[e-privacy] Psiphon - censorship circumvention

Andrea Glorioso andrea at digitalpolicy.it
Wed Jan 31 12:18:01 CET 2007


http://psiphon.civisec.org/faq1.html

What is psiphon?

psiphon  is a censorship  circumvention solution  that allows users to
access blocked  sites    in    countries  where  the    Internet    is
censored.  psiphon  turns a  regular  home  computer into a  personal,
encrypted server capable  of    retrieving and displaying   web  pages
anywhere

When will psiphon be released?

psiphon software   will   be released  on   December  1st, 2006,  with
subsequent  releases to be provided   as new features  are added  over
time.

Who will use psiphon?

psiphon  operates through   networks   of trust.  There  are   psiphon
providers who install and administer  a psiphon server (psiphonode) in
an  uncensored country, and psiphon users  (psiphonites) who login and
access the server from a country that censors the Internet.

What are psiphonodes, psiphonode administrators and psiphonites??

A psiphonode is a psiphon server that  is operated by an administrator
residing in an uncensored country (this is an integration of 'psiphon'
and 'Node'). The  psiphonode administrator is responsible for creating
and managing    user  accounts and running    the   psiphon server.  A
psiphonite is a psiphon    user, residing within a jurisdiction   that
blocks  arbitrary web sites, and  utilizes a psiphonode residing in an
uncensored jurisdiction.

How does psiphon work?

psiphon  acts  as a   "web    proxy" for  authenticated   psiphonites,
retrieving requested web   pages  and  displaying  them in   a  user's
browser.  psiphon uses a secure,  encrypted  connection to receive web
requests from the psiphonite to the psiphonode who then transports the
results back to  the psiphonite. There  is  no connection  between the
psiphonite and the requested website, as psiphon transparently proxies
the request through the psiphonode's  computer allowing the psiphonite
to browse blocked websites seamlessly.

How do psiphonites connect to psiphon?

psiphonites   go to their  psiphonodes'   machine using  a unique  web
address.  The first page  displayed is the  user login. The psiphonite
must login with  a valid username and password,  given to them by  the
psiphonode  administrator.  After authentication, the  psiphon  server
displays a  toolbar at the  top of the  page where  the psiphonite can
then enter  a website to   browse. When using psiphon,  the psiphonite
does not have to install any software or change any browser settings.

What do you mean, "the user does not have to install any software"?

After a  successful login to the  psiphon server, the user  enters the
website address they  would like to visit,  and psiphon takes  care of
the rest. With a regular  Internet browser, the psiphonite simply logs
in  and requests   and views   the website   entered  in the   psiphon
toolbar. No software is installed on the end user's machine.

How do users find out about psiphon and how is psiphon distributed?

Anyone who wants to  become a psiphon   provider and is located in  an
uncensored country will be able to  download the psiphon software from
the psiphon website.  After installation, the psiphonode administrator
sends a unique web address to people in need that he or she personally
knows and trusts in censored countries.

Even if the psiphon  website is blocked it  does not  affect psiphon's
distribution   model.   psiphon   is  completely   decentralized; each
psiphonode is independent of all others. The distribution of access to
personal psiphon servers is based on  social networks. Each psiphonode
administrator grows his/her private  network based on social relations
of trust.

What is a social network?

A social network is  a  structure of  nodes  - usually individuals  or
organizations - that   have ties between   them, such as  families  or
groups of friends or  colleagues. psiphon leverages social networks as
the  discovery  mechanism.   The  psiphonode  administrator  and   the
psiphonite(s)  have a trust relationship  and the web address is known
only  to these trusted people.  Each network of psiphonode/psiphonites
chooses how to grow the network. It can be small and extremely private
or  large and relatively   semi-private.  It depends on the   specific
context and needs of the psiphonites.

Can psiphon be blocked?

With publicly accessible   circumvention systems one  must assume that
the censors can also  discover and subsequently  block access to these
systems. The difference with psiphon - a personal system - is that the
web address is only sent  to a few, trusted,  people. In that way, the
censors  cannot  easily  find and  block the  location  of the psiphon
server.

What happens when the psiphon provider's computer is turned off?

When a psiphon provider's  computer is down  or off the psiphon  users
will no longer have access to psiphon. psiphon users will need to wait
until the psiphon provider's computer is back up and running again.

psiphon   will inform psiphon   providers if their network information
changes (e.g. after rebooting the  computer). When network information
changes, psiphon providers  will need  to  supply their psiphon  users
with the new psiphon web-address.

Note  for  advanced users: Future   releases  of psiphon will  contain
functionality  that  allows for optional  redundancy. In  the same way
that psiphon providers and users  extend their network based on social
relations of trust, psiphon providers  in a social network can arrange
peering agreements to act as a backup psiphon  server for each other's
users.

Is psiphon anonymous?

psiphon is  not an anonymous software  program. psiphon  users are not
anonymous from the   psiphon  provider. Although  traffic  between the
psiphon user and psiphon provider is  encrypted, psiphon providers can
potentially monitor everything that is done  by the psiphon users they
host.

Note: Do not use  psiphon  for anything you do   not want the  psiphon
provider to be able to see.

When psiphon   users visit websites through   the psiphon server their
identity and location is hidden from the web-site.

Note for advanced users: To maximize  protection against the discovery
of the psiphon  user's true IP  address, all scripting languages, such
as JavaScript and ActiveX, should be turned off in the user's browser.

Can   a psiphon user  be   monitored by their  government or  Internet
Service Provider (ISP)?

Yes, your government and/or ISP can always monitor which web sites you
visit.

When you use psiphon, your government and/or ISP can only see that you
connected to another computer, not  the sites you visit. psiphon makes
it difficult for anyone to determine that you are using psiphon

Am I safe using psiphon?

psiphon encryption  provides    strong protection against   electronic
eavesdropping. However, there is a known attack that attempts to trick
users into  accepting  a  forged certificate  (see  'Man-in-the-middle
attack' below). If psiphonites follow instructions provided, regarding
certificate fingerprint validation, this attack can be averted.

Secondly, using an encrypted connection to  a home computer in another
country may indicate to  a government that a censored-bypassing system
is being used.

Note: Bypassing censorship may  violate law. Serious thought should be
given to the risks involved and potential consequences.

What languages will psiphon be in?

Having multi-lingual interfaces     for psiphon is a   priority.   The
intention is  for  psiphon to be available   in as  many  languages as
possible. More information  will   be  provided closer  to   psiphon's
release date.

What operating systems will psiphon work on?

Windows, Linux (Mac conversion still underway)

How much does psiphon cost?

psiphon is free.

Is psiphon open source?

Yes. psiphon will be released under GPL open source license.

Can I access my email with psiphon?

psiphon is designed to provide safe,  secure web browsing for users in
censored countries. Most webmail can be accessed through psiphon.

Can I use instant messenger/chat, VOIP, Skype with psiphon?

No. psiphon is intended for  Internet website browsing only. But, most
web-based tools and services are available through psiphon.

Can I edit my blog with psiphon?

psiphon is intended for Internet website browsing only. Most Web-based
tool and services are available through psiphon. Therefore psiphon can
be used to edit most blogs.

When does beta testing begin?

Beta testing to the public will begin in the summer of 2006.

For advanced users:

Can my use of psiphon be detected?

From a technical perspective  traffic  between the psiphonode  and the
psiphonite is identical to  normal HTTPS (encrypted) traffic. Although
many sites only use HTTPS during the login process many sites, such as
email  providers and banking services, use  HTTPS for extended periods
of time,   as does psiphon.   The differences  are  that psiphon  uses
self-signed certificates and  connections  to  home computers,  rather
than signed certificates     and domain names.  However,   unless  the
attacker has the  private psiphon URL  it cannot be  easily determined
that psiphon is being used.

The   key   to detecting  psiphon  is   infiltration   of  the psiphon
administrator's social network.

Is psiphon susceptible to a Man-In-The-Middle-Attack (MITM)?

While   a  MITM attack  can  be  attempted against  any specific HTTPS
connection, manual key  fingerprint identification is integral  to the
proper use of  psiphon. Anytime a psiphon URL   is sent to a  user the
certificate fingerprint is also included.  The psiphon user only needs
to verify the fingerprint one time.

The key  to a MITM attack  is to trick the user  into accepting a fake
certificate. If the user properly verifies the certificate fingerprint
on the first connection to psiphon the MITM attack can be defended.

What options are available for advanced users (customization)?

A psiphonode administrator will be  able to customize the port  number
that the server runs  on as well as  the  content that appears  at the
"index" page. An HTTPS connection can  actually run on any port number
although 443 is the default. Some ISPs block particular ports and some
users may choose to run psiphon on a non-standard port.

The "index" page  is the page that  appears when one connects directly
to the   server's  root  path  -  not  the psiphon  URL.  An  attacker
monitoring a users connection,  at  an ISP  for example, can  directly
connect to any IP addresses that the user  connects to in order to see
what content is there. Each psiphon URL has a  unique file path, which
is encrypted  so  this attacker  cannot connect to   the psiphon login
page, only  to  the IP address.  If the  provider modifies the "index"
page  the  attacker will  see completely  innocuous   content if  they
connect to psiphon.

Who is behind psiphon?

psiphon is part of the CiviSec  Project run by the  Citizen Lab at the
Munk Centre   for    International Studies  at   the   University   of
Toronto. The CiviSec Project is funded by the Open Society Institute.

The Director of the Citizen Lab is Prof. Ronald J. Deibert.

The graphic design for psiphon is produced by Agent 5 Design.

--
      Andrea Glorioso || http://people.digitalpolicy.it/sama/cv/
          M: +39 348 921 4379	     F: +39 051 930 31 133
       "Truth is a relationship between a theory and the world;
       beauty is a relationship between a theory and the mind."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://lists.winstonsmith.org/pipermail/e-privacy/attachments/20070131/622e4f12/attachment.pgp>


More information about the E-privacy mailing list