dslreports logo
Search similar:


uniqs
2144

Name Game
Premium Member
join:2002-07-07
Grand Rapids, MI
kudos:7

Name Game

Premium Member

How China and Others Are Altering Web Traffic

Thursday, March 24, 2011

"Invisible" servers let governments quietly intercept and modify their citizens' online communications.
By Robert Lemos
Google leveled new charges against China this week, claiming that the country has interfered with some citizens' access to the Internet giant's Gmail service, disguising the interference as technical glitches.

Security experts say that China is most likely using invisible intermediary servers, or "transparent proxies," to intercept and relay network messages while rapidly modifying the contents of those communications. This makes it possible to block e-mail messages while making it appear as if Gmail is malfunctioning.

Companies regularly use transparent proxies to filter employees' Web access. Some ISPs have also used the technique to replace regular Web advertisements with those of their own. But it's becoming increasingly common for governments to use transparent proxies to censor and track dissidents and protestors. All traffic from a certain network is forced through the proxy, allowing communications to be monitored and modified on the fly. Intercepting and relaying traffic is known as a "man in the middle" attack.

Read more here..
»www.technologyreview.com ··· id=37074

See aslo this link which was moved from the Security forum to the AT&T Forum

»Strange traceroute...to Facebook via China?
OZO
Premium Member
join:2003-01-17
kudos:2

OZO

Premium Member

That's why we have HTTPS. Use Gmail via SSL, if you don't want someone else to peruse or alter your mails.

Blackbird
Built for Speed
Premium Member
join:2005-01-14
Fort Wayne, IN
kudos:4
·Frontier Communi..

1 edit

Blackbird to Name Game

Premium Member

to Name Game
Your thread that was moved to the AT&T forum, combined with this present revelation, raises some very uncomfortable "security" issues... at least, insofar as traffic-tampering and censorship are concerned. Are we to understand that occasionally ordinary American or Western Internet traffic may be subjected (without notice and "invisibly") to official Chinese censorship and content tampering by being rerouted to and thru Chinese servers?

If so, that seems to me to raise some rather major international implications about the design, interface, standards, and use of the Internet by various nations... implications that one would certainly hope are being confronted to the Chinese by Western authorities. That is, if they're found to be "messing" with non-Chinese traffic for whatever reason, perhaps they and their servers ought to be "unplugged" from the worldwide web...

edit: clarity 1st paragraph

Snowy
Premium Member
join:2003-04-05
Kailua, HI
kudos:6
·Hawaiian Telcom
·Clearwire Wireless
·Time Warner Cable

Snowy

Premium Member

said by Blackbird:

... If so, that seems to me to raise some rather major international implications about the design, interface, standards, and use of the Internet by various nations...

DNS not being my strong suit, theoretically I assume that traffic can be coerced into traveling a general predestined route by purposefully creating congestion at key points, forcing a not expected route of travel?
Shorter question: Can DNS be manipulated into country specific routing on a large or reasonably accurate scale e.g., forcing traffic from US to Europe to travel through China?

Name Game
Premium Member
join:2002-07-07
Grand Rapids, MI
kudos:7

Name Game

Premium Member

During a window that lasted 30 minutes to an hour Tuesday morning, all unencrypted traffic passing between AT&T customers and Facebook might have been open to similar monitoring. Lyon said he has no evidence any data was in fact snarfed, but he said the potential for that is certainly there because the hardware belonged to China Telecom, which in turn is owned by the Chinese government.

“This kind of thing happens all the time, sometimes on accident and sometimes on purpose,” he told The Reg. “I think people should talk about it at the very least.”

It’s not the first time traffic has been diverted through Chinese networks under mysterious circumstances. In March and April of last year, traffic to as much as 15 percent of the world’s internet destinations was briefly diverted through China. Networks used by Dell, Apple, CNN, and Starbucks were all affected. At least one of those incidents was the result of erroneous BGP, or Border Gateway Protocol, routes that were quickly corrected.

Unlike those incidents, Tuesday’s diversion appeared to affect only traffic traveling between AT&T users and Facebook. Lyon discovered the anomaly by telnetting into AT&T’s IP Services Route Monitor (telnet://route-server.ip.att.net) and typing various commands, such as “show ip bgp 69.171.224.20/20.”

Traceroute commands executed during the brief window Tuesday morning on machines connected to AT&T’s network also verified that Facebook-bound traffic was traveling over AS4134, the Autonomous System belonging to China Telecom, Lyon said.
»www.hackerrepublic.it/wo ··· ese-isp/

Safe Browsing
Diagnostic page for AS4134 (China Telecom backbone)

What happened when Google visited sites hosted on this network?
Of the 110852 site(s) we tested on this network over the past 90 days, 5979 site(s), including, for example, pcpop.com/, jtjy.com/, sosoyy.com/, served content that resulted in malicious software being downloaded and installed without user consent.

The last time Google tested a site on this network was on 2011-03-27, and the last time suspicious content was found was on 2011-03-27.

Has this network hosted sites acting as intermediaries for further malware distribution?
Over the past 90 days, we found 456 site(s) on this network, including, for example, ukad.com/, 772268.com/, 888758.com/, that appeared to function as intermediaries for the infection of 4495 other site(s) including, for example, j8wap.info/, lmav.info/, wapj8.info/.

Has this network hosted sites that have distributed malware?
Yes, this network has hosted sites that have distributed malicious software in the past 90 days. We found 1610 site(s), including, for example, 77276.com/, htmi2.com/, registear.info/, that infected 12906 other site(s), including, for example, 360doc.com/, fxhj.net/, ches.org.cn/.

»www.google.com/safebrows ··· =AS:4134

The brief routing error was highlighted by security researcher Barrett Lyon, who identified that AT&T customers, when requesting data from Facebook, were first sending their requests via China, then Korea, before completing the request on Facebook’s servers.

Despite a momentary routing error, there was no evidence to suggest any sensitive information was compromised, but Lyon did highlight that Chinese authorities were likely to be monitoring unencrypted traffic being passed via servers on China Telecom networks, which are owned by the Chinese government.

Routing looked only to be affecting requests from AT&T users, with Lyon discovering the error by accessing AT&T’s IP Services Route Monitor. Using Telnet, he was able to perform a series of commands to identify how traffic was being routed from the provider.

Facebook issued a statement to The Register, confirming a single carrier was suffering from routing problems:

We are investigating a situation today that resulted in a small amount of a single carrier’s traffic to Facebook being misdirected. We are working with the carrier to determine the cause of this error.

Our initial checks of the latency of the requests indicate that no traffic passed through China.

If you are on AT&T and are worried about how you Facebook data is handled, Facebook has recently introduced a HTTPS-only option on it website which will ensure all Facebook data is securely encrypted, making sure third-parties aren’t easily able to monitor sensitive internet traffic.

To enable the option, log into Facebook and select Account Settings -> Account Security and then check the box that says “Browse Facebook on a secure connection (https) whenever possible.”

»thenextweb.com/facebook/ ··· a-china/

“Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to ChinaNet then via ChinaNet to SK Broadband in South Korea, then to Facebook,” Lyon explained in a blog post.

“This means that anything you looked at via Facebook without encryption was exposed to anyone operating ChinaNet, which has a very suspect Modus operandi,” he added.

Meanwhile, several network security experts believe that it was more than just a mistake that the traffic was routed through China. Rodney Joffe, senior technologist at DNS (Domain Name System) registry Neustar, described the incident as 'route hijacking'.

»www.itproportal.com/2011 ··· concern/
Name Game

Name Game

Premium Member

»www.chinatelecomusa.com/ ··· ndexid=0

China Telecom Americas Internet connectivity has become a crucial network component for your organization’s overall success. You need a reliable, fully redundant, and fault tolerant Internet solution that will meet the communication requirements for your mission-critical network applications. China Telecom Americas has engineered a reliable and robust Internet solution that doesn’t just meet your communication requirements, it exceeds them. When you need high-capacity bandwidth and uncompromising IP connectivity to China and Asia, ChinaDirect TM IP Access takes you there through the fastest, most direct route: CHINANET TM , our primary IP network. CHINANET, the world’s second-largest Internet network reaches more subscribers in Asia than any other IP network and provides direct connections to all major U.S. ISPs, enabling reliable global reach. CHINANET has more than 100 million Internet subscribers, and growing. As your IP needs grow, our high capacity, fully managed network lets you easily add bandwidth to quickly and cost-effectively increase performance. Our teams in the United States and China provide fully managed services that are monitored around the clock.ChinaDirect IP Access provides you with a cost-effective, high-quality, and fully scalable dedicated connection to the Internet. ChinaDirect IP Access offers a wide range of port speeds, features, and billing options to suit your needs. In addition, China Telecom Americas is proud to provide Service Level Agreements (SLAs) between the Americas and China on IP Access services. Also, ChinaDirect IP Access is proactively monitored and managed by dual Network Operation Centers in both the United States and China.

»www.chinatelecomusa.com/ ··· ndexid=0

Map of Coverage

»www.chinatelecomusa.com/ ··· arge.gif

Coverage in the US
»www.chinatelecomusa.com/ ··· ndexid=0

»www.corp.att.com/globaln ··· map.html

Back in 2000..

In a historical step designed to further open up the nation's tightly-controlled telecommunications market to foreign competition, China has given the go-ahead for AT&T, the largest US telecom operator, to set up a US$25 million broadband Internet joint venture in Shanghai.

The start-up will provide a broadband Internet service in Pudong for multinationals like Shanghai General Motors and CitiBank Group, linking the companies' local networks with their headquarters in the US.

»english.peopledaily.com. ··· 043.html
Name Game

Name Game

Premium Member

I was very interested in what Lyons had to say since I too was doing traceroutes and other searches then based upon member ff1324 posting and came to the same conclusions.
»Strange traceroute...to Facebook via China?

Link Logger
MVM
join:2001-03-29
Calgary, AB
kudos:3
·TELUS

Link Logger to Name Game

MVM

to Name Game
The internet was never designed to be secure, its main design objective was redundancy (ie multiple paths, actually just getting connectivity was the first objective). You all know the question I asked in 1977 when the internet was still ARPANET and the answer I got made it pretty clear that security was an issue outside the problem domain at the time. The underlying technology of the internet is rooted in the 70's and again the idea was just to get it functionally and security really wasn't a key objective.

Blackbird I love your comment that the thread is being moved to the AT&T forum, as the Chinese aren't doing anything really new or frankly unexpected, but the scale at which they are doing it is amazing. Sometimes I see China as a boiling pot of water and the government is the lid trying to keep everything in and as the pressure grows this is going to get really interesting. How the Chinese people are using the internet and other technologies is very interesting and creative, but the government is also using the same technology for their agenda to and hence the growing internal conflict.

The question that everyone should be thinking about is what happens after populations revolt, who is taking over and how and what is their agenda as I've mentioned before there are some pretty evil groups who are far more advanced at using the internet and they are positioning themselves to take full advantage of the impending situations (and in some cases actively participating in driving change). It used to be that you could keep up day to day, but with change occurring at an ever increasing speed you can no longer just let change happen, you have to be anticipating and planning for change and yes even participating in creating change in order to have changes that you want. For example I'm not sure we are going to like the new middle east anymore then we liked the old one (likely we are going to like it far less), but then again I don't think we have done much to help our cause in the middle east either.

Blake
You can create your future tomorrow with what you do today.

gorrillamcd
Hangin' Out
join:2010-04-01
mexico

gorrillamcd to Snowy

Member

to Snowy
While DNS poisoning can be used to actively re-direct requests to a specific domain, this is more likely dealing with BGP, which is the routing protocol used on the internet to route large networks. I admit I'm not the best when it comes to low-level knowledge like this, but Ars Technica had a good article on this same situation a while back that explains it pretty well: »arstechnica.com/security ··· utes.ars