the controlled network. This is nevertheless effective, of course, as most protocols require packet delivery in both directions.
The declared goal of the IP address blocking mechanism is to "prevent the spread of all kinds of harmful information on the network" and "stop the spread of cyber attacks or viruses". The authors emphasize a need for high performance and not affecting ordinary traffic. The final paragraph says the system is already in use, with tens of thousands of blocking rules:
The text was updated successfully, but these errors were encountered: