SlideShare a Scribd company logo
Meek and Domain Fronting
Mutually assured destruction for Internet censorship
Overview
• Internet Censorship Overview and Tools
• SNI and Domain Fronting
• Meek
• Meek and Psiphon
• Meek and Tor
• Meek and Others
Meek and domain fronting public
How Do I Block
• DNS
• IP blacklist
• URL blacklist
• Routing
• DPI
• Keyword (China) RST
• Protocol Fingerprinting (China, JP/BroIDS)
• Tor TLS ciphersuites
Meek and domain fronting public
Censorship Arms Race
Censor
Block URL
Block Proxy sites
Block Proxy protocol
Fingerprint OSSH
protocol
…
Block the Internet
Evasion
VPN/Proxy
Hidden Proxy
Obfuscate Proxy
(OSSH)
ScrambleSuit
…
Meek Protocol
• Protection against Balls Deep Packet Inspection(BDPI)™
• Uses SNI and CDN
• “Domain Fronting”
• To block it, you must block the CDN
• Your move, motherfucker!
Server Name Extension (SNI)
• Virtual hosting for SSL
• One web server hosts multiple certificates
• Used by CDN’s all the time
https://www.google.com
https://www.antitree.com
GET / HTTP/1.1
Domain Fronting
TLS connection with
client
TLS connection with
www.google.com
Ciphers and
Extensions
decided upon
Handshake Established
Client Sends
“server_name” extension
value of meek-
server.antitree.com
Receive request, send to
server.antitree.com
Server reads this value
and looks up if it has a
record for meek-
server.antitree.com
Response from server
returned
POST /
<PROXIED TRAFFIC>
Meek
• Uses Domain Fronting to hide the request to the final endpoint
• Adversaries see that a connection is made to
https://www.google.com
• Subsequent connections are encrypted
• For all intensive purposes, appears as a request to google.com,
or cloudflare.net, or another CDN
• Blocking of CDN’s would result in blocking of most of the top
100 sites
Meek Psiphon
• Psiphon is a censorship circumvention tool (one hop proxy)
• Supports Meek
• Meek service hosted on Psiphon servers
• Clients receive information about the servers configuration
• Use Google and Cloudflare to proxy connections
• So far unblockable
Meek Tor
• Tor uses this as a transport for the Tor protocol
• Run on unlisted Bridge Nodes
• Instead of just a HTTP request (Psiphon, Lantern, Fog) the
entire protocol is sent over it
• Uses a web reflector to forward requests from the fronted
domain to a Tor bridge
Meek Tor
Tor Meek-client
Meek
Browser
Client
https://www.google.com
https://meek-
server.appspot.com
Meek.bamsoftware.com:7002Meek-server
Tor Bridge
Node
Meek Tor Normal Tor
Meek Tor
• Problem with HTTP keeping the tunnel alive
• Use a polling method so the server sends a request
• Server checks whether or not the client has data it wants to
deliver
• Done using POST requests over the tunnel
• If there is no new data to send, an empty packet is sent to keep
the tunnel open
Attacks/Defense from DPI
• Polling period
• This period is relatively random but over time can be profiled
• Intervals increase geometrically
• Payload Length
• Normally this is dynamic but has a max size that can be profiled over time
• TLS extensions
• If you don’t use the browser plugin, it’s easy to fingerprint based on TLS
extensions
• Drop behavior
• When a packet is RST for a web user, they just refresh. For Meek this kills the
whole tunnel.
Success
• Very successful right now
• Only recently became
popular
• Other tools like
ScrambleSuite, obfs4,
and BananaPhone on
deck for when this gets
exploited
Review
• Domain Fronting = SNI
• Meek: Uses domain fronting to tunnel connections and evade
censorship
• ALL of the anti-censorship tools at this point are using it
• You should host a Meek bridge

More Related Content

PPSX
Teorías del cuello de botella
DOCX
Recuperación académica 2
PDF
Albert Bandura.pdf
PPTX
Sesión 3 - Análisis Conductual Aplicado
PPTX
Fundamentación psicológica del aprendizaje
PPTX
Origen y evolucion de la psicologia social conmunitaria
PDF
doku.pub_ignacio-martin-baro-sistema-grupo-y-poder-psicologia-social-desde-ce...
PPTX
Unidad 2. Condicionamiento Clásico
Teorías del cuello de botella
Recuperación académica 2
Albert Bandura.pdf
Sesión 3 - Análisis Conductual Aplicado
Fundamentación psicológica del aprendizaje
Origen y evolucion de la psicologia social conmunitaria
doku.pub_ignacio-martin-baro-sistema-grupo-y-poder-psicologia-social-desde-ce...
Unidad 2. Condicionamiento Clásico

Viewers also liked (20)

PPT
Hacking Tor ( How does Tor work ?)
PDF
No Easy Breach DerbyCon 2016
PDF
Just Mouse Jack Init
PPTX
Docker Security
PPTX
Reinventing anon email
PPT
Cleft sentences
ODP
State of wifi_2016
ODP
Introduction to ethereum_public
PPTX
0x20 hack
PPTX
28c3 in 15
PPTX
How [not] to throw a b sides
PPTX
Image based automation
PPTX
Nsa and vpn
PPTX
Salander v bond 2600
PPTX
Laverna vs etherpad
PPTX
Syntax
PPTX
Chapter 2 syntax
PDF
Android Hacking
PPTX
What is Syntax?
Hacking Tor ( How does Tor work ?)
No Easy Breach DerbyCon 2016
Just Mouse Jack Init
Docker Security
Reinventing anon email
Cleft sentences
State of wifi_2016
Introduction to ethereum_public
0x20 hack
28c3 in 15
How [not] to throw a b sides
Image based automation
Nsa and vpn
Salander v bond 2600
Laverna vs etherpad
Syntax
Chapter 2 syntax
Android Hacking
What is Syntax?
Ad

Similar to Meek and domain fronting public (20)

PPTX
Anonymous Security Scanning and Browsing
PDF
Network
PPTX
Network tunneling techniques
PDF
Setting Up .Onion Addresses for your Enterprise, v3.5
PDF
NZNOG 2020: DOH
PPTX
Web technologies-course 01.pptx
PPTX
Understanding Port Scanning: A Critical Tool in Web Security
PPTX
Port Scanning: Unveiling the Hidden Doors of a Website
PDF
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
PPT
Proxy servers
PPTX
Application layer protocols
PPTX
501 ch 3 network technologies tools
PDF
Http2 in practice
PDF
D1-3-Signaling
PPTX
Network latency - measurement and improvement
PPTX
Part 6 : Internet applications
PDF
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
PPTX
Understanding DNS Security
PPTX
Vpn(virtual private network)
Anonymous Security Scanning and Browsing
Network
Network tunneling techniques
Setting Up .Onion Addresses for your Enterprise, v3.5
NZNOG 2020: DOH
Web technologies-course 01.pptx
Understanding Port Scanning: A Critical Tool in Web Security
Port Scanning: Unveiling the Hidden Doors of a Website
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Proxy servers
Application layer protocols
501 ch 3 network technologies tools
Http2 in practice
D1-3-Signaling
Network latency - measurement and improvement
Part 6 : Internet applications
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
Understanding DNS Security
Vpn(virtual private network)
Ad

More from antitree (12)

ODP
Hardening ssh configurations
PPTX
Salander v bond b sides detroit final v3
PPTX
Pentesting embedded
PPTX
PPTX
Corporate Intelligence: Bridging the security and intelligence community
PPTX
Lock picking barcamp
PPTX
Lock picking 2600
PPTX
Anti tree firesheep
PPTX
Hackerspaces
PDF
Intro to IPv6 by Ben Woodruff
PPTX
Anonymity Systems: Tor
PPTX
Dll hijacking
Hardening ssh configurations
Salander v bond b sides detroit final v3
Pentesting embedded
Corporate Intelligence: Bridging the security and intelligence community
Lock picking barcamp
Lock picking 2600
Anti tree firesheep
Hackerspaces
Intro to IPv6 by Ben Woodruff
Anonymity Systems: Tor
Dll hijacking

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Meek and domain fronting public

  • 1. Meek and Domain Fronting Mutually assured destruction for Internet censorship
  • 2. Overview • Internet Censorship Overview and Tools • SNI and Domain Fronting • Meek • Meek and Psiphon • Meek and Tor • Meek and Others
  • 4. How Do I Block • DNS • IP blacklist • URL blacklist • Routing • DPI • Keyword (China) RST • Protocol Fingerprinting (China, JP/BroIDS) • Tor TLS ciphersuites
  • 6. Censorship Arms Race Censor Block URL Block Proxy sites Block Proxy protocol Fingerprint OSSH protocol … Block the Internet Evasion VPN/Proxy Hidden Proxy Obfuscate Proxy (OSSH) ScrambleSuit …
  • 7. Meek Protocol • Protection against Balls Deep Packet Inspection(BDPI)™ • Uses SNI and CDN • “Domain Fronting” • To block it, you must block the CDN • Your move, motherfucker!
  • 8. Server Name Extension (SNI) • Virtual hosting for SSL • One web server hosts multiple certificates • Used by CDN’s all the time https://www.google.com https://www.antitree.com GET / HTTP/1.1
  • 9. Domain Fronting TLS connection with client TLS connection with www.google.com Ciphers and Extensions decided upon Handshake Established Client Sends “server_name” extension value of meek- server.antitree.com Receive request, send to server.antitree.com Server reads this value and looks up if it has a record for meek- server.antitree.com Response from server returned POST / <PROXIED TRAFFIC>
  • 10. Meek • Uses Domain Fronting to hide the request to the final endpoint • Adversaries see that a connection is made to https://www.google.com • Subsequent connections are encrypted • For all intensive purposes, appears as a request to google.com, or cloudflare.net, or another CDN • Blocking of CDN’s would result in blocking of most of the top 100 sites
  • 11. Meek Psiphon • Psiphon is a censorship circumvention tool (one hop proxy) • Supports Meek • Meek service hosted on Psiphon servers • Clients receive information about the servers configuration • Use Google and Cloudflare to proxy connections • So far unblockable
  • 12. Meek Tor • Tor uses this as a transport for the Tor protocol • Run on unlisted Bridge Nodes • Instead of just a HTTP request (Psiphon, Lantern, Fog) the entire protocol is sent over it • Uses a web reflector to forward requests from the fronted domain to a Tor bridge
  • 15. Meek Tor • Problem with HTTP keeping the tunnel alive • Use a polling method so the server sends a request • Server checks whether or not the client has data it wants to deliver • Done using POST requests over the tunnel • If there is no new data to send, an empty packet is sent to keep the tunnel open
  • 16. Attacks/Defense from DPI • Polling period • This period is relatively random but over time can be profiled • Intervals increase geometrically • Payload Length • Normally this is dynamic but has a max size that can be profiled over time • TLS extensions • If you don’t use the browser plugin, it’s easy to fingerprint based on TLS extensions • Drop behavior • When a packet is RST for a web user, they just refresh. For Meek this kills the whole tunnel.
  • 17. Success • Very successful right now • Only recently became popular • Other tools like ScrambleSuite, obfs4, and BananaPhone on deck for when this gets exploited
  • 18. Review • Domain Fronting = SNI • Meek: Uses domain fronting to tunnel connections and evade censorship • ALL of the anti-censorship tools at this point are using it • You should host a Meek bridge